Skip to main content

2017 | OriginalPaper | Buchkapitel

12. Security for Cyber-Physical Systems in Healthcare

verfasst von : Kashif Saleem, Zhiyuan Tan, William Buchanan

Erschienen in: Health 4.0: How Virtualization and Big Data are Revolutionizing Healthcare

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The great leap forward of cyber-physical systems has made provision for future personalized medicine. However, these systems are prone to cyber attacks. To provide patients with secure and reliable healthcare experience, the security issues of cyber-physical systems should be thoughtfully studied and addressed. Thus, this chapter initiates a discussion on security for cyber-physical systems. The security issues with their core components, namely wireless body area network, Cloud computing, and 5G are discussed. This chapter also presents an analysis of the potential contribution of virtualization technologies on security enhancement.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat Collins FS, Varmus H (2015) A new initiative on precision medicine. New England J Med 372(9):793–795CrossRef Collins FS, Varmus H (2015) A new initiative on precision medicine. New England J Med 372(9):793–795CrossRef
4.
Zurück zum Zitat Choi JS, Zhou M (2010) Recent advances in wireless sensor networks for health monitoring. Int J Intell Control Syst 14:49–58 Choi JS, Zhou M (2010) Recent advances in wireless sensor networks for health monitoring. Int J Intell Control Syst 14:49–58
5.
Zurück zum Zitat Vervloet M, Linn AJ, van Weert JC, De Bakker DH, Bouvy M, Van Dijk L (2012) The effectiveness of interventions using electronic reminders to improve adherence to chronic medication: a systematic review of the literature. J Am Med Inform Assoc 19(5):696–704CrossRef Vervloet M, Linn AJ, van Weert JC, De Bakker DH, Bouvy M, Van Dijk L (2012) The effectiveness of interventions using electronic reminders to improve adherence to chronic medication: a systematic review of the literature. J Am Med Inform Assoc 19(5):696–704CrossRef
7.
Zurück zum Zitat Zhang Y, Qiu M, Tsai CW, Hassan MM, Alamri A (2015) Health-CPS: healthcare cyber-physical system assisted by cloud and big data Zhang Y, Qiu M, Tsai CW, Hassan MM, Alamri A (2015) Health-CPS: healthcare cyber-physical system assisted by cloud and big data
8.
Zurück zum Zitat IEEE Standards Association, 802.15. 6-2012 IEEE standards for local and metropolitan area networks–Part 15.6: Wireless Body Area Networks IEEE Standards Association, 802.15. 6-2012 IEEE standards for local and metropolitan area networks–Part 15.6: Wireless Body Area Networks
12.
Zurück zum Zitat Augustin A, Yi J, Clausen T, Townsley WM (2016) A study of LoRa: long range and low power networks for the internet of things. Sensors 16(9):1466CrossRef Augustin A, Yi J, Clausen T, Townsley WM (2016) A study of LoRa: long range and low power networks for the internet of things. Sensors 16(9):1466CrossRef
14.
Zurück zum Zitat Sun J, Zhu X, Zhang C, Fang (2012) Security and privacy for mobile health-care (m-Health) systems. In: Elsevier BV (ed) Handbook on securing cyber-physical critical infrastructure, pp 677–704. doi:10.1016/B978-0-12-415815-3.00027-3 Sun J, Zhu X, Zhang C, Fang (2012) Security and privacy for mobile health-care (m-Health) systems. In: Elsevier BV (ed) Handbook on securing cyber-physical critical infrastructure, pp 677–704. doi:10.​1016/​B978-0-12-415815-3.​00027-3
15.
Zurück zum Zitat Dariz L, Selvatici M, Ruggeri M, Abrishambaf R (2016) Smart and wearable wireless sensors: scenario analysis and communication issues. In: Proceedings of the 2016 IEEE international conference on industrial technology (ICIT), IEEE, pp 1938–1943. doi:10.1109/ICIT.2016.7475063 Dariz L, Selvatici M, Ruggeri M, Abrishambaf R (2016) Smart and wearable wireless sensors: scenario analysis and communication issues. In: Proceedings of the 2016 IEEE international conference on industrial technology (ICIT), IEEE, pp 1938–1943. doi:10.​1109/​ICIT.​2016.​7475063
18.
