{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T18:50:54Z","timestamp":1772823054198,"version":"3.50.1"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031252211","type":"print"},{"value":"9783031252228","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-25222-8_6","type":"book-chapter","created":{"date-parts":[[2023,1,28]],"date-time":"2023-01-28T14:29:55Z","timestamp":1674916195000},"page":"66-75","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Cybersecurity Challenges in Healthcare Medical Devices"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8732-6892","authenticated-orcid":false,"given":"Ana","family":"Longras","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5845-4086","authenticated-orcid":false,"given":"Teresa","family":"Pereira","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7910-2418","authenticated-orcid":false,"given":"Ant\u00f3nio","family":"Amaral","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,1,29]]},"reference":[{"key":"6_CR1","unstructured":"MDR - Article 2 - Definitions - Medical Device Regulation (2022). https:\/\/www.medical-device-regulation.eu\/2019\/07\/10\/mdr-article-2-definitions. Accessed 22 Jan 2022"},{"key":"6_CR2","unstructured":"Medical devices. https:\/\/www.who.int\/health-topics\/medical-devices#tab=tab_1. Accessed 05 Jan 2022"},{"issue":"2","key":"6_CR3","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1016\/S1872-2040(20)60076-7","volume":"49","author":"L Feng","year":"2021","unstructured":"Feng, L., et al.: Research and application progress of intelligent wearable devices. Chinese J. Anal. Chem. 49(2), 159\u2013171 (2021). https:\/\/doi.org\/10.1016\/S1872-2040(20)60076-7","journal-title":"Chinese J. Anal. Chem."},{"issue":"4","key":"6_CR4","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1109\/MITP.2021.3072535","volume":"23","author":"S Sneha","year":"2021","unstructured":"Sneha, S., Panjwani, A., Lade, B., Randolph, J., Vickery, M.: Alleviating challenges related to FDA-approved medical wearables using blockchain technology. IT Prof. 23(4), 21\u201327 (2021). https:\/\/doi.org\/10.1109\/MITP.2021.3072535","journal-title":"IT Prof."},{"key":"6_CR5","unstructured":"FDA.gov (2022). https:\/\/www.fda.gov\/files\/Content-of-Premarket-Submissions-for-Management-of-Cybersecurity-in-Medical-Devices---Guidance-for-Industry-and-Food-and-Drug-Administration-Staff.pdf. Accessed 05 Jan 2022"},{"key":"6_CR6","unstructured":"VOSviewer - visualizing scientific landscapes. https:\/\/www.vosviewer.com\/. Accessed 28 Feb 2022"},{"key":"6_CR7","doi-asserted-by":"publisher","first-page":"272","DOI":"10.1016\/j.jbi.2015.04.007","volume":"55","author":"C Camara","year":"2015","unstructured":"Camara, C., Peris-Lopez, P., Tapiador, J.E.: Security and privacy issues in implantable medical devices: a comprehensive survey. J. Biomed. Inform. 55, 272\u2013289 (2015). https:\/\/doi.org\/10.1016\/j.jbi.2015.04.007","journal-title":"J. Biomed. Inform."},{"issue":"6","key":"6_CR8","doi-asserted-by":"publisher","first-page":"1802","DOI":"10.1109\/JIOT.2017.2703172","volume":"4","author":"A Humayed","year":"2017","unstructured":"Humayed, A., Lin, J., Li, F., Luo, B.: Cyber-physical systems security\u2014a survey. IEEE Internet Things J. 4(6), 1802\u20131831 (2017). https:\/\/doi.org\/10.1109\/JIOT.2017.2703172","journal-title":"IEEE Internet Things J."},{"key":"6_CR9","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1016\/J.FUTURE.2017.11.020","volume":"82","author":"M Hossain","year":"2018","unstructured":"Hossain, M., Islam, S.M.R., Ali, F., Kwak, K.S., Hasan, R.: An Internet of Things-based health prescription assistant and its security system design. Future Gener. Comput. Syst. 82, 422\u2013439 (2018). https:\/\/doi.org\/10.1016\/J.FUTURE.2017.11.020","journal-title":"Future Gener. Comput. Syst."},{"key":"6_CR10","doi-asserted-by":"publisher","first-page":"1253","DOI":"10.1016\/J.PROMFG.2017.09.047","volume":"13","author":"T Pereira","year":"2017","unstructured":"Pereira, T., Barreto, L., Amaral, A.: Network and information security challenges within Industry 4.0 paradigm. Procedia Manuf. 13, 1253\u20131260 (2017). https:\/\/doi.org\/10.1016\/J.PROMFG.2017.09.047","journal-title":"Procedia Manuf."},{"key":"6_CR11","unstructured":"Fierce Healthcare: 82% of healthcare organizations have experienced an IoT-focused cyberattack, survey finds. https:\/\/www.fiercehealthcare.com\/tech\/82-healthcare-organizations-have-experienced-iot-focused-cyber-attack-survey-finds. Accessed 22 Feb 2022"},{"key":"6_CR12","doi-asserted-by":"publisher","unstructured":"Rushanan, M., Rubin, A.D., Kune, D.F., Swanson, C.M.: SoK: security and privacy in implantable medical devices and body area networks. In: 35th IEEE Symposium on Security and Privacy (SP 2014), pp. 524\u2013539 (2014). https:\/\/doi.org\/10.1109\/SP.2014.40","DOI":"10.1109\/SP.2014.40"},{"issue":"4","key":"6_CR13","doi-asserted-by":"publisher","first-page":"3723","DOI":"10.1109\/COMST.2019.2914094","volume":"21","author":"T Yaqoob","year":"2019","unstructured":"Yaqoob, T., Abbas, H., Atiquzzaman, M.: Security vulnerabilities, attacks, countermeasures, and regulations of networked medical devices-a review. IEEE Commun. Surv. Tutor. 