<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.4 20241031//EN"
        "https://jats.nlm.nih.gov/publishing/1.4/JATS-journalpublishing1-4.dtd">
<article  article-type="reviewer-report"        dtd-version="1.4">
            <front>

                <journal-meta>
                                                                <journal-id>usaysad</journal-id>
            <journal-title-group>
                                                                                    <journal-title>Uluslararası Sağlık Yönetimi ve Stratejileri Araştırma Dergisi</journal-title>
            </journal-title-group>
                                        <issn pub-type="epub">2149-6161</issn>
                                                                                            <publisher>
                    <publisher-name>Zekai ÖZTÜRK</publisher-name>
                </publisher>
                    </journal-meta>
                <article-meta>
                                        <article-id/>
                                                                                                                                                                                            <title-group>
                                                                                                                        <article-title>KABLOSUZ AĞA BAĞLI TIBBİ CİHAZLARDA SİBER GÜVENLİK AÇIKLARI VE ÇÖZÜM ÖNERİLERİ</article-title>
                                                                                                                                                                                                <trans-title-group xml:lang="en">
                                    <trans-title>CYBER SECURITY VULNERABILITIES AND SOLUTIONS FOR MEDICAL DEVICES CONNECTED TO WIRELESS NETWORKS</trans-title>
                                </trans-title-group>
                                                                                                    </title-group>
            
                                                    <contrib-group content-type="authors">
                                                                        <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0009-0002-2168-474X</contrib-id>
                                                                <name>
                                    <surname>Yurttaş</surname>
                                    <given-names>Hüseyin Galip</given-names>
                                </name>
                                                                    <aff>Aselsan</aff>
                                                            </contrib>
                                                    <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0003-0492-7500</contrib-id>
                                                                <name>
                                    <surname>Güzel</surname>
                                    <given-names>Alper</given-names>
                                </name>
                                                                    <aff>GAZİ ÜNİVERSİTESİ</aff>
                                                            </contrib>
                                                                                </contrib-group>
                        
                                        <pub-date pub-type="pub" iso-8601-date="20230831">
                    <day>08</day>
                    <month>31</month>
                    <year>2023</year>
                </pub-date>
                                        <volume>9</volume>
                                        <issue>2</issue>
                                        <fpage>269</fpage>
                                        <lpage>283</lpage>
                        
                        <history>
                                    <date date-type="received" iso-8601-date="20230525">
                        <day>05</day>
                        <month>25</month>
                        <year>2023</year>
                    </date>
                                                    <date date-type="accepted" iso-8601-date="20230829">
                        <day>08</day>
                        <month>29</month>
                        <year>2023</year>
                    </date>
                            </history>
                                        <permissions>
                    <copyright-statement>Copyright © 2015, Uluslararası Sağlık Yönetimi ve Stratejileri Araştırma Dergisi</copyright-statement>
                    <copyright-year>2015</copyright-year>
                    <copyright-holder>Uluslararası Sağlık Yönetimi ve Stratejileri Araştırma Dergisi</copyright-holder>
                </permissions>
            
                                                                                                <abstract><p>Bu makale, kablosuz ağa bağlı tıbbi cihazlarda siber güvenlik konusunu ele almaktadır. Kablosuz tıbbi cihazların yaygın kullanımı, hastaların sağlık durumlarını izlemek ve tedavi etmek için büyük avantajlar sunmaktadır. Ancak, bu cihazlar, siber saldırılara karşı ciddi riskler taşımaktadır. Bu risklerden faydalanan saldırganların cihazları ele geçirmesi, hasta verilerini elde etmesi veya hastaların sağlığına zarar vermesine sebep olabilmektedir. Araştırmamız, kablosuz tıbbi cihazlarda siber güvenlik zafiyetlerinin çeşitli faktörlerden kaynaklandığını ortaya koymuş, güvenlik zayıflıklarına nasıl önlem alınabileceği konusunda öneriler sunulmuştur.  Bu makale, kablosuz tıbbi cihazlardaki güvenlik zayıflıkları ve bu zayıflıkların potansiyel etkilerinin başta bu alanda strateji belirleyici olan regülatörler, kurum yöneticileri olmak üzere cihaz üreticileri ve kullanıcılar tarafından anlaşılması için önemli bir adımdır. Gelecekteki çalışmalarda, bu zayıflıkların giderilmesi ve güvenlik önlemlerinin etkin bir şekilde uygulanması için daha fazla araştırma yapılmasını gerekmektedir. Bu şekilde, kablosuz tıbbi cihazların güvenliği ve hasta güvenliği konusunda önemli bir ilerleme sağlanabilir.</p></abstract>
                                                                                                                                    <trans-abstract xml:lang="en">
                            <p>This paper addresses the issue of cybersecurity in wireless networked medical devices. The widespread use of wireless medical devices offers great advantages for monitoring and treating patients&#039; health conditions. However, these devices carry serious risks against cyber-attacks. Attackers who exploit these risks can compromise the devices, obtain patient data, or cause harm to patients&#039; health. Our research has revealed that cyber security vulnerabilities in wireless medical devices are caused by various factors, and recommendations are presented on how to take precautions against security weaknesses.  This paper is an important step towards understanding the security weaknesses in wireless medical devices and their potential impacts by regulators, institutional managers, device manufacturers and users. In future studies, further research is needed to address these weaknesses and to effectively implement security measures. In this way, significant progress can be made in the safety of wireless medical devices and patient safety.</p></trans-abstract>
                                                            
