Proposing a modeling framework for minimizing security vulnerabilities in IoT systems in the healthcare domain

As the use of and reliance on IoT devices grows within the public domain, there is an equivalent dependence on due diligence taken to the design and development of IoT devices entering the medical and healthcare domains. Coupled with the growth of data passed through these embedded systems, there is a clear and potential danger in having these IoT devices and networks not be held to the same rigorous standards of design as other industrial-level technology. In this paper we address the issue of poor security design and implementation in medical IoT devices by proposing the use of existing modeling software (AADL) as a method of standardization of medical IoT device development.

[1]  Holger Giese,et al.  Combining Requirements, Use Case Maps and AADL Models for Safety-Critical Systems Design , 2016, 2016 42th Euromicro Conference on Software Engineering and Advanced Applications (SEAA).

[2]  Paul A. Wortman,et al.  Evolving authentication design considerations for the Internet of biometric things (IoBT) , 2016, 2016 International Conference on Hardware/Software Codesign and System Synthesis (CODES+ISSS).

[3]  Wlodek Kulesza,et al.  Wirelessly interfacing objects and subjects of healthcare system - IoT approach , 2016 .

[4]  Ann Gordon-Ross,et al.  Microprocessor Optimizations for the Internet of Things: A Survey , 2016, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.

[5]  Chih-Yao Chuang,et al.  Scheduling Low-Utilized Real-Time Systems with End-to-End Timing Constraints , 2016, 2016 IEEE 22nd International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA).

[6]  Ashutosh Shinde Challenges in performance monitoring of hyper connected IoT systems , 2016, 2016 International Conference on Internet of Things and Applications (IOTA).

[7]  Kevin Fu,et al.  Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).

[8]  Grant Hernandez,et al.  Smart Nest Thermostat A Smart Spy in Your Home , 2014 .

[9]  Ann Gordon-Ross,et al.  Microprocessor Optimizations for the Internet of Things , 2016, ArXiv.

[10]  Julien Delange,et al.  A Requirement Specification Language for AADL , 2016 .

[11]  Myron Hecht,et al.  Automated generation of failure modes and effects analysis for a medical device , 2015, 2015 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW).

[12]  K. Natarajan Smart Health Care System Using Internet of Things , 2016 .

[13]  Lui Sha,et al.  Model-Based Analysis of Wireless System Architectures for Real-Time Applications , 2013, IEEE Transactions on Mobile Computing.

[14]  Yunwei Dong,et al.  Hybrid annex: an AADL extension for continuous behavior and cyber-physical interaction modeling , 2014, HILT '14.

[15]  Francisco Vasques,et al.  A framework to support dependability evaluation of WSNs from AADL models , 2015, 2015 IEEE 20th Conference on Emerging Technologies & Factory Automation (ETFA).

[16]  Bart Preneel,et al.  On the (in)security of the latest generation implantable cardiac defibrillators and how to secure them , 2016, ACSAC.

[17]  William Bradley Glisson,et al.  Compromising a Medical Mannequin , 2015, AMCIS.