Zurück zum Zitat Advanced Pro Heath Jr RW, Honig M, Nagata S, Parkvall S, Soong AC (2016) LTE-Advanced Pro: part 3 [guest editorial]. IEEE Commun Mag 54(7):52–53 Advanced Pro Heath Jr RW, Honig M, Nagata S, Parkvall S, Soong AC (2016) LTE-Advanced Pro: part 3 [guest editorial]. IEEE Commun Mag 54(7):52–53
19.
Zurück zum Zitat Wu H, Cai J, Xiao H, Chen Y, Li YNR, Lu Z (2016) High-rank MIMO precoding for future LTE-Advanced Pro. In: Proceedings of the 2016 IEEE 83rd vehicular technology conference (VTC Spring), IEEE, pp 1–6 Wu H, Cai J, Xiao H, Chen Y, Li YNR, Lu Z (2016) High-rank MIMO precoding for future LTE-Advanced Pro. In: Proceedings of the 2016 IEEE 83rd vehicular technology conference (VTC Spring), IEEE, pp 1–6
21.
Zurück zum Zitat Agrawal VM, Chauhan H (2015) An overview of security issues in mobile ad hoc networks. Int J Comput En Sci 1:9–17. ISSN: 0976-6367 Agrawal VM, Chauhan H (2015) An overview of security issues in mobile ad hoc networks. Int J Comput En Sci 1:9–17. ISSN: 0976-6367
23.
Zurück zum Zitat Kang J, Adibi S (2015) A review of security protocols in mHealth wireless body area networks (WBAN). In: Communications in computer and Information Science, ed: Springer, Berlin, pp 61–83. doi:10.1007/978-3-319-19210-9_5 Kang J, Adibi S (2015) A review of security protocols in mHealth wireless body area networks (WBAN). In: Communications in computer and Information Science, ed: Springer, Berlin, pp 61–83. doi:10.​1007/​978-3-319-19210-9_​5
25.
Zurück zum Zitat Kart F, Miao G, Moser LE, Melliar-Smith P (2007) A distributed e-healthcare system based on the service oriented architecture. In: Proceedings of the IEEE International conference on services computing, SCC 2007, pp 652–659. doi:10.1109/SCC.2007.2 Kart F, Miao G, Moser LE, Melliar-Smith P (2007) A distributed e-healthcare system based on the service oriented architecture. In: Proceedings of the IEEE International conference on services computing, SCC 2007, pp 652–659. doi:10.​1109/​SCC.​2007.​2
26.
Zurück zum Zitat Egbogah EE, Fapojuwo AO (2011) A survey of system architecture requirements for health care-based wireless sensor setworks. Sensors 11:4875–4898. doi:10.3390/s110504875 CrossRef Egbogah EE, Fapojuwo AO (2011) A survey of system architecture requirements for health care-based wireless sensor setworks. Sensors 11:4875–4898. doi:10.​3390/​s110504875 CrossRef
28.
30.
Zurück zum Zitat Hayajneh T, Almashaqbeh G, Ullah S, Vasilakos AV (2014) A survey of wireless technologies coexistence in WBAN: analysis and open research issues. Wireless Netw 20:2165–2199. doi:10.1007/s11276-014-0736-8 CrossRef Hayajneh T, Almashaqbeh G, Ullah S, Vasilakos AV (2014) A survey of wireless technologies coexistence in WBAN: analysis and open research issues. Wireless Netw 20:2165–2199. doi:10.​1007/​s11276-014-0736-8 CrossRef
33.
Zurück zum Zitat Saleem K, Derhab A, Orgun MA, Al-Muhtadi J, Rodrigues JJ, Khalil MS, Ali Ahmed A (2016) Cost-effective encryption-based autonomous routing protocol for efficient and secure wireless sensor networks. Sensors 16(4):460CrossRef Saleem K, Derhab A, Orgun MA, Al-Muhtadi J, Rodrigues JJ, Khalil MS, Ali Ahmed A (2016) Cost-effective encryption-based autonomous routing protocol for efficient and secure wireless sensor networks. Sensors 16(4):460CrossRef
35.
Zurück zum Zitat Suo H et al (2012) Security in the internet of things: a review. In: Proceedings of the 2012 international conference on computer science and electronics engineering (ICCSEE) Suo H et al (2012) Security in the internet of things: a review. In: Proceedings of the 2012 international conference on computer science and electronics engineering (ICCSEE)
36.
