Skip to main content

2020 | OriginalPaper | Buchkapitel

Cybersecurity Technologies for the Internet of Medical Wearable Devices (IoMWD)

verfasst von : Raluca Maria Aileni, George Suciu, Carlos Alberto Valderrama Sukuyama, Sever Pasca, Rajagopal Maheswar

Erschienen in: Advances in Cyber Security Analytics and Decision Systems

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This book chapter presents several aspects regarding software and hardware vulnerabilities of the wearable medical devices, cyberattacks and security technologies for IoMWD, and cloud attacks. In the context of the increased confidence granted wearable devices for medical diagnosis or as a personal assistant for people with disabilities, a big problem is represented by the insured safety devices both at the level of the logic of data and hardware for correct operation of the wearable devices. The trust on these devices envisages this problem by people aged between 20 and 65 years in the context of the dull-witted market growth at almost 70 billion users of personalized medicine in 2025. Because personalized medicine through wearable devices involves network connection, IoMWD, sensitive personal data, and diagnostics or recipes, it is a massive risk in stealing personal data, disrupting networks, and corrupting communication in order to exploit the wearable vulnerabilities to damage the system and cause chaos. Also, for cyber threats, disruption-tolerant networking, data anonymization, and secure authentication could be used as mitigation.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Al Ameen, M., & Kwak, K. S. (2011). Social issues in wireless sensor networks with healthcare perspective. International Arab Journal of Information Technology, 8(1), 52–58. Al Ameen, M., & Kwak, K. S. (2011). Social issues in wireless sensor networks with healthcare perspective. International Arab Journal of Information Technology, 8(1), 52–58.
Zurück zum Zitat Ammar, M., Russello, G., & Crispo, B. (2018). Internet of things: A survey on the security of IoT frameworks. Journal of Information Security and Applications, 38, 8–27.CrossRef Ammar, M., Russello, G., & Crispo, B. (2018). Internet of things: A survey on the security of IoT frameworks. Journal of Information Security and Applications, 38, 8–27.CrossRef
Zurück zum Zitat Anliker, U., Ward, J., Lukowicz, P., Troster, G., Dolveck, F., Baer, M., Keita, F., Schenker, E., Catarsi, F., Coluccini, L., Belardinelli, A., Shklarski, D., Alon, M., Hirt, E., Schmid, R., & Vuskovic, M. (2004). AMON: A wearable multiparameter medical monitoring and alert system. IEEE Transactions on Information Technology in Biomedicine, 8(4), 415–427.CrossRef Anliker, U., Ward, J., Lukowicz, P., Troster, G., Dolveck, F., Baer, M., Keita, F., Schenker, E., Catarsi, F., Coluccini, L., Belardinelli, A., Shklarski, D., Alon, M., Hirt, E., Schmid, R., & Vuskovic, M. (2004). AMON: A wearable multiparameter medical monitoring and alert system. IEEE Transactions on Information Technology in Biomedicine, 8(4), 415–427.CrossRef
Zurück zum Zitat Anwar, M., Joshi, J., & Tan, J. (2015). Anytime, anywhere access to secure, privacy-aware healthcare services: Issues, approaches and challenges. Health Policy and Technology, 4(4), 299–311.CrossRef Anwar, M., Joshi, J., & Tan, J. (2015). Anytime, anywhere access to secure, privacy-aware healthcare services: Issues, approaches and challenges. Health Policy and Technology, 4(4), 299–311.CrossRef
Zurück zum Zitat Asada, H. H., Shaltis, P., Reisner, A., Rhee, S., & Hutchinson, R. C. (2003). Mobile monitoring with wearable photoplethysmographic biosensors. IEEE Engineering in Medicine and Biology Magazine, 22(3), 28–40.CrossRef Asada, H. H., Shaltis, P., Reisner, A., Rhee, S., & Hutchinson, R. C. (2003). Mobile monitoring with wearable photoplethysmographic biosensors. IEEE Engineering in Medicine and Biology Magazine, 22(3), 28–40.CrossRef
Zurück zum Zitat Bacis, E., De Capitani di Vimercati, S., Foresti, S., Paraboschi, S., Rosa, M., & Samarati, P. (2016). Mix&Slice: Efficient access revocation in the cloud. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (pp. 217–228). New York: ACM. Bacis, E., De Capitani di Vimercati, S., Foresti, S., Paraboschi, S., Rosa, M., & Samarati, P. (2016). Mix&Slice: Efficient access revocation in the cloud. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (pp. 217–228). New York: ACM.
Zurück zum Zitat Boesen, P. V., & Dragicevic, D. (2018). Wireless earpieces utilizing a mesh network. U.S. Patent Application 15/905, 322. Boesen, P. V., & Dragicevic, D. (2018). Wireless earpieces utilizing a mesh network. U.S. Patent Application 15/905, 322.
