2015 7th International Conference on New Technologies, Mobility and Security (NTMS) 2015
DOI: 10.1109/ntms.2015.7266525
|View full text |Cite
|
Sign up to set email alerts
|

Threats identification for the smart Internet of Things in eHealth and adaptive security countermeasures

Abstract: The Things in the smart Internet of Things (IoT) depend more on self decision making abilities instead of relying on human interventions. In the IoT, static security mechanisms are not well suited to handle all security risks sufficiently. A security mechanism can be considered static if it is developed with fixed security measures whereas an adaptive security mechanism can be considered dynamic if it can continuously monitor, analyse, and reassess a security risk at runtime. Adaptive security mechanisms can b… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
15
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 19 publications
(15 citation statements)
references
References 20 publications
0
15
0
Order By: Relevance
“…The authors identify two types of attackers in IoT health systems: a) Internal Attackers (that exist within the healthcare system and execute malicious operations secretly), and b) External Attackers (that reside outside the healthcare system and and perform malicious activities. An adversarial model is also presented in [57], combined with an asset-based approach. The authors identify key assets (personal, physical, information, and intangible assets) and they further classify the vulnerabilities that can be exploited by a threat agent to harm a system.…”
Section: A: Threat Modeling For Iomtmentioning
confidence: 99%
See 1 more Smart Citation
“…The authors identify two types of attackers in IoT health systems: a) Internal Attackers (that exist within the healthcare system and execute malicious operations secretly), and b) External Attackers (that reside outside the healthcare system and and perform malicious activities. An adversarial model is also presented in [57], combined with an asset-based approach. The authors identify key assets (personal, physical, information, and intangible assets) and they further classify the vulnerabilities that can be exploited by a threat agent to harm a system.…”
Section: A: Threat Modeling For Iomtmentioning
confidence: 99%
“…Additionally, some exploitation methods could also include direct attack, social engineering, malware and various combinations [8]. In [57] the authors present an asset-based vulnerability framework for IoMT. Once the key system assets are identified, the next step entails the identifications of the various vulnerabilities that might be exploited by a threat agent to harm a healthcare system.…”
Section: A: Iomt-specific Vulnerability Assessmentmentioning
confidence: 99%
“…The authors discussed [46] the importance of using a dynamic security mechanism in the field of eHealth systems in order to identify attacks, such as privacy violation, denial-of-service, data manipulation, man-in-the-middle, etc. The authors suggested using environmental sensors and system monitoring components in the devices, in order to explore security events in the internal and external environment.…”
Section: C: Threats Identification and Adaptive Security Countermeasumentioning
confidence: 99%
“…The number of DoS attacks are in majority that may be hurled in contradiction of the IoT, example channels jamming process, high computational consumption possessions like recollection process, bandwidth, disk storage or processing time, and disruption of node information behavior. [23][24] [25] 3) Physical attacks: These attacks interfere with hardware mechanisms. As the unattended and dispersed environment of IoT, most of the devices characteristically work in outdoor surroundings, which are extremely vulnerable to physical bouts.…”
Section: Security Threats In Internet Of Thingsmentioning
confidence: 99%