TY - GEN
T1 - Knock! Knock! Who is there? Investigating data leakage from a medical internet of things hijacking attack
AU - Flynn, Talon
AU - Grispos, George
AU - Glisson, William Bradley
AU - Mahoney, William
N1 - Funding Information:
Financial support for this research is provided by the Nebraska Research Initiative (NRI).
Publisher Copyright:
© 2020 IEEE Computer Society. All rights reserved.
PY - 2020
Y1 - 2020
N2 - The amalgamation of Medical Internet of Things (MIoT) devices into everyday life is influencing the landscape of modern medicine. The implementation of these devices potentially alleviates the pressures and physical demands of healthcare systems through the remote monitoring of patients. However, there are concerns that the emergence of MIoT ecosystems is introducing an assortment of security and privacy challenges. While previous research has shown that multiple vulnerabilities exist within MIoT devices, minimal research investigates potential data leakage from MIoT devices through hijacking attacks. The research contribution of this paper is twofold. First, it provides a proof of concept that certain MIoT devices and their accompanying smartphone applications are vulnerable to hijacking attacks. Second, it highlights the effectiveness of using digital forensics tools as a lens to identify patient and medical device information on a hijacker's smartphone.
AB - The amalgamation of Medical Internet of Things (MIoT) devices into everyday life is influencing the landscape of modern medicine. The implementation of these devices potentially alleviates the pressures and physical demands of healthcare systems through the remote monitoring of patients. However, there are concerns that the emergence of MIoT ecosystems is introducing an assortment of security and privacy challenges. While previous research has shown that multiple vulnerabilities exist within MIoT devices, minimal research investigates potential data leakage from MIoT devices through hijacking attacks. The research contribution of this paper is twofold. First, it provides a proof of concept that certain MIoT devices and their accompanying smartphone applications are vulnerable to hijacking attacks. Second, it highlights the effectiveness of using digital forensics tools as a lens to identify patient and medical device information on a hijacker's smartphone.
UR - http://www.scopus.com/inward/record.url?scp=85089822397&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85089822397&partnerID=8YFLogxK
M3 - Conference contribution
AN - SCOPUS:85089822397
T3 - Proceedings of the Annual Hawaii International Conference on System Sciences
SP - 6456
EP - 6465
BT - Proceedings of the 53rd Annual Hawaii International Conference on System Sciences, HICSS 2020
A2 - Bui, Tung X.
PB - IEEE Computer Society
T2 - 53rd Annual Hawaii International Conference on System Sciences, HICSS 2020
Y2 - 7 January 2020 through 10 January 2020
ER -