Mapping Cyber Attacks on the Internet of Medical Things: A Taxonomic Review

Venkatesh Kondeti, Hayretdin Bahsi

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

The Internet of Medical Things (IoMT) constitutes the core technology of various contemporary healthcare applications, such as remote patient monitoring, telemedicine, and surgical robotics. Due to their complex system-of-system nature, IoMT systems are prone to numerous cyber attacks with implications ranging from physical harm to data theft. This study surveys the literature to identify the cyber attack categories and their taxonomy to induce a knowledge base for systematic threat modelling methods. Contrary to similar studies, we paid attention to review papers demonstrating solid attack techniques and tactics in healthcare systems. The knowledge base consisting of attacks, their categories, and taxonomy can be utilized by system developers to identify security requirements at the early stage of development.

Original languageEnglish (US)
Title of host publication2024 19th Annual System of Systems Engineering Conference, SoSE 2024
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages84-91
Number of pages8
ISBN (Electronic)9798350365917
DOIs
StatePublished - 2024
Externally publishedYes
Event19th International IEEE Conference on System of Systems Engineering, SoSE 2024 - Tacoma, United States
Duration: Jun 23 2024Jun 26 2024

Publication series

Name2024 19th Annual System of Systems Engineering Conference, SoSE 2024

Conference

Conference19th International IEEE Conference on System of Systems Engineering, SoSE 2024
Country/TerritoryUnited States
CityTacoma
Period6/23/246/26/24

ASJC Scopus subject areas

  • Safety, Risk, Reliability and Quality
  • Health Informatics
  • Hardware and Architecture
  • Information Systems
  • Information Systems and Management

Fingerprint

Dive into the research topics of 'Mapping Cyber Attacks on the Internet of Medical Things: A Taxonomic Review'. Together they form a unique fingerprint.

Cite this