            
                                                            <kwd-group>
                                                    <kwd>&quot;kablosuz tıbbi cihazlar&quot;</kwd>
                                                    <kwd>  &quot;siber güvenlik&quot;</kwd>
                                                    <kwd>  &quot;tehditler&quot;</kwd>
                                                    <kwd>  &quot;önlemler&quot;</kwd>
                                                    <kwd>  &quot;standartlar&quot;</kwd>
                                            </kwd-group>
                                                        
                                                                            <kwd-group xml:lang="en">
                                                    <kwd>&quot;wireless medical devices&quot;</kwd>
                                                    <kwd>  &quot;cyber security&quot;</kwd>
                                                    <kwd>  &quot;threats&quot;</kwd>
                                                    <kwd>  &quot;measures&quot;</kwd>
                                                    <kwd>  &quot;standards</kwd>
                                            </kwd-group>
                                                                                                            </article-meta>
    </front>
    <back>
                            <ref-list>
                                    <ref id="ref1">
                        <label>1</label>
                        <mixed-citation publication-type="journal">Alsubaei, F., Abuhussein, A., Shandilya, V., ve Shiva, S. (2019). IoMT-SAF: Internet of medical things security assessment framework. Internet of Things, 8, 100123. https://doi.org/10.1016/j.iot.2019.100123</mixed-citation>
                    </ref>
                                    <ref id="ref2">
                        <label>2</label>
                        <mixed-citation publication-type="journal">Coventry, L., ve Branley, D. (2018). Cybersecurity in healthcare: A narrative review of trends, threats and ways forward. Maturitas, 113, 48-52. https://pubmed.ncbi.nlm.nih.gov/29903648/</mixed-citation>
                    </ref>
                                    <ref id="ref3">
                        <label>3</label>
                        <mixed-citation publication-type="journal">Deloitte. (2013). Networked medical device cybersecurity and patient safety: Perspectives of health care information. Deloitte. https://www2.deloitte.com/content/dam/Deloitte/us/Documents/life-sciences-healthcare/us-lhsc-networked-medical-device.pdf</mixed-citation>
                    </ref>
                                    <ref id="ref4">
                        <label>4</label>
                        <mixed-citation publication-type="journal">Denning, T., Fu, K. ve Kohno, T. (2008) Absence makes the heart grow fonder: New directions for implantable medical device security. In HotSec.</mixed-citation>
                    </ref>
                                    <ref id="ref5">
                        <label>5</label>
                        <mixed-citation publication-type="journal">Esposito, C., Santis, A., Tortora, G., Chang, H. ve Choo, K. (2018) Blockchain: A panacea for healthcare cloud-based data security and privacy? IEEE Cloud Computing, 5(1):31–37, 2018</mixed-citation>
                    </ref>
                                    <ref id="ref6">
                        <label>6</label>
                        <mixed-citation publication-type="journal">Garcia. (2017). Why cybersecurity must be part of medical device architecture. Medical Device and Diagnostic Industry Qmed. https://www.mddionline.com/</mixed-citation>
                    </ref>
                                    <ref id="ref7">
                        <label>7</label>
                        <mixed-citation publication-type="journal">Gollakota, S., Hassanieh, H., Ransford, B., Katabi, D., Fu K. (2011) They can hear your heartbeats: non-invasive security for implantable medical devices. In Proceedings of the ACM SIGCOMM conference, pages 2–13, 2011.</mixed-citation>
                    </ref>
                                    <ref id="ref8">
                        <label>8</label>
                        <mixed-citation publication-type="journal">Harit, H., Ezzati, A., &amp; Elharti, R. (2017). Internet of things security: Challenges and perspectives.ICC’17: Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing (ICC &#039;17),167, 1-8. https://doi.org/10.1145/3018896.3056784</mixed-citation>
