| Literature DB >> 32093089 |
Mariam Ibrahim1, Ahmad Alsheikh2, Aseel Matar3.
Abstract
Remote health monitoring systems are used to audit implantable medical devices or patients' health in a non-clinical setting. These systems are prone to cyberattacks exploiting their critical vulnerabilities. Thus, threatening patients' health and confidentiality. In this paper, a pacemaker automatic remote monitoring system (PARMS) is modeled using architecture analysis and design language (AADL), formally characterized, and checked using the JKind model checker tool. The generated attack graph is visualized using the Graphviz tool, and classifies security breaches through the violation of the security features of significance. The developed attack graph showed the essentiality of setting up appropriate security measures in PARMS.Entities:
Keywords: internet of things (IoT) medical devices; pacemaker; threat modeling; vulnerabilities
Year: 2020 PMID: 32093089 PMCID: PMC7168278 DOI: 10.3390/bios10020014
Source DB: PubMed Journal: Biosensors (Basel) ISSN: 2079-6374
Cyberattack incidents in the medical field.
| Date | Country | Name | Description |
|---|---|---|---|
| August 2011 | United States | Medtronic insulin-delivery system | Hacked the insulin pump and completely disabled it [ |
| 2008 | United States | Cardiac defibrillator | Hacked cardiac defibrillatorto change the device’s settings, ordering it to deliver a shock, and disabling it [ |
| 2017 | United Kingdom | 16 United Kingdom hospitals | Freezing systems and encrypting files [ |
| 2014 | United States | Boston Children’s Hospital | Caused the hospital network to lose internet access using distributed Denial of Service (DoS) attack [ |
| January, 2015 | United States | Anthem | Breached a database with 80 million customers records [ |
| July, 2018 | England | National Health Service (NHS) | A data breach caused the NHS to share confidential health data of 150,000 patients [ |
| June, 2018 | Singapore | SingHealth | The data of 1.5 million patients were stolen [ |
| 2019 | United States | NeuroSky 156 brain–computer interface application | Victims’ brain wave data were stolen [ |
Figure 1pacemaker automatic remote monitoring system (PARMS).
Figure 2Cyber-attack scenarios implementation workflow. AADL: architecture analysis and design language, CE: counter example.
Figure 3CE1 spreadsheet.
Figure 4PARMS generated attack graph. MA: Malware Injection, SE: Social Engineering, IG: Intelligent Gathering, MiM: Man-in-the-Middle, SQL: SQL Injection, S: Sniffing, PV: Pivoting, PS: Phishing, HS: Home Monitoring Device, PN: Patient Support Network, AP: Access Point, PP: Physician Programmer pHS: Attacker level of privilege on HS, phi: Attacker level of privilege on host i, di: Data identification of component i; ki: Confidential data disclosure of component i, ei: Data alteration of component i.