Security Analysis and a Potential Layer to Layer Security Solution of Medical Cyber-Physical Systems

Cyber-Physical Systems (CPS) is feedback systems that are a concoction of closely integrated physical processes, communication and computation which interacts with the human through various modalities. It is developed as the censorious infrastructure in the different implementing platform and has the perspective to influence our day to day life. The applications of these systems vary from the power grid, communication, and transportation to health care and many more. There is an exponential growth of Medical Cyber-Physical Systems (MCPS). In MCPS, the cyber aspects are embodied in the analyzing computer and the communications to the Internet. Moreover, the cyber-physical countenance interacts directly with the patients. The patient represents the physical perspective with regards to therapeutic devices. CPS has an impact on different aspects of the medical system. However, it has a plethora of security challenges in this field of application. Various threats and attacks have been newly introduced for MCPS. Security becomes a top concern for MCPS. Progress in technology has made it important to develop a new proposition for security. In this chapter, we present a security analysis of Medical Cyber-Physical System and provide a layer to layer solution to the security issues and recapitulate the security issues of MCPS from independent perspectives.

[1]  Ayan Banerjee,et al.  Ensuring Safety, Security, and Sustainability of Mission-Critical Cyber–Physical Systems , 2012, Proceedings of the IEEE.

[2]  Eduard Ayguadé,et al.  AXIOM: A Hardware-Software Platform for Cyber Physical Systems , 2016, 2016 Euromicro Conference on Digital System Design (DSD).

[3]  Ling Shi,et al.  Jamming attack on Cyber-Physical Systems: A game-theoretic approach , 2013, 2013 IEEE International Conference on Cyber Technology in Automation, Control and Intelligent Systems.

[4]  Dhiren Patel,et al.  A Survey on Internet of Things: Security and Privacy Issues , 2014 .

[5]  Liviu Miclea,et al.  About dependability in cyber-physical systems , 2011, 2011 9th East-West Design & Test Symposium (EWDTS).

[6]  Kai Zhao,et al.  A Survey on the Internet of Things Security , 2013, 2013 Ninth International Conference on Computational Intelligence and Security.

[7]  Long Cheng,et al.  On Threat Modeling and Mitigation of Medical Cyber-Physical Systems , 2017, 2017 IEEE/ACM International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE).

[8]  Mostafa Azizi,et al.  Review on security issues in RFID systems , 2017 .

[9]  Mehmet K. Aktas,et al.  Emerging Security Mechanisms for Medical Cyber Physical Systems , 2016, IEEE/ACM Transactions on Computational Biology and Bioinformatics.

[10]  Reza Ebrahimi Atani,et al.  A Comparison of Link Layer Attacks on Wireless Sensor Networks , 2011, J. Information Security.

[11]  Walid Taha,et al.  Developing A First Course on Cyber-Physical Systems , 2014, WESE'14.

[12]  Félix J. García Clemente,et al.  Sustainable securing of Medical Cyber-Physical Systems for the healthcare of the future , 2018, Sustain. Comput. Informatics Syst..

[13]  Zhang,et al.  Security Architecture on the Trusting Internet of Things , 2011 .

[14]  Anupam Joshi,et al.  Security in Sensor Networks , 2020, Texts in Computer Science.

[15]  David A. Wagner,et al.  Security in wireless sensor networks , 2004, SASN '04.

[16]  Imran A. Zualkernan,et al.  Internet of things (IoT) security: Current status, challenges and prospective measures , 2015, 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST).

[17]  Xu Jin,et al.  An adaptive control architecture for cyber-physical system security in the face of sensor and actuator attacks and exogenous stochastic disturbances , 2018 .

[18]  Radu Marculescu,et al.  Eavesdropping Minimization via Transmission Power Control in Ad-Hoc Wireless Networks , 2006, 2006 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks.

[19]  Jiang Li,et al.  Attacks and Countermeasures in Sensor Networks: A Survey , 2010 .

[20]  Refik Molva,et al.  Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.

[21]  Ciprian-Radu Rad,et al.  Smart Monitoring of Potato Crop: A Cyber-Physical System Architecture Model in the Field of Precision Agriculture , 2015 .

[22]  G. Padmavathi,et al.  A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks , 2009, ArXiv.

[23]  Wade Trappe,et al.  The challenges facing physical layer security , 2015, IEEE Communications Magazine.

[24]  Ioan Dumitrