{"title":"医疗物联网:影响数字经济的安全威胁和问题","authors":"M. Mushtaq, M. A. Shah, A. Ghafoor","doi":"10.1049/icp.2021.2420","DOIUrl":null,"url":null,"abstract":"In the healthcare industry, we cannot deny, contradict or oppose the importance of the Internet of Medical Things (IoMT). The ultimate purpose of the IoMT system is to gather and transmit health information such as ECG, weight, blood pressure and sugar levels. Such data may be shared with an approved individual, who may be a physician, a participating health company, insurance provider, or an external contractor regardless of their time, location, and device. But the story is not as simple because IoMT faces various emerging cyber-attacks and threats. Day by day new malware attacks are created and launched on IoMT because an attacker knows that this market is worth billions. The purpose of writing this paper is to introduce you to some of the well-known attacks that are launched on IoT. Such as denial of service, router attack, sensor attack, repay attack, fingerprint, and time-based spoofing, and recent malware attacks such as like Miari, Emoted, Gamut and NE curs and ransomware in IOMT.","PeriodicalId":254750,"journal":{"name":"Competitive Advantage in the Digital Economy (CADE 2021)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"THE INTERNET OF MEDICAL THINGS (IOMT): SECURITY THREATS AND ISSUES AFFECTING DIGITAL ECONOMY\",\"authors\":\"M. Mushtaq, M. A. Shah, A. Ghafoor\",\"doi\":\"10.1049/icp.2021.2420\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In the healthcare industry, we cannot deny, contradict or oppose the importance of the Internet of Medical Things (IoMT). The ultimate purpose of the IoMT system is to gather and transmit health information such as ECG, weight, blood pressure and sugar levels. Such data may be shared with an approved individual, who may be a physician, a participating health company, insurance provider, or an external contractor regardless of their time, location, and device. But the story is not as simple because IoMT faces various emerging cyber-attacks and threats. Day by day new malware attacks are created and launched on IoMT because an attacker knows that this market is worth billions. The purpose of writing this paper is to introduce you to some of the well-known attacks that are launched on IoT. Such as denial of service, router attack, sensor attack, repay attack, fingerprint, and time-based spoofing, and recent malware attacks such as like Miari, Emoted, Gamut and NE curs and ransomware in IOMT.\",\"PeriodicalId\":254750,\"journal\":{\"name\":\"Competitive Advantage in the Digital Economy (CADE 2021)\",\"volume\":\"28 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Competitive Advantage in the Digital Economy (CADE 2021)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1049/icp.2021.2420\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Competitive Advantage in the Digital Economy (CADE 2021)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1049/icp.2021.2420","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
THE INTERNET OF MEDICAL THINGS (IOMT): SECURITY THREATS AND ISSUES AFFECTING DIGITAL ECONOMY
In the healthcare industry, we cannot deny, contradict or oppose the importance of the Internet of Medical Things (IoMT). The ultimate purpose of the IoMT system is to gather and transmit health information such as ECG, weight, blood pressure and sugar levels. Such data may be shared with an approved individual, who may be a physician, a participating health company, insurance provider, or an external contractor regardless of their time, location, and device. But the story is not as simple because IoMT faces various emerging cyber-attacks and threats. Day by day new malware attacks are created and launched on IoMT because an attacker knows that this market is worth billions. The purpose of writing this paper is to introduce you to some of the well-known attacks that are launched on IoT. Such as denial of service, router attack, sensor attack, repay attack, fingerprint, and time-based spoofing, and recent malware attacks such as like Miari, Emoted, Gamut and NE curs and ransomware in IOMT.