Zurück zum Zitat Brookson, C., Cadzow, S., Eckmaier, R., Eschweiler, J., Gerber, B., Guarino, A., Rannenberg, K., Shamah, J., & Gorniak, S. (2016). Definition of cybersecurity-gaps and overlaps in standardisation. Heraklion: ENISA. Brookson, C., Cadzow, S., Eckmaier, R., Eschweiler, J., Gerber, B., Guarino, A., Rannenberg, K., Shamah, J., & Gorniak, S. (2016). Definition of cybersecurity-gaps and overlaps in standardisation. Heraklion: ENISA.
Zurück zum Zitat Cyr, B., Horn, W., Miao, D., & Specter, M. (2014). Security analysis of wearable fitness devices (fitbit) (Vol. 1). Cambridge, MA: Massachusetts Institute of Technology. Cyr, B., Horn, W., Miao, D., & Specter, M. (2014). Security analysis of wearable fitness devices (fitbit) (Vol. 1). Cambridge, MA: Massachusetts Institute of Technology.
Zurück zum Zitat Dantu, R., Dissanayake, I., & Nerur, S. (2019). Exploratory analysis of internet of things (IoT) in healthcare: A topic modeling approach. Proceedings of the 52nd Hawaii International Conference on System Sciences. Dantu, R., Dissanayake, I., & Nerur, S. (2019). Exploratory analysis of internet of things (IoT) in healthcare: A topic modeling approach. Proceedings of the 52nd Hawaii International Conference on System Sciences.
Zurück zum Zitat Dey, N., Ashour, A. S., Shi, F., Fong, S. J., & Tavares, J. M. R. (2018). Medical cyber-physical systems: A survey. Journal of Medical Systems, 42(4), 74.CrossRef Dey, N., Ashour, A. S., Shi, F., Fong, S. J., & Tavares, J. M. R. (2018). Medical cyber-physical systems: A survey. Journal of Medical Systems, 42(4), 74.CrossRef
Zurück zum Zitat Endler, M., Silva, A., & Cruz, R. A. (2017). An approach for secure edge computing in the Internet of Things. In 2017 1st Cyber Security in Networking Conference (CSNet) (pp. 1–8). Piscataway: IEEE. Endler, M., Silva, A., & Cruz, R. A. (2017). An approach for secure edge computing in the Internet of Things. In 2017 1st Cyber Security in Networking Conference (CSNet) (pp. 1–8). Piscataway: IEEE.
Zurück zum Zitat Farahani, B., Firouzi, F., Chang, V., Badaroglu, M., Constant, N., & Mankodiya, K. (2018). Towards fog-driven IoT eHealth: Promises and challenges of IoT in medicine and healthcare. Future Generation Computer Systems, 78, 659–676.CrossRef Farahani, B., Firouzi, F., Chang, V., Badaroglu, M., Constant, N., & Mankodiya, K. (2018). Towards fog-driven IoT eHealth: Promises and challenges of IoT in medicine and healthcare. Future Generation Computer Systems, 78, 659–676.CrossRef
Zurück zum Zitat Haghi, M., Thurow, K., & Stoll, R. (2017). Wearable devices in medical internet of things: Scientific research and commercially available devices. Healthcare Informatics Research, 23(1), 4–15.CrossRef Haghi, M., Thurow, K., & Stoll, R. (2017). Wearable devices in medical internet of things: Scientific research and commercially available devices. Healthcare Informatics Research, 23(1), 4–15.CrossRef
Zurück zum Zitat Hiremath, S., Yang, G., & Mankodiya, K. (2014). Wearable internet of things: Concept, architectural components and promises for person-centered healthcare. Proceedings of the 4th International Conference on Wireless Mobile Communication and Healthcare – “Transforming healthcare through innovations in mobile and wireless technologies”. Hiremath, S., Yang, G., & Mankodiya, K. (2014). Wearable internet of things: Concept, architectural components and promises for person-centered healthcare. Proceedings of the 4th International Conference on Wireless Mobile Communication and Healthcare – “Transforming healthcare through innovations in mobile and wireless technologies”.
