Availability Models of the Healthcare Internet of Things System Taking into Account Countermeasures Selection

An active infiltration of information technology in the healthcare sector has led to a fundamental change in people’s quality of life. Networked medical and healthcare devices and their applications are already creating an Internet of Medical Things which is aimed at better health monitoring and preventive care. But the new concepts and applying of new technologies bring certain risks including failures of devices, infrastructure which may lead to the worst outcome. In this regard, the security and safety problems of this technology using increase rapidly. This paper touches upon the issue of the healthcare Internet of Things (IoT) infrastructure failures and attacks on components and complete system. The purpose of the paper is to develop and research the availability models of a healthcare IoT system regarding failures and attacks on components. A detailed analysis of an architecture of healthcare IoT infrastructure is given. The main causes of the healthcare IoT based system failures are considered. This paper presents an approach to develop a Markov models set for a healthcare IoT infrastructure that allows considering safety and security issues. Much attention is given to developing and research of the Markov model of a healthcare IoT system considering failures of components. The analysis of obtained simulation results showed the rates that have the greatest influence on the availability function of the healthcare IoT system. In addition, it is presented a case study with a game theoretical approach to select countermeasure tools.

[1]  Anika Ashok,et al.  Guidance for Industry by U.S. Department of Health and Human Services—Food and Drug Administration—Center for Biologics Evaluation and Research (CBER)—February 1999 , 2009 .

[2]  Anastasiia Strielkina,et al.  Modelling of healthcare IoT using the queueing theory , 2017, 2017 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS).

[3]  Mirjana Maksimovic,et al.  A custom Internet of Things healthcare system , 2015, 2015 10th Iberian Conference on Information Systems and Technologies (CISTI).

[4]  Reza Rafeh,et al.  Towards the Design of Safety-Critical Software , 2013 .

[5]  Guillaume Bouzillé,et al.  Insulin Pump Failures: Has There Been an Improvement? Update of a Prospective Observational Study. , 2016, Diabetes technology & therapeutics.

[6]  Peter Friess,et al.  Internet of Things: Converging Technologies for Smart Environments and Integrated Ecosystems , 2013 .

[7]  Jeffrey M. Voas,et al.  Building Caring Healthcare Systems in the Internet of Things , 2018, IEEE Systems Journal.

[8]  Daniel Sun,et al.  Reliability and energy efficiency in cloud computing systems: Survey and taxonomy , 2016, J. Netw. Comput. Appl..

[9]  Vyacheslav Kharchenko,et al.  Reliability and Security Issues for IoT-based Smart Business Center: Architecture and Markov Model , 2016, 2016 Third International Conference on Mathematics and Computers in Sciences and in Industry (MCSI).

[10]  Kishor S. Trivedi,et al.  Markov Modeling in Reliability , 2014 .

[11]  Pascale Carayon,et al.  Using failure mode and effects analysis to plan implementation of smart i.v. pump technology. , 2006, American journal of health-system pharmacy : AJHP : official journal of the American Society of Health-System Pharmacists.

[12]  Yi Zhang,et al.  A Hazard Analysis for a Generic Insulin Infusion Pump , 2010, Journal of diabetes science and technology.

[13]  Muhammad Waseem,et al.  A Critical Analysis on the Security Concerns of Internet of Things (IoT) , 2015 .

[14]  Fengjun Li,et al.  Cyber-Physical Systems Security—A Survey , 2017, IEEE Internet of Things Journal.

[15]  Kyung-Sup Kwak,et al.  The Internet of Things for Health Care: A Comprehensive Survey , 2015, IEEE Access.

[16]  David C Klonoff,et al.  Insulin Pump Safety Meeting: Summary Report , 2009, Journal of diabetes science and technology.

[17]  William H. Sanders,et al.  Model-based evaluation: from dependability to security , 2004, IEEE Transactions on Dependable and Secure Computing.

[18]  Vyacheslav S. Kharchenko,et al.  Analysis of Methods for Providing Availability and Accessibility of Cloud Services , 2016, ICTERI.

[19]  Ong Bi Lynn,et al.  Internet of Things (IoT): Taxonomy of security attacks , 2016, 2016 3rd International Conference on Electronic Design (ICED).

[20]  Anastasiia Strielkina,et al.  Availability models for healthcare IoT systems: Classification and research considering attacks on vulnerabilities , 2018, 2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT).

[21]  Katerina Goseva-Popstojanova,et al.  Architecture-based approach to reliability assessment of software systems , 2001, Perform. Evaluation.

[22]  Geir M. Køien,et al.  Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks , 2015, J. Cyber Secur. Mobil..

[23]  Chase Qishi Wu,et al.  A Survey of Game Theory as Applied to Network Security , 2010, 2010 43rd Hawaii International Conference on System Sciences.

[24]  Ravishankar K. Iyer,et al.  Game Theory with Learning for Cyber Security Monitoring , 2016, 2016 IEEE 17th International Symposium on High Assurance Systems Engineering (HASE).