Vol.27, No.2, 2021, pp.593-603, doi:10.32604/iasc.2021.015092
OPEN ACCESS
ARTICLE
Device Security Assessment of Internet of Healthcare Things
  • Abdulaziz Attaallah1, Masood Ahmad2, Md Tarique Jamal Ansari2, Abhishek Kumar Pandey2, Rajeev Kumar2,3,*, Raees Ahmad Khan2
1 Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah-21589, Saudi Arabia
2 Department of Information Technology, Babasaheb Bhimrao Ambedkar University, Lucknow-226025, Uttar Pradesh, India
3 Department of Computer Application, Shri Ramswaroop Memorial University, Barabanki 225003, Uttar Pradesh, India
* Corresponding Author: Rajeev Kumar. Email:
Received 06 November 2020; Accepted 14 December 2020; Issue published 18 January 2021
Abstract
Security of the Internet of Healthcare Things (IoHT) devices plays a vital role in e-healthcare today and there has been a rapid increase in the use of networked devices of IoHT in the present healthcare services. However, these networked devices are also highly vulnerable to attackers who constantly target the security of devices and their components to gain access to the patients’ data. Infringement of patients’ data is not only a violation of privacy but can also jeopardize patients’ health if the health records are tampered with. Once the device has been intruded upon, attackers can not only change the record of the patients but also block and switch off the device. Decidedly, the security of IoHT devices is at a huge risk and needs to be designed, manufactured and networked with more secure mechanisms. In this league, the present study employs a new methodology to assess the privacy and security of the IoHT devices. The study analyses the security defects of the medical devices by enlisting the opinions of the hacking experts. Based on the collated list of defects cited by the experts, the authors have designed a list of criteria and represented the defects in hierarchical format for assessing the security defects in the devices. Thereafter, the Technical for Order Preference by Similarity to Ideal Solution (TOPSIS) method has been used for ranking the security of IoHT devices, based on their security features. The findings of the study iterate that the proposed mechanism would be an efficacious approach for evaluating the security of the medical devices.
Keywords
Healthcare device; TOPSIS method; security and privacy; IoHT
Cite This Article
A. Attaallah, M. Ahmad, M. Tarique, A. K. Pandey, R. Kumar et al., "Device security assessment of internet of healthcare things," Intelligent Automation & Soft Computing, vol. 27, no.2, pp. 593–603, 2021.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.