Zurück zum Zitat Koydemir, H., & Ozcan, A. (2018). Wearable and implantable sensors for biomedical applications. Annual Review of Analytical Chemistry, 11(1), 127–146.CrossRef Koydemir, H., & Ozcan, A. (2018). Wearable and implantable sensors for biomedical applications. Annual Review of Analytical Chemistry, 11(1), 127–146.CrossRef
Zurück zum Zitat Langone, M., Setola, R., & Lopez, J. (2017). Cybersecurity of wearable devices: An experimental analysis and a vulnerability assessment method. In 2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC) (Vol. 2, pp. 304–309). Piscataway: IEEE.CrossRef Langone, M., Setola, R., & Lopez, J. (2017). Cybersecurity of wearable devices: An experimental analysis and a vulnerability assessment method. In 2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC) (Vol. 2, pp. 304–309). Piscataway: IEEE.CrossRef
Zurück zum Zitat Lin, J., Yu, W., Zhang, N., Yang, X., Zhang, H., & Zhao, W. (2017). A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications. IEEE Internet of Things Journal, 4(5), 1125–1142.CrossRef Lin, J., Yu, W., Zhang, N., Yang, X., Zhang, H., & Zhao, W. (2017). A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications. IEEE Internet of Things Journal, 4(5), 1125–1142.CrossRef
Zurück zum Zitat Lounis, A., Hadjidj, A., Bouabdallah, A., & Challal, Y. (2016). Healing on the cloud: Secure cloud architecture for medical wireless sensor networks. Future Generation Computer Systems, 55, 266–277.CrossRef Lounis, A., Hadjidj, A., Bouabdallah, A., & Challal, Y. (2016). Healing on the cloud: Secure cloud architecture for medical wireless sensor networks. Future Generation Computer Systems, 55, 266–277.CrossRef
Zurück zum Zitat Mankodiya, K., Hassan, Y. A., Vogt, S., Gehring, H., & Hofmann, U. G. (2010). Wearable ECG module for long-term recordings using a smartphone processor. Proceedings of the 5th International Workshop on Ubiquitous Health and Wellness, Copenhagen, Denmark (Vol. 2629). Mankodiya, K., Hassan, Y. A., Vogt, S., Gehring, H., & Hofmann, U. G. (2010). Wearable ECG module for long-term recordings using a smartphone processor. Proceedings of the 5th International Workshop on Ubiquitous Health and Wellness, Copenhagen, Denmark (Vol. 2629).
Zurück zum Zitat Mansfield-Devine, S. (2016). Ransomware: Taking businesses hostage. Network Security, 2016(10), 8–17.CrossRef Mansfield-Devine, S. (2016). Ransomware: Taking businesses hostage. Network Security, 2016(10), 8–17.CrossRef
Zurück zum Zitat Martin, G., Martin, P., Hankin, C., Darzi, A., & Kinross, J. (2017). Cybersecurity and healthcare: How safe are we? BMJ, 358, j3179.CrossRef Martin, G., Martin, P., Hankin, C., Darzi, A., & Kinross, J. (2017). Cybersecurity and healthcare: How safe are we? BMJ, 358, j3179.CrossRef
Zurück zum Zitat Mathie, M., Coster, A., Lovell, N., & Celler, B. (2003). Detection of daily physical activities using a triaxial accelerometer. Medical & Biological Engineering & Computing, 41(3), 296–301.CrossRef Mathie, M., Coster, A., Lovell, N., & Celler, B. (2003). Detection of daily physical activities using a triaxial accelerometer. Medical & Biological Engineering & Computing, 41(3), 296–301.CrossRef
Zurück zum Zitat Meingast, M., Roosta, T., & Sastry, S. (2006). Security and privacy issues with health care information technology. In 2006 International Conference of the IEEE Engineering in Medicine and Biology Society (pp. 5453–5458). Piscataway: IEEE.CrossRef Meingast, M., Roosta, T., & Sastry, S. (2006). Security and privacy issues with health care information technology. In 2006 International Conference of the IEEE Engineering in Medicine and Biology Society (pp. 5453–5458). Piscataway: IEEE.CrossRef
Zurück zum Zitat Monisha, K., & Babu, M. R. (2018). A novel framework for healthcare monitoring system through. In Internet of things and personalized healthcare systems. Puchong, Singapore: Springer. Monisha, K., & Babu, M. R. (2018). A novel framework for healthcare monitoring system through. In Internet of things and personalized healthcare systems. Puchong, Singapore: Springer.
Zurück zum Zitat Monisha, K., & Babu, M. R. (2019). A novel framework for healthcare monitoring system through cyber-physical system. In Internet of things and personalized healthcare systems (pp. 21–36). Puchong, Singapore: Springer.CrossRef Monisha, K., & Babu, M. R. (2019). A novel framework for healthcare monitoring system through cyber-physical system. In Internet of things and personalized healthcare systems (pp. 21–36). Puchong, Singapore: Springer.CrossRef
Zurück zum Zitat Pan, J., & Yang, Z. (2018). Cybersecurity challenges and opportunities in the new edge computing + IoT world. In Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization (pp. 29–32). New York: ACM. Pan, J., & Yang, Z. (2018). Cybersecurity challenges and opportunities in the new edge computing + IoT world. In Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization (pp. 29–32). New York: ACM.