                    </ref>
                                    <ref id="ref9">
                        <label>9</label>
                        <mixed-citation publication-type="journal">HHS. (2021). 2020: A retrospective look at healthcare cybersecurity. Department of Health and Human Services. Leadership for IT Security &amp; Privacy across HHS. HHS Cybersecurity Program. Office of Information Security. https://www.hhs.gov/sites/default/files/2020-hph-cybersecurty-retrospective-tlpwhite.pdf</mixed-citation>
                    </ref>
                                    <ref id="ref10">
                        <label>10</label>
                        <mixed-citation publication-type="journal">HIPAA Ransomware. (2017). Wannacry ransomware encrypted hospital medical devices. HIPAA Journal.com. https://www.hipaajournal.com/wannacry-ransomware-encryptedhospital-medical-devices-8811/</mixed-citation>
                    </ref>
                                    <ref id="ref11">
                        <label>11</label>
                        <mixed-citation publication-type="journal">Kovacs, E. (2014). 70 percent of iot devices vulnerable to cyberattacks: HP. Security Week. https://www.securityweek.com/70-iot-devices-vulnerable-cyberattacks-hp.</mixed-citation>
                    </ref>
                                    <ref id="ref12">
                        <label>12</label>
                        <mixed-citation publication-type="journal">Laurinda B Harman, Cathy A Flite, and Kesa Bond. Electronic health records:privacy, confidentiality, and security. AMA Journal of Ethics, 14(9):712–719, 2012.</mixed-citation>
                    </ref>
                                    <ref id="ref13">
                        <label>13</label>
                        <mixed-citation publication-type="journal">Li, H., Sun, G., Li, Y., &amp; Yang, R. (2021). Wearable wireless physiological monitoring system based on multi-sensor. Electronics, 10(9), 986. https://doi.org/10.3390/electronics10090986</mixed-citation>
                    </ref>
                                    <ref id="ref14">
                        <label>14</label>
                        <mixed-citation publication-type="journal">Maras, M.-H. (2015). Internet of Things: Security and privacy implications. International Data Privacy Law, 5(2), 99–104. https://doi.org/10.1093/idpl/ipv004</mixed-citation>
                    </ref>
                                    <ref id="ref15">
                        <label>15</label>
                        <mixed-citation publication-type="journal">Martin, G., Martin, P., Hankin, C., Darzi, A., &amp; Kinross, J. (2017). Cybersecurity and healthcare: How safe are we. BMJ. https://doi.org/10.1136/bmj.j3179</mixed-citation>
                    </ref>
                                    <ref id="ref16">
                        <label>16</label>
                        <mixed-citation publication-type="journal">McFarland, R. J., &amp; Olatunbosun, S. B. O. (2019). An exploratory study on the use of internet of medical things (iomt) in the healthcare industry and their associated cybersecurity risks. The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp). https://csce.ucmss.com/cr/books/2019/LFS/CSREA2019/ICM2519.pdf</mixed-citation>
                    </ref>
                                    <ref id="ref17">
                        <label>17</label>
                        <mixed-citation publication-type="journal">Miraz, M. H., Ali, M., Excell, P. S., &amp; Picking, R. (2018). Internet of nano-things, things and everything: Future growth trends. Future Internet, 10(8), 68. https://doi.org/10.3390/fi10080068</mixed-citation>
                    </ref>
                                    <ref id="ref18">
                        <label>18</label>
                        <mixed-citation publication-type="journal">Morgan, S. (2019). Patient insecurity: Explosion of the internet of medical things: How vulnerable is the iomt to cyber threats? CyberCrime Magazine. 119 https://cybersecurityventures.com/patient-insecurity-explosion-of-the-internet-ofmedical-things/</mixed-citation>
                    </ref>
                                    <ref id="ref19">
                        <label>19</label>
                        <mixed-citation publication-type="journal">Omolara, A. E., Alabdulatif, A., Abiodun, O. I., Alawida, M., Alabdulatif, A., Alshoura, W. H., &amp; Arshad, H. (2021). The internet of things security: A survey encompassing unexplored areas and new insights. Computers &amp; Security, 102494. https://doi.org/10.1016/j.cose.2021.102494</mixed-citation>
