Have I reached Saturation in my research on Medical Devices and Cyber-attacks?

My research topic is about medical devices and cyber-attacks.  The plan is to research as much as I can about securing these medical devices from attacks and how can we securely communicate with these devices.

Search # 1:

Database used: JSTOR

Search subject: Medical devices and cyber-attacks

Results: 427

This search gave 427 results and out of which 30 were quite useful. Three searches were spot on while others did help me with my research topic. I might do more searches but with the subject term and keywords searches I have conducted.

Search # 2:

Database used: Academic Search Premier

Search Subject: Wireless Communication, attacks, medical devices

Results: 8

This search gave me 8 results but all these results are very useful for my research topic. The searches were spot on. I will try doing searches from some other databases and maybe couple which are not from Forsyth databases.

Search # 3:

Database used: MEDLINE

Search Subject: Wireless Communication, Medical Devices, Cybersecurity

Results: 23

This search gave twenty three results and these were very good results. Tried this new database and the results were great and all the search results were new. I will use the searches from this database a lot for my research topic.

Search # 4: 

Database used: Library, Information Science & Technology Abstracts

Search Subject: Med devices, wireless technology, security

Results: 4

This database gave me only 4 search results but out of these 4, three were great and will help in my research topic of cyber-security, attacks on  medical device and how to securely communicate between them. I will use this database further with different search subjects and see if it can give me more results.

Search # 5

Database used: Information Science

Search Subject: Wireless, Security, medical devices

Results: 17

Through this database, I was able to find 17 search results out of which  9 were very useful for my research topic. I will use this database for this research paper with different subject terms and will see if it can give me more results. I will use these searches as my primary information as the articles were spot on.

Saturation: I thought that after doing researches for last couple months, I have reached saturation. Then I discovered couple more databases which gave me a lot of material. I now believe that I still have some more databases to use before I can actually hit saturation.

Annotated Bibliography

#1

Pycroft, L., & Aziz, T. Z. (2018). Security of implantable medical devices with wireless      connections: The dangers of cyber-attacks. Expert Review of Medical Devices15(6), 403–406. https://doi.org/10.1080/17434440.2018.1483235

This article talks about IMDs and their failure in cybersecurity. It covers the existing threat which the IMDs faces and what kind of attack can occur, which can be detrimental for a patient. This article also discuss the solution of preventing these attacks.  This is what I need for my research topic and it basically talks about all the threats and dangers which I want to cover in my research.

#2

Hoglund, D. H. (2017). Secure and reliable wireless medical device and mobile connectivity. Biomedical instrumentation & technology51(2), 130–134. https://doi.org/10.2345/0899-8205-51.2.130

This article talks about security of reliable medical devices and as well as mobile devices.  This article also talks about on how to deploy the Wlan and how can one achieve the optimal system which is safe and secure. This article is perfect for my research topic as I have been doing researches on the same issues which medical devices face, TCP/IP attacks, DDos attacks and many more.

#3

Cuningkin, V., Riley, E., & Rainey, L. (2021). Preventing medjacking. The American journal of nursing121(10), 46–50. https://doi.org/10.1097/01.NAJ.0000794252.99183.5e

This article is about the medjacking or in other words what if a hacker hacks into an implantable medical device. This article talks about mitigating these attacks and what types of attacks can occur. My main research topic is similar and the questions I am posing actually is discussed a bit in this article.

#4

Zhang, M., Raghunathan, A., & Jha, N. K. (2013). MedMon: securing medical devices through wireless monitoring and anomaly detection. IEEE Transactions on Biomedical Circuits and Systems7(6), 871–881. https://doi.org/10.1109/TBCAS.2013.2245664

This article talks about a framework where medical devices are based on wireless channel monitoring and also anomaly detection. It discuss using a multi-layered anomaly detection to identify a malicious transaction.  This article also goes well with my research and has a lot of important and useful data for my research topic.

#5

Sethuraman, S. C., Vijayakumar, V., & Walczak, S. (2019). Cyber Attacks on healthcare devices using unmanned aerial vehicles. Journal of medical systems44(1), 29. https://doi.org/10.1007/s10916-019-1489-9

This article talks about the threat which is being faced by medical devices and wireless medical equipment, but they also talk about how UAV or drones can be a problem for there wireless devices. This article also talks about how a drone was used to attack the smart hospital environment in a simulation project and the attack was a success. This can add another dimension to my research topic as I was not even thinking about using a drone to attack these medical devices.

OpenClipart-Vectors / Pixabay

 

 

 

 

About swyusaf

Hey everyone, my name is Syed Yusaf and I am a junior at FHSU. I am doing Bachelors of Science in Computer Networking and Telecommunications. I completed my Associates of Applied Sciences from Hutchinson Community College in Networking.

Leave a Reply

Your email address will not be published. Required fields are marked *