Zurück zum Zitat Piggin, R. (2017). Cybersecurity of medical devices: Addressing patient safety and the security of patient health information. BSI Group, Macquarie Park, Australia, White Paper. Piggin, R. (2017). Cybersecurity of medical devices: Addressing patient safety and the security of patient health information. BSI Group, Macquarie Park, Australia, White Paper.
Zurück zum Zitat Qureshi, F., & Krishnan, S. (2018). Wearable hardware design for the internet of medical things (IoMT). Sensors (Basel, Switzerland), 18(11), 3812.CrossRef Qureshi, F., & Krishnan, S. (2018). Wearable hardware design for the internet of medical things (IoMT). Sensors (Basel, Switzerland), 18(11), 3812.CrossRef
Zurück zum Zitat Roetenberg, D. (2006). Inertial and magnetic sensing of human motion. University of Twente. Roetenberg, D. (2006). Inertial and magnetic sensing of human motion. University of Twente.
Zurück zum Zitat Seoane, F., Ferreira, J., Alvarez, L., Buendia, R., Ayllón, D., Llerena, C., & Gil-Pita, R. (2013). Sensorized garments and textrode-enabled measurement instrumentation for ambulatory assessment of the autonomic nervous system response in the ATREC project. Sensors, 13(7), 8997–9015.CrossRef Seoane, F., Ferreira, J., Alvarez, L., Buendia, R., Ayllón, D., Llerena, C., & Gil-Pita, R. (2013). Sensorized garments and textrode-enabled measurement instrumentation for ambulatory assessment of the autonomic nervous system response in the ATREC project. Sensors, 13(7), 8997–9015.CrossRef
Zurück zum Zitat Stanley, N., & Coderre, M. (2016). An introduction to medical device cyber security: A European perspective. Stanley, N., & Coderre, M. (2016). An introduction to medical device cyber security: A European perspective.
Zurück zum Zitat Sun, W., Cai, Z., Li, Y., Liu, F., Fang, S., & Wang, G. (2018). Security and privacy in the medical internet of things: A review. Security and Communication Networks, 2018, 1–9. Sun, W., Cai, Z., Li, Y., Liu, F., Fang, S., & Wang, G. (2018). Security and privacy in the medical internet of things: A review. Security and Communication Networks, 2018, 1–9.
Zurück zum Zitat Xu, S., Zhang, Y., Jia, L., Mathewson, K., Jang, K., Kim, J., Fu, H., Huang, X., Chava, P., Wang, R., Bhole, S., Wang, L., Na, Y., Guan, Y., Flavin, M., Han, Z., Huang, Y., & Rogers, J. (2014). Soft microfluidic assemblies of sensors, circuits, and radios for the skin. Science, 344(6179), 70–74.CrossRef Xu, S., Zhang, Y., Jia, L., Mathewson, K., Jang, K., Kim, J., Fu, H., Huang, X., Chava, P., Wang, R., Bhole, S., Wang, L., Na, Y., Guan, Y., Flavin, M., Han, Z., Huang, Y., & Rogers, J. (2014). Soft microfluidic assemblies of sensors, circuits, and radios for the skin. Science, 344(6179), 70–74.CrossRef
Zurück zum Zitat Yang, G., Xie, L., Mantysalo, M., Zhou, X., Pang, Z., Xu, L., Kao-Walter, S., Chen, Q., & Zheng, L. (2014). A health-IoT platform based on the integration of intelligent packaging, unobtrusive bio-sensor, and intelligent medicine box. IEEE Transactions on Industrial Informatics, 10(4), 2180–2191.CrossRef Yang, G., Xie, L., Mantysalo, M., Zhou, X., Pang, Z., Xu, L., Kao-Walter, S., Chen, Q., & Zheng, L. (2014). A health-IoT platform based on the integration of intelligent packaging, unobtrusive bio-sensor, and intelligent medicine box. IEEE Transactions on Industrial Informatics, 10(4), 2180–2191.CrossRef
Zurück zum Zitat Zhao, Y. (2016). Identity-concealed authenticated encryption and key exchange. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (pp. 1464–1479). New York: ACM. Zhao, Y. (2016). Identity-concealed authenticated encryption and key exchange. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (pp. 1464–1479). New York: ACM.
Metadaten
Titel
Cybersecurity Technologies for the Internet of Medical Wearable Devices (IoMWD)
verfasst von
Raluca Maria Aileni
George Suciu
Carlos Alberto Valderrama Sukuyama
Sever Pasca
Rajagopal Maheswar
Copyright-Jahr
2020
DOI
https://doi.org/10.1007/978-3-030-19353-9_6

Neuer Inhalt