                    </ref>
                                    <ref id="ref20">
                        <label>20</label>
                        <mixed-citation publication-type="journal">Rathpre, H., Mohamed, A., Al-Ali, A., Du, X., ve Guizani, M. (2017). A review of security challenges, attacks and resolutions for wireless medical devices. In 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC), pages 1495–1501. IEEE, 2017.</mixed-citation>
                    </ref>
                                    <ref id="ref21">
                        <label>21</label>
                        <mixed-citation publication-type="journal">Sağlık Bakanlığı, (2019). Tıbbi Cihazlarda Alınması Gereken Güvenlik Önlemleri Dokümanı V.1.0 https://some.saglik.gov.tr/Eklenti/42923/0/tibbi-cihazlarda-alinacak-guvenlik-onlemleri-dokumani-v.docx</mixed-citation>
                    </ref>
                                    <ref id="ref22">
                        <label>22</label>
                        <mixed-citation publication-type="journal">Schumaker, E. (2020). Elon musk unveils brain chip implant: It&#039;s like a fitbit in your skull. ABC News (online). https://abcnews.go.com/Health/elon-musk-unveils-brain-chip-implantfitbit-skull/story?id=72703840</mixed-citation>
                    </ref>
                                    <ref id="ref23">
                        <label>23</label>
                        <mixed-citation publication-type="journal">Shah, K., (2019). Privacy and Security Issues of Wearables in Healthcare. Doktora Tezi, Flinders University, College of Science and Engineering.</mixed-citation>
                    </ref>
                                    <ref id="ref24">
                        <label>24</label>
                        <mixed-citation publication-type="journal">Steger, A. (2020). What makes iomt devices so difficult to secure? HealthTechmagazine.net. https://healthtechmagazine.net/article/2020/02/what-makes-iomt-devices-so-difficultsecure-perfcon</mixed-citation>
                    </ref>
                                    <ref id="ref25">
                        <label>25</label>
                        <mixed-citation publication-type="journal">Sun, W., Cai, Z., Li, Y., Liu, F., Fang, S., &amp; Wang, G. (2018). Security and privacy in the medical internet of things: A review. Security and Communication Networks, 2018, 5978636. https://doi.org/10.1155/2018/5978636</mixed-citation>
                    </ref>
                                    <ref id="ref26">
                        <label>26</label>
                        <mixed-citation publication-type="journal">Thielfoldt K. (2022). Internet of Medical Things Cybersecurity Vulnerabilities and Medical Professionals’ Cybersecurity Awareness: A Quantitative Study</mixed-citation>
                    </ref>
                                    <ref id="ref27">
                        <label>27</label>
                        <mixed-citation publication-type="journal">TrapX Research Labs. (2021). TrapX Anatomy of attack: MEDJACK.2: Hospitals under siege. https://www.trapx.com/wpcontent/uploads/2021/01/AOA_Report_TrapX_MEDJACK.2.pdf</mixed-citation>
                    </ref>
                                    <ref id="ref28">
                        <label>28</label>
                        <mixed-citation publication-type="journal">Tsiatsis, V., Karnouskos, S., Holler, J., Boyle, D., &amp; Mulligan, S. (2018). Internet of Things: Technologies and Applications for a New Age of Intelligence. Academic Press.</mixed-citation>
                    </ref>
                                    <ref id="ref29">
                        <label>29</label>
                        <mixed-citation publication-type="journal">Xu, F., Qin, Z., Tan, C., Wang, B., Li, Q. (2011) Imdguard: Securing implantable medical devices with the external wearable guardian. In 2011 Proceedings IEEE INFOCOM, pages 1862–1870. IEEE, 2011.</mixed-citation>
                    </ref>
                                    <ref id="ref30">
                        <label>30</label>
                        <mixed-citation publication-type="journal">Zhenge, J., Shen, Y., Zhang, Z., Wu, T., Zhang, G., &amp; Lu, H. (2013). Emerging wearable medical devices towards personalized healthcare. BodyNets &#039;13: Proceedings of the 8th International Conference on Body Area Networks, 2013, 427-431. https://eudl.eu/doi/10.4108/icst.bodynets.2013.253725</mixed-citation>
                    </ref>
                            </ref-list>
                    </back>
    </article>
