Attack-Tree Based Risk Assessment on Cloud-Oriented Wireless Body Area Network

Machine-to-machine (M2M) communication is an emerging technology with unrivaled benefits in the fields of e Health and m-Health. The wireless body area networks (WBANs) consist of a major subdomain of M2M communications. The WBANs coupled with the Cloud Computing (CC) paradigm introduce a supreme infrastructure in terms of performance and Quality of Services (QoS) for the development of eHealth applications. In this article, a risk assessment aiming to disclose potential threats and highlight exploitation of health care services, is introduced. The proposed assessment is based upon the implementation of a series of steps. Initially, the health care WBAN-CC infrastructure is scrutinized; then, its threats' taxonomy is identified. Then, a risk assessment is carried out based on an attack-tree consisting of the most hazardous threats against Personally Identifiable Information (PII) disclosure. Thus, the implementation of several countermeasures is realized as a means to mitigate gaps.

[1]  Sanjay Kumar Madria,et al.  A Risk Assessment Framework for Wireless Sensor Networks in a Sensor Cloud , 2015, 2015 16th IEEE International Conference on Mobile Data Management.

[2]  Asma A. Shaikh Attacks on cloud computing and its countermeasures , 2016, 2016 International Conference on Signal Processing, Communication, Power and Embedded System (SCOPES).

[3]  Al-Sakib Khan Pathan,et al.  Wireless Networks and Security, Issues, Challenges and Research Trends , 2013, Wireless Networks and Security.

[4]  샤나즈 A Study of IEEE 802.15.4 Security Framework for Wireless Body Area Network , 2011 .

[5]  Barry Irwin,et al.  A privacy and security threat assessment framework for consumer health wearables , 2017, Information Security for South Africa.

[6]  Jianhua Li,et al.  Proposed Security Mechanism for XMPP-Based Communications of ISO/IEC/IEEE 21451 Sensor Networks , 2015, IEEE Sensors Journal.

[7]  Farrukh Aslam Khan,et al.  A Cloud-based Healthcare Framework for Security and Patients' Data Privacy Using Wireless Body Area Networks , 2014, FNC/MobiSPC.

[8]  Naseer Amara,et al.  Cloud Computing Security Threats and Attacks with Their Mitigation Techniques , 2017, 2017 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC).

[9]  Kyung Sup Kwak,et al.  A Study of IEEE 802.15.4 Security Framework for Wireless Body Area Networks , 2011, Sensors.

[10]  Rajani S. Sajjan,et al.  Ransomware attacks: Radical menace for cloud computing , 2017, 2017 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET).

[11]  Kim-Kwang Raymond Choo,et al.  Cloud Attack and Risk Assessment Taxonomy , 2015, IEEE Cloud Computing.

[12]  Ravi Sankar,et al.  A Survey of Intrusion Detection Systems in Wireless Sensor Networks , 2014, IEEE Communications Surveys & Tutorials.

[13]  Minho Jo,et al.  A survey: energy exhausting attacks in MAC protocols in WBANs , 2015, Telecommun. Syst..

[14]  Manisha J. Nene,et al.  SEDoS-7: A proactive mitigation approach against EDoS attacks in cloud computing , 2017, 2017 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET).

[15]  Frank Piessens,et al.  Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2 , 2017, CCS.

[16]  Jean-Marie Bonnin,et al.  Wireless sensor networks: a survey on recent developments and potential synergies , 2013, The Journal of Supercomputing.

[17]  Abbas Jamalipour,et al.  Wireless Body Area Networks: A Survey , 2014, IEEE Communications Surveys & Tutorials.

[18]  Priyanka Kakria,et al.  A Real-Time Health Monitoring System for Remote Cardiac Patients Using Smartphone and Wearable Sensors , 2015, International journal of telemedicine and applications.

[19]  Victor C. M. Leung,et al.  Trust and Risk Assessment Approach for Access Control in Wireless Sensor Networks , 2013, 2013 IEEE 78th Vehicular Technology Conference (VTC Fall).

[20]  Samaher Al-Janabi,et al.  Survey of main challenges (security and privacy) in wireless body area networks for healthcare applications , 2017 .

[21]  Azeddine Bilami,et al.  Big Data Challenges and Data Aggregation Strategies in Wireless Sensor Networks , 2018, IEEE Access.