21(4), 3723\u20133768 (2019). https:\/\/doi.org\/10.1109\/COMST.2019.2914094","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"6_CR14","unstructured":"NVD - CVE-2021-31886 (2021). https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-31886. Accessed 14 Feb 2022"},{"issue":"1","key":"6_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/S40294-020-00070-W\/FIGURES\/7","volume":"8","author":"M Ahmed","year":"2020","unstructured":"Ahmed, M., Pathan, A.S.K.: False data injection attack (FDIA): an overview and new metrics for fair evaluation of its countermeasure. Complex Adapt. Syst. Model. 8(1), 1\u201314 (2020). https:\/\/doi.org\/10.1186\/S40294-020-00070-W\/FIGURES\/7","journal-title":"Complex Adapt. Syst. Model."},{"key":"6_CR16","unstructured":"ABC News: Ireland\u2019s health service hit by \u201csignificant\u201d ransomware attack. https:\/\/abcnews.go.com\/International\/irelands-health-service-hit-significant-ransomware-attack\/story?id=77685241. Accessed 22 Jan 2022"},{"key":"6_CR17","unstructured":"Cyberattack Drives 2 UF Health Hospitals to EHR Downtime. https:\/\/healthitsecurity.com\/news\/cyberattack-drives-2-uf-health-hospitals-to-ehr-downtime. Accessed 22 Jan 2022"},{"key":"6_CR18","unstructured":"Saint Agnes Health Care Hack Exposes 25,000 HIPAA Records. https:\/\/www.hipaajournal.com\/saint-agnes-healthcare-hack-exposes-25000-hipaa-records-5663\/. Accessed 22 Jan 2022"},{"issue":"6","key":"6_CR19","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1080\/17434440.2018.1483235","volume":"15","author":"L Pycroft","year":"2018","unstructured":"Pycroft, L., Aziz, T.Z.: Security of implantable medical devices with wireless connections: the dangers of cyber-attacks. Expert Rev. Med. Devices 15(6), 403\u2013406 (2018). https:\/\/doi.org\/10.1080\/17434440.2018.1483235","journal-title":"Expert Rev. Med. Devices"},{"issue":"4","key":"6_CR20","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1145\/2043164.2018438","volume":"41","author":"S Gollakota","year":"2011","unstructured":"Gollakota, S., Hassanieh, H., Ransford, B., Katabi, D., Fu, K.: They can hear your heartbeats: non-invasive security for implantable medical devices. SIGCOMM Comput. Commun. Rev. 41(4), 2\u201313 (2011). https:\/\/doi.org\/10.1145\/2043164.2018438","journal-title":"SIGCOMM Comput. Commun. Rev."},{"key":"6_CR21","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1016\/j.future.2015.06.006","volume":"56","author":"F Hu","year":"2016","unstructured":"Hu, F., et al.: Robust cyber-physical systems: concept, models, and implementation. Future Gener. Comput. Syst. 56, 449\u2013475 (2016). https:\/\/doi.org\/10.1016\/j.future.2015.06.006","journal-title":"Future Gener. Comput. Syst."},{"key":"6_CR22","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1016\/j.comcom.2020.05.048","volume":"160","author":"RM Swarna Priya","year":"2020","unstructured":"Swarna Priya, R.M., et al.: An effective feature engineering for DNN using hybrid PCA-GWO for intrusion detection in IoMT architecture. Comput. Commun. 160, 139\u2013149 (2020). https:\/\/doi.org\/10.1016\/j.comcom.2020.05.048","journal-title":"Comput. Commun."},{"key":"6_CR23","doi-asserted-by":"publisher","first-page":"305","DOI":"10.2147\/MDER.S50048","volume":"8","author":"PA Williams","year":"2015","unstructured":"Williams, P.A., Woodward, A.J.: Cybersecurity vulnerabilities in medical devices: a complex environment and multifaceted problem. Med. Devices (Auckland, N.Z.) 8, 305\u2013316 (2015). https:\/\/doi.org\/10.2147\/MDER.S50048","journal-title":"Med. Devices (Auckland, N.Z.)"},{"key":"6_CR24","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1016\/j.maturitas.2018.04.008","volume":"113","author":"L Coventry","year":"2018","unstructured":"Coventry, L., Branley, D.: Cybersecurity in healthcare: a narrative review of trends, threats and ways forward. Maturitas 113, 48\u201352 (2018). https:\/\/doi.org\/10.1016\/j.maturitas.2018.04.008","journal-title":"Maturitas"},{"key":"6_CR25","unstructured":"Patients Unaware of the Extent of Healthcare Cyberattacks and Data Theft. https:\/\/www.hipaajournal.com\/patients-unaware-of-the-extent-of-healthcare-cyberattacks-and-data-theft\/. Accessed 25 Feb 2022"},{"key":"6_CR26","unstructured":"Cybersecurity|FDA: https:\/\/www.fda.gov\/medical-devices\/digital-health-center-excellence\/cybersecurity#safety. Accessed 25 Feb 2022"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Internet of Everything"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-25222-8_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,28]],"date-time":"2023-01-28T14:32:17Z","timestamp":1674916337000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-25222-8_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031252211","9783031252228"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-25222-8_6","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"value":"1867-8211","type":"print"},{"value":"1867-822X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"29 January 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IoECon","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Internet of Everything","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Guimar\u00e3es","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Portugal","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 September 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 September 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ioecon2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Confy +","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"26","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"10","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"38% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}