My research topic is about medical devices and cyber-attacks. The plan is to research as much as I can about securing these medical devices from attacks and how can we securely communicate with these devices.
Search # 1:
Database used: JSTOR
Search subject: Medical devices and cyber-attacks
Results: 427
This search gave 427 results and out of which 30 were quite useful. Three searches were spot on while others did help me with my research topic. I might do more searches but with the subject term and keywords searches I have conducted.
Search # 2:
Database used: Academic Search Premier
Search Subject: Wireless Communication, attacks, medical devices
Results: 8
This search gave me 8 results but all these results are very useful for my research topic. The searches were spot on. I will try doing searches from some other databases and maybe couple which are not from Forsyth databases.
Search # 3:
Database used: MEDLINE
Search Subject: Wireless Communication, Medical Devices, Cybersecurity
Results: 23
This search gave twenty three results and these were very good results. Tried this new database and the results were great and all the search results were new. I will use the searches from this database a lot for my research topic.
Search # 4:
Database used: Library, Information Science & Technology Abstracts
Search Subject: Med devices, wireless technology, security
Results: 4
This database gave me only 4 search results but out of these 4, three were great and will help in my research topic of cyber-security, attacks on medical device and how to securely communicate between them. I will use this database further with different search subjects and see if it can give me more results.
Search # 5
Database used: Information Science
Search Subject: Wireless, Security, medical devices
Results: 17
Through this database, I was able to find 17 search results out of which 9 were very useful for my research topic. I will use this database for this research paper with different subject terms and will see if it can give me more results. I will use these searches as my primary information as the articles were spot on.
Saturation: I thought that after doing researches for last couple months, I have reached saturation. Then I discovered couple more databases which gave me a lot of material. I now believe that I still have some more databases to use before I can actually hit saturation.
Annotated Bibliography
#1
Pycroft, L., & Aziz, T. Z. (2018). Security of implantable medical devices with wireless connections: The dangers of cyber-attacks. Expert Review of Medical Devices, 15(6), 403–406. https://doi.org/10.1080/17434440.2018.1483235
This article talks about IMDs and their failure in cybersecurity. It covers the existing threat which the IMDs faces and what kind of attack can occur, which can be detrimental for a patient. This article also discuss the solution of preventing these attacks. This is what I need for my research topic and it basically talks about all the threats and dangers which I want to cover in my research.
#2
Hoglund, D. H. (2017). Secure and reliable wireless medical device and mobile connectivity. Biomedical instrumentation & technology, 51(2), 130–134. https://doi.org/10.2345/0899-8205-51.2.130
This article talks about security of reliable medical devices and as well as mobile devices. This article also talks about on how to deploy the Wlan and how can one achieve the optimal system which is safe and secure. This article is perfect for my research topic as I have been doing researches on the same issues which medical devices face, TCP/IP attacks, DDos attacks and many more.
#3
Cuningkin, V., Riley, E., & Rainey, L. (2021). Preventing medjacking. The American journal of nursing, 121(10), 46–50. https://doi.org/10.1097/01.NAJ.0000794252.99183.5e
This article is about the medjacking or in other words what if a hacker hacks into an implantable medical device. This article talks about mitigating these attacks and what types of attacks can occur. My main research topic is similar and the questions I am posing actually is discussed a bit in this article.
#4
Zhang, M., Raghunathan, A., & Jha, N. K. (2013). MedMon: securing medical devices through wireless monitoring and anomaly detection. IEEE Transactions on Biomedical Circuits and Systems, 7(6), 871–881. https://doi.org/10.1109/TBCAS.2013.2245664
This article talks about a framework where medical devices are based on wireless channel monitoring and also anomaly detection. It discuss using a multi-layered anomaly detection to identify a malicious transaction. This article also goes well with my research and has a lot of important and useful data for my research topic.
#5
Sethuraman, S. C., Vijayakumar, V., & Walczak, S. (2019). Cyber Attacks on healthcare devices using unmanned aerial vehicles. Journal of medical systems, 44(1), 29. https://doi.org/10.1007/s10916-019-1489-9
This article talks about the threat which is being faced by medical devices and wireless medical equipment, but they also talk about how UAV or drones can be a problem for there wireless devices. This article also talks about how a drone was used to attack the smart hospital environment in a simulation project and the attack was a success. This can add another dimension to my research topic as I was not even thinking about using a drone to attack these medical devices.
