| Literature DB >> 33059076 |
Subrat Das1, Gregory P Siroky2, Shawn Lee2, Davendra Mehta2, Ranjit Suri3.
Abstract
Remote monitoring of cardiac implantable electronic devices (CIEDs) has become routine practice as a result of the advances in biomedical engineering, the advent of interconnectivity between the devices through the Internet, and the demonstrated improvement in patient outcomes, survival, and hospitalizations. However, this increased dependency on the Internet of Things comes with risks in the form of cybersecurity lapses and possible attacks. Although no cyberattack leading to patient harm has been reported to date, the threat is real and has been demonstrated in research laboratory scenarios and echoed in patient concerns. The CIED universe comprises a complex interplay of devices, connectivity protocols, and sensitive information flow between the devices and the central cloud server. Various manufacturers use proprietary software and black-box connectivity protocols that are susceptible to hacking. Here we discuss the fundamentals of the CIED ecosystem, the potential security vulnerabilities, a historical overview of such vulnerabilities reported in the literature, and recommendations for improving the security of the CIED ecosystem and patient safety.Entities:
Keywords: Cardiac implantable electronic device; Cybersecurity; Data security; Hacking; Remote monitoring
Mesh:
Year: 2020 PMID: 33059076 PMCID: PMC7550052 DOI: 10.1016/j.hrthm.2020.10.009
Source DB: PubMed Journal: Heart Rhythm ISSN: 1547-5271 Impact factor: 6.343
Figure 1Schematic diagram showing how remote information is transmitted from a patient’s cardiac implantable electronic device (CIED) to the health care provider. Starting from the patient, information uploaded from the patient’s CIED to the home monitoring system is transmitted to a central archiving system, which then uploads the information to the physician’s office. Once the physician/care team reviews the uploaded data, they can reach out to the patient to discuss necessary treatment options. RF = radiofrequency. (Illustrated by Dr Shawn Lee.)
Attack scenarios, vulnerability explored, and possible harm done
| Attack scenario | Vulnerability explored/technique used | Possible harm |
|---|---|---|
| CIED–monitor communication interception | Intercepting RF signal with SDR | Stealing patient information |
| Extraction of health data stored in monitor | Connecting to debugging ports | Stealing patient information |
| Insertion of malware into monitor | MITM attack during firmware update | Causing dysfunction of the monitor |
| Reading into monitor file system | Connecting to USB port and accessing unencrypted drives on the monitor | Stealing patient information |
| Introduction of calibration error in the CIED | Injecting malware through RF commands, especially during home monitor–CIED interaction via the CIED or programmer | Inappropriate reading of patient rhythms |
| Keeping CIED telemetry session open indefinitely | Sending repeated RF signal using SDR | Decreasing device longevity by draining the battery |
| Insertion of malware into CIED | Sending unauthorized RF signals using SDR | Inserting a faulty algorithm that can prevent appropriate shock or cause inappropriate shock to the patient, causing harm |
| CIED–programmer communication interception | Intercepting RF signals with SDR | Stealing patient information |
| Reading into programmer file system | Intercepting communication between programmer and central server, especially during firmware update process | Stealing patient information |
| Insertion of malware into programmer | MITM attack during update session | Stealing patient information |
| Unauthorized access to cloud server | Exploring DDoS attack | Massive data breach with potential to affect thousands of patients |
CIED = cardiac implantable electronic device; DDoS = distributed denial of service; MITM = man in the middle; RF = radiofrequency; SDR = software-defined radio; USB = universal serial bus.
Figure 2Office scenario in which an office programmer is used to read from/write to the cardiac implantable electronic device. Security vulnerabilities inherent to the process are highlighted. ICT = inductive coil telemetry; RF = radiofrequency; SDR = software-defined radio. (Illustrated by Dr Shawn Lee.)
Figure 3Timeline of cybersecurity events reported by security experts and the Food and Drug Administration (FDA), and the corrective measures taken by device manufacturers. CIED = cardiac implantable electronic device; ICD = implantable cardioverter-defibrillator; PPM = permanent pacemaker. (Illustrated by Dr Shawn Lee.)
Figure 4Cardiac implantable electronic device ecosystem, hacker motives and methods, and various players involved in keeping the ecosystem secure. (Illustrated by Dr Shawn Lee.)