skip to main content
10.1145/3652037.3663888acmotherconferencesArticle/Chapter ViewAbstractPublication PagespetraConference Proceedingsconference-collections
research-article

SEPTON Toolkit application: An overview of the security techniques used from wearable medical devices to physician’s healthcare platform

Published: 26 June 2024 Publication History

Abstract

Now that the technology is more widely available than ever before, protecting information assets is paramount, especially in the face of escalating cyber threats. The healthcare sector has experienced a significant increase in cyber-attacks, particularly those affecting patient data and business continuity. This trend, exacerbated by the widespread adoption of Internet of Things (IoT) devices, poses significant challenges to securing healthcare infrastructure, given its critical role and unique operational constraints. This paper presents the SEPTON Horizon Europe project, a comprehensive cybersecurity toolkit designed to improve the security of networked medical devices in hospitals and healthcare centres. The mechanisms, techniques and methodologies used in the development of the SEPTON toolkit are presented. The scope and level of application of each component is briefly described, and how each can enhance the overall security of the medical system flow. Finally, a description of the use case with a wearable medical device and the tools of the SEPTON toolkit that will be integrated and tested in it is given.

References

[1]
Anthony James Cartwright. 2023. The elephant in the room: cybersecurity in healthcare. Journal of Clinical Monitoring and Computing 37, 5 (2023), 1123–1132.
[2]
Septon consortium. 2024. Security Protection Tools for Networked Medical Devices. Septon EU Project. Retrieved February 22, 2024 from https://septon-project.eu/
[3]
Preçi E. 2022. Addressing Security Risks to Medical IoT Devices. ISACA. Retrieved February 22, 2024 from https://www.isaca.org/resources/news-and-trends/isaca-now-blog/2022/addressing-security-risks-to-medical-iot-devices
[4]
H. Krishnan. 2023. Security challenges associated with healthcare IoT devices. ManageEngine. Retrieved February 22, 2024 from https://www.manageengine.com/log-management/cyber-security/security-issues-healthcare-iot-devices.html
[5]
Hannah T Neprash, Claire C McGlave, Dori A Cross, Beth A Virnig, Michael A Puskarich, Jared D Huling, Alan Z Rozenshtein, and Sayeh S Nikpay. 2022. Trends in ransomware attacks on US hospitals, clinics, and other health care delivery organizations, 2016-2021. In JAMA Health Forum, Vol. 3. American Medical Association, American Medical Association, e224873–e224873.
[6]
Southwick R.2024. Healthcare cyberattacks have affected more than 100 million people in 2023. Chief Healthcare Executive. Retrieved February 22, 2024 from https://www.chiefhealthcareexecutive.com/view/health-data-cyberattacks-have-affected-more-than-100-million-people-in-2023
[7]
Ashwin W.2024. HealthyPi 5: An extensible, open-source sensor platform for biosignal acquisition. ProtoCentral Electronics. Retrieved February 22, 2024 from https://www.crowdsupply.com/protocentral/healthypi-5/updates/healthy-pi-5s-security-features

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
PETRA '24: Proceedings of the 17th International Conference on PErvasive Technologies Related to Assistive Environments
June 2024
708 pages
ISBN:9798400717604
DOI:10.1145/3652037
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 26 June 2024

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. healthcare
  2. integrity
  3. medical data
  4. medical devices
  5. privacy
  6. security
  7. toolkit

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Funding Sources

  • SEPTON - HORIZON-HLTH-2022-IND-13

Conference

PETRA '24

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 31
    Total Downloads
  • Downloads (Last 12 months)31
  • Downloads (Last 6 weeks)7
Reflects downloads up to 24 Dec 2024

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media