ARTIFICIAL INTELLIGENCE APPLICATIONS FOR THE SECURITY OF IOT DEVICES IN HEALTHCARE
Authors: A.Ravishankar Rao
Affiliation: Fairleigh Dickinson University
Category:
Keywords: cybersecurity, internet of things, medical devices, healthcare
ABSTRACT. The integration of Internet of Things (IoT) devices in healthcare has revolutionized patient care but also introduced significant cybersecurity challenges. This paper explores the vulnerabilities of IoT systems in healthcare, drawing from high-profile cyberattacks like the Mirai botnet, Hackensack Meridian ransomware incidents, and the Colonial Pipeline breach. It examines the role of artificial intelligence (AI) in enhancing IoT security, particularly through techniques such as User and Entity Behavioral Analytics (UEBA) and predictive modeling. While AI offers promising solutions for detecting anomalies and predicting threats, it also faces limitations, including embedding drift, resource constraints, and the generation of insecure code. Case studies illustrate how IoT devices like pacemakers and webcams can be exploited without proper safeguards. Future directions for AI-driven IoT security include multi-source data integration, explainability, and ethical oversight. It is important to safeguard the security of IoT systems in healthcare through high levels of vigilance.
References:
405d.hhs.gov (2023). Technical Volume 2: Cybersecurity practices for medium and large healthcare organizations.
Alexander, B., S. Haseeb and A. Baranchuk (2019). "Are implanted electronic devices hackable?" Trends in cardiovascular medicine 29(8): 476-480.
Antonakakis, M., T. April, M. Bailey, M. Bernhard, E. Bursztein, J. Cochran, Z. Durumeric, J. A. Halderman, L. Invernizzi and M. Kallitsis (2017). Understanding the mirai botnet. 26th USENIX security symposium (USENIX Security 17).
Beerman, J., D. Berent, Z. Falter and S. Bhunia (2023). A review of colonial pipeline ransomware attack. 2023 IEEE/ACM 23rd International Symposium on Cluster, Cloud and Internet Computing Workshops (CCGridW), IEEE.
Buck, C., C. Olenberger, A. Schweizer, F. Völter and T. Eymann (2021). "Never trust, always verify: A multivocal literature review on current knowledge and research gaps of zero-trust." Computers & Security 110: 102436.
Datta, J., R. Dasgupta, S. Dasgupta and K. R. Reddy (2021). Real-time threat detection in ueba using unsupervised learning algorithms. 2021 5th International Conference on Electronics, Materials Engineering & Nano-Technology (IEMENTech), IEEE.
IBM (2024). What is UEBA (User entity behavioral analytics)?
ain, R., M. Singh, A. R. Rao and R. Garg (2024). "Predicting hospital length of stay using machine learning on a large open health dataset." BMC Health Services Research 24(1): 860.
Karambelas, C. (2020). "Health Care Technology: Ransomware Risk and Protection." American Bankruptcy Institute Journal 39(5): 30-57.
Rao, A., K. Mishra and N. Recharla (2020). Designing an Internet of Things Laboratory to Improve Student Understanding of Secure Embedded Systems. National Cyber Summit, Springer.
Rao, A. R. and D. Clarke (2019). Capacity Building for a Cybersecurity Workforce Through Hands-on Labs for Internet-of-Things Security. National Cyber Summit, Springer.
Rao, A. R. and A. Elias-Medina (2024). "Designing an internet of things laboratory to improve student understanding of secure IoT systems." Internet of Things and Cyber-Physical Systems 4: 154-166.
Rao, A. R., R. Jain, M. Singh and R. Garg (2024). "Predictive interpretable analytics models for forecasting healthcare costs using open healthcare data." Healthcare Analytics 6: 100351.
Siddiqi, R., S. Singh, L. Zuck and C. Kanich (2023). Tracking, But Make It Offline: The Privacy Implications of Scanning QR Codes Found in the World. Proceedings of the 2023 Workshop on Technology and Consumer Protection.
Synk (2023). 2023 AI Code Security Report.
Tundis, A., E. M. Modo Nga and M. Mühlhäuser (2021). An exploratory analysis on the impact of Shodan scanning tool on the network attacks. Proceedings of the 16th International Conference on Availability, Reliability and Security.
Vegas, J., A. R. Rao and C. Llamas (2024). "Deep Learning System for User Identification Using Sensors on Doorknobs." Sensors 24(15): 5072.
Zhou, X., X. Ye, I. Kevin, K. Wang, W. Liang, N. K. C. Nair, S. Shimizu, Z. Yan and Q. Jin (2023). "Hierarchical federated learning with social context clustering-based participant selection for internet of medical things applications." IEEE Transactions on Computational Social Systems 10(4): 1742-1751.
Menu