Zurück zum Zitat Schneider P, Horn G (2015) Towards 5G security. In: Trustcom/BigDataSE/ISPA, 2015 IEEE Schneider P, Horn G (2015) Towards 5G security. In: Trustcom/BigDataSE/ISPA, 2015 IEEE
37.
Zurück zum Zitat Schneider D (2012) The state of network security. Netw Security 2012(2):14–20CrossRef Schneider D (2012) The state of network security. Netw Security 2012(2):14–20CrossRef
38.
Zurück zum Zitat Sergey S, Sieber M, Norden M (2015) Azure RMS security evaluation guide. Microsoft Sergey S, Sieber M, Norden M (2015) Azure RMS security evaluation guide. Microsoft
39.
Zurück zum Zitat Dowlin N, Gilad-Bachrach R, Laine K, Lauter K, MNaehrig M, Wernsing J (2015) Manual for using homomorphic encryption for bioinformatics. Microsoft Research Dowlin N, Gilad-Bachrach R, Laine K, Lauter K, MNaehrig M, Wernsing J (2015) Manual for using homomorphic encryption for bioinformatics. Microsoft Research
40.
Zurück zum Zitat Naveed M, Kamara S, Wright CV (2015) Inference attacks on property-preserving encrypted databases. In: Proceedings of the 22nd ACM SIGSAC conference on computer and communications security—CCS’15, pp 644–655 Naveed M, Kamara S, Wright CV (2015) Inference attacks on property-preserving encrypted databases. In: Proceedings of the 22nd ACM SIGSAC conference on computer and communications security—CCS’15, pp 644–655
41.
Zurück zum Zitat Chen L, Jordan S, Liu Y-K, Moody D, Peralta R, Perlner R, Smith-Tone D (2016) NISTIR 8105 Draft—Report on post-quantum cryptography Chen L, Jordan S, Liu Y-K, Moody D, Peralta R, Perlner R, Smith-Tone D (2016) NISTIR 8105 Draft—Report on post-quantum cryptography
42.
Zurück zum Zitat Reimsbach-Kounatze C (2015) The proliferation of ‘Big Data’ and implications for official statistics and statistical agencies. Christian Reimsbach-Kounatze Reimsbach-Kounatze C (2015) The proliferation of ‘Big Data’ and implications for official statistics and statistical agencies. Christian Reimsbach-Kounatze
43.
Zurück zum Zitat Leimbach T, Hallinan D, Bachlechner D, Weber A, Jaglo M, Hennen L, Nielsen RØ, Nentwich M, Strauß S, Lynn T, Hunt G (2014) Potential and impacts of cloud computing services and social network websites Leimbach T, Hallinan D, Bachlechner D, Weber A, Jaglo M, Hennen L, Nielsen RØ, Nentwich M, Strauß S, Lynn T, Hunt G (2014) Potential and impacts of cloud computing services and social network websites
44.
Zurück zum Zitat Khattak HAK, Abbass H, Naeem A, Saleem K, Iqbal W (2015) Security concerns of cloud-based healthcare systems: a perspective of moving from single-cloud to a multi-cloud infrastructure. In: Proceedings of the 2015 17th international conference on e-health networking, application and services (HealthCom), IEEE, pp 61–67 Khattak HAK, Abbass H, Naeem A, Saleem K, Iqbal W (2015) Security concerns of cloud-based healthcare systems: a perspective of moving from single-cloud to a multi-cloud infrastructure. In: Proceedings of the 2015 17th international conference on e-health networking, application and services (HealthCom), IEEE, pp 61–67
45.
Zurück zum Zitat Sajid A, Abbas H, Saleem K (2016) Cloud-assisted IoT-based SCADA systems security: a review of the state of the art and future challenges. IEEE Access 4:1375–1384CrossRef Sajid A, Abbas H, Saleem K (2016) Cloud-assisted IoT-based SCADA systems security: a review of the state of the art and future challenges. IEEE Access 4:1375–1384CrossRef
46.
Zurück zum Zitat Mitra RN, Agrawal DP (2015) 5G mobile technology: a survey. ICT Express 1(3):132–137CrossRef Mitra RN, Agrawal DP (2015) 5G mobile technology: a survey. ICT Express 1(3):132–137CrossRef
47.
Zurück zum Zitat Gupta A, Jha RK (2015) A survey of 5G network: architecture and emerging technologies. IEEE Access 3:1206–1232CrossRef Gupta A, Jha RK (2015) A survey of 5G network: architecture and emerging technologies. IEEE Access 3:1206–1232CrossRef
48.
Zurück zum Zitat Bleicher A (2013) The 5G phone future [News]. IEEE Spectr 50(7):15–16CrossRef Bleicher A (2013) The 5G phone future [News]. IEEE Spectr 50(7):15–16CrossRef
49.
Zurück zum Zitat West DM (2016) How 5G technology enables the health internet of things West DM (2016) How 5G technology enables the health internet of things
50.
Zurück zum Zitat Zheng J et al (2013) Emerging wearable medical devices towards personalized healthcare. In: Proceedings of the 8th international conference on body area networks. ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), Boston, Massachusetts, pp 427–431 Zheng J et al (2013) Emerging wearable medical devices towards personalized healthcare. In: Proceedings of the 8th international conference on body area networks. ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), Boston, Massachusetts, pp 427–431
51.
Zurück zum Zitat Ojanen T (2016) Making the essence of fundamental rights real: the court of justice of the European Union clarifies the structure of fundamental rights under the charter. Eur Const Law Rev 12(02):318–329CrossRef Ojanen T (2016) Making the essence of fundamental rights real: the court of justice of the European Union clarifies the structure of fundamental rights under the charter. Eur Const Law Rev 12(02):318–329CrossRef
52.
Zurück zum Zitat Ferrer-Roca O, Méndez DG (2012) Health 4.0 in the i2i Era. Int J Reliable Qual E-Healthc (IJRQEH) 1(1): 43–57 Ferrer-Roca O, Méndez DG (2012) Health 4.0 in the i2i Era. Int J Reliable Qual E-Healthc (IJRQEH) 1(1): 43–57
53.
Zurück zum Zitat Abdelwahab S et al (2016) Network function virtualization in 5G. IEEE Comm Mag 54(4):84–91CrossRef Abdelwahab S et al (2016) Network function virtualization in 5G. IEEE Comm Mag 54(4):84–91CrossRef
54.
Zurück zum Zitat Hakiri A, Berthou P (2015) Leveraging SDN for the 5G networks, in software defined mobile networks (SDMN). Wiley, New York, pp 61–80 Hakiri A, Berthou P (2015) Leveraging SDN for the 5G networks, in software defined mobile networks (SDMN). Wiley, New York, pp 61–80
56.
Zurück zum Zitat Agyapong PK et al (2014) Design considerations for a 5G network architecture. IEEE Comm Mag 52(11):65–75CrossRef Agyapong PK et al (2014) Design considerations for a 5G network architecture. IEEE Comm Mag 52(11):65–75CrossRef
57.
Zurück zum Zitat Sgandurra D, Lupu E (2016) Evolution of attacks, threat models, and solutions for virtualized systems. ACM Comput Surv 48(3):1–38CrossRef Sgandurra D, Lupu E (2016) Evolution of attacks, threat models, and solutions for virtualized systems. ACM Comput Surv 48(3):1–38CrossRef
60.
Zurück zum Zitat Liyanage M et al (2015) Leveraging LTE security with SDN and NFV. In: Proceedings of the 2015 IEEE 10th international conference on industrial and information systems (ICIIS) Liyanage M et al (2015) Leveraging LTE security with SDN and NFV. In: Proceedings of the 2015 IEEE 10th international conference on industrial and information systems (ICIIS)
61.
Zurück zum Zitat Yan Z, Zhang P, Vasilakos AV (2015) A security and trust framework for virtualized networks and software-defined networking. Security Comm Netw, Security and communication networks. doi:10.1002/sec.1243 Yan Z, Zhang P, Vasilakos AV (2015) A security and trust framework for virtualized networks and software-defined networking. Security Comm Netw, Security and communication networks. doi:10.​1002/​sec.​1243
62.
Zurück zum Zitat Andress J, Winterfeld S (2014) Chapter 10—Computer network attack, in cyber warfare. Syngress, Boston, pp 181–192 (Second Edition) Andress J, Winterfeld S (2014) Chapter 10—Computer network attack, in cyber warfare. Syngress, Boston, pp 181–192 (Second Edition)
Metadaten
Titel
Security for Cyber-Physical Systems in Healthcare
verfasst von
Kashif Saleem
Zhiyuan Tan
William Buchanan
Copyright-Jahr
2017
DOI
https://doi.org/10.1007/978-3-319-47617-9_12

Neuer Inhalt