| Literature DB >> 29796233 |
Hoon Ko1, Libor Měsíček2, Jongsun Choi3, Seogchan Hwang4.
Abstract
Many hospitals and medical clinics have been using a wearable sensor in its health care system because the wearable sensor, which is able to measure the patients' biometric information, has been developed to analyze their patients remotely. The measured information is saved to a server in a medical center, and the server keeps the medical information, which also involves personal information, on a cloud system. The server and network devices are used by connecting each other, and sensitive medical records are dealt with remotely. However, these days, the attackers, who try to attack the server or the network systems, are increasing. In addition, the server and the network system have a weak protection and security policy against the attackers. In this paper, it is suggested that security compliance of medical contents should be followed to improve the level of security. As a result, the medical contents are kept safely.Entities:
Mesh:
Year: 2018 PMID: 29796233 PMCID: PMC5896203 DOI: 10.1155/2018/6410180
Source DB: PubMed Journal: J Healthc Eng ISSN: 2040-2295 Impact factor: 2.682
Figure 1Patient registration form.
Damage records.
| Date | Damage |
|---|---|
| February 14, 2013, Froedtert Hosp, USA | Acquiring privilege by inserting a malicious code into an employee's PC, leaking about 43,000 patients' personal information such as patient personal insurance certificate, card information, and social security number. |
|
| |
| Barnaby Jack, 2012, RSA Conference, USA | The hacker approaches the patient using an insulin pump and exploits the vulnerability of the small computer inside the insulin pump. |
|
| |
| Korea, 2013 | (i) Collecting various medical information from a domestic hospital using an overseas server. |
Threats to medical contents.
| Threats | Contents |
|---|---|
| Repudiation | (i) Cannot receive data from a source outside the trust boundary. Consider using logging or auditing to record the source, time, and summary. |
|
| |
| Tampering | (i) Subject to a persistent cross-site scripting attack because it does not sanitize data storage “device” inputs/outputs and to cross-site scripting attacks. |
|
| |
| Spoofing | (i) Be spoofed by an attacker, leading to information disclosure. Consider using a standard authentication mechanism to identify the destination process. |
|
| |
| DDoS | (i) A DDoS attack to a server, which connects to a user device, a biosensor, will be a potential threat that makes a service impossible. |
|
| |
| Information disclosure | (i) Data flowing across generic dataflow may be sniffed by an attacker. It can be used to attack other parts of the system or simply be a disclosure of information leading to compliance violations. |
|
| |
| Eavesdropping/forgery | (i) Attack to personal information and medical records which transfers between a biosensor and a server, a medical system and a server, or a user device and a server. |
Figure 2Security process with DRM.
Requirement to lightweight process.
| Items | Contents |
|---|---|
| Code size | Because a sensor is a small device and has a limitation, the algorithm should have a small size for it to run, achieved by reducing the number of code line. |
| Security strength | To process, the structure will be compacted; however, the encryption strength has to be kept strong. |
| Fast speed | The code should be optimized to speed up by decreasing the number of code lines and by removing useless codes. |
| Low energy consumption | To use IoT devices, a sensor usually uses an encryption algorithm, but the devices which are used in a home health care system have a limitation of having a small size, so low energy consumption is necessary, which may be achieved by decreasing the number of rounds in the encryption. |