Cyber Attacks on Healthcare Devices Using Unmanned Aerial Vehicles

The growing use of wireless technology in healthcare systems and devices makes these systems particularly open to cyber-based attacks, including denial of service and information theft via sniffing (eaves-dropping) and phishing attacks. Evolving technology enables wireless healthcare systems to communicate over longer ranges, which opens them up to greater numbers of possible threats. Unmanned aerial vehicles (UAV) or drones present a new and evolving attack surface for compromising wireless healthcare systems. An enumeration of the types of wireless attacks capable via drones are presented, including two new types of cyber threats: a stepping stone attack and a cloud-enabled attack. A real UAV is developed to test and demonstrate the vulnerabilities of healthcare systems to this new threat vector. The UAV successfully attacked a simulated smart hospital environment and also a small collection of wearable healthcare sensors. Compromise of wearable or implanted medical devices can lead to increased morbidity and mortality.

[1]  Kevin Fu,et al.  Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).

[2]  David C Klonoff,et al.  Cybersecurity for Connected Diabetes Devices , 2015, Journal of diabetes science and technology.

[3]  Kevin Fu,et al.  Security and Privacy for Implantable Medical Devices , 2008, IEEE Pervasive Comput..

[4]  Wenyuan Xu,et al.  WALNUT: Waging Doubt on the Integrity of MEMS Accelerometers with Acoustic Injection Attacks , 2017, 2017 IEEE European Symposium on Security and Privacy (EuroS&P).

[5]  Georgios Kambourakis,et al.  Intrusion Detection in 802.11 Networks: Empirical Evaluation of Threats and a Public Dataset , 2016, IEEE Communications Surveys & Tutorials.

[6]  Eric J Topol,et al.  Can mobile health technologies transform health care? , 2013, JAMA.

[7]  Selwyn Piramuthu,et al.  Internet of Things (IoT) in high-risk Environment, Health and Safety (EHS) industries: A comprehensive review , 2018, Decis. Support Syst..

[8]  George Loukas,et al.  A Review of Cyber Threats and Defence Approaches in Emergency Management , 2013, Future Internet.

[9]  Wenyuan Xu,et al.  Risks of trusting the physics of sensors , 2018, Commun. ACM.

[10]  Danilo De Donno,et al.  An IoT-Aware Architecture for Smart Healthcare Systems , 2015, IEEE Internet of Things Journal.

[11]  Ming Li,et al.  Data security and privacy in wireless body area networks , 2010, IEEE Wireless Communications.

[12]  Judy E. Scott,et al.  Models for Drone Delivery of Medications and Other Healthcare Items , 2018, Int. J. Heal. Inf. Syst. Informatics.

[13]  Nir Nissim,et al.  Keep an eye on your personal belongings! The security of personal medical devices and their ecosystems , 2019, J. Biomed. Informatics.

[14]  Mehmet A. Orgun,et al.  Ideas and Challenges for Securing Wireless Implantable Medical Devices: A Review , 2017, IEEE Sensors Journal.

[15]  Juan E. Tapiador,et al.  Security and privacy issues in implantable medical devices: A comprehensive survey , 2015, J. Biomed. Informatics.

[16]  Weiqing Sun,et al.  Cyber security threat analysis and modeling of an unmanned aerial vehicle system , 2012, 2012 IEEE Conference on Technologies for Homeland Security (HST).

[17]  Sebastian Magierowski,et al.  Vehicle Routing Problems for Drone Delivery , 2016, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[18]  Ingrid Moerman,et al.  A Comprehensive Survey of Wireless Body Area Networks , 2012, Journal of Medical Systems.

[19]  Robert C. Wolpert,et al.  A Review of the , 1985 .

[20]  Alan Borning,et al.  Patients, pacemakers, and implantable defibrillators: human values and security for wireless implantable medical devices , 2010, CHI.

[21]  Kyung Sup Kwak,et al.  Security and Privacy Issues in Wireless Sensor Networks for Healthcare Applications , 2010, Journal of Medical Systems.

[22]  Jörg Ott,et al.  Security and Privacy in Device-to-Device (D2D) Communication: A Review , 2017, IEEE Communications Surveys & Tutorials.

[23]  Amr M. Youssef,et al.  Security Tradeoffs in Cyber Physical Systems: A Case Study Survey on Implantable Medical Devices , 2016, IEEE Access.

[24]  Neal Leavitt,et al.  Researchers Fight to Keep Implanted Medical Devices Safe from Hackers , 2010, Computer.

[25]  C. Gandhi,et al.  Packet Sniffer – A Comparative Study , 2014 .

[26]  L. Piwek,et al.  The Rise of Consumer Health Wearables: Promises and Barriers , 2016, PLoS medicine.

[27]  Michael Hanspach,et al.  On Covert Acoustical Mesh Networks in Air , 2014, J. Commun..

[28]  T. Kohno,et al.  Improving the security and privacy of implantable medical devices. , 2010, The New England journal of medicine.

[29]  Roman L. Lysecky,et al.  Security challenges for medical devices , 2015, Commun. ACM.

[30]  Peter C. Salmon,et al.  Mobile Bot Swarms: They're closer than you might think! , 2015, IEEE Consumer Electronics Magazine.

[31]  Geng Yang,et al.  Wearable Internet of Things: Concept, architectural components and promises for person-centered healthcare , 2014 .

[32]  Niraj K. Jha,et al.  Hijacking an insulin pump: Security attacks and defenses for a diabetes therapy system , 2011, 2011 IEEE 13th International Conference on e-Health Networking, Applications and Services.

[33]  Misha Pavel,et al.  Advancing the Science of mHealth , 2012, Journal of health communication.

[34]  Kyung-Sup Kwak,et al.  The Internet of Things for Health Care: A Comprehensive Survey , 2015, IEEE Access.

[35]  Yang Lu,et al.  Smart Hospital based on Internet of Things , 2012, J. Networks.

[36]  Akhilesh Tyagi,et al.  Using Power Clues to Hack IoT Devices: The power side channel provides for instruction-level disassembly. , 2017, IEEE Consumer Electronics Magazine.

[37]  Aleksandar Milenkovic,et al.  System architecture of a wireless body area sensor network for ubiquitous health monitoring , 2005 .

[38]  Ahmad Roshidi Amran,et al.  WarBox: Portable wardriving over Raspberry PI , 2016, 2016 International Conference on Information and Communication Technology (ICICTM).

[39]  Ralf Philipsen,et al.  Droning on About Drones—Acceptance of and Perceived Barriers to Drones in Civil Usage Contexts , 2017 .