Extending the IIC IoT Security Maturity Model to Trustworthiness
Figure 3: IoT Security Maturity Model Hierarchy Revised and Extended for Trustworthiness
impact to patients as well as the high costs
of implanting and removing them to correct
issues. A specific application of the
trustworthiness model to a pacemaker can
provide a case study for the applicability of
extending the IoT Security Maturity Model
to trustworthiness.
E XAMPLE A PPLICATION : P ACEMAKER
H EALTH C ARE C ASE S TUDY
Manufacturers of implanted medical devices
are especially concerned about the
trustworthiness of their devices due to the
potentially large, possibly life-threatening,
- 112 -
IIC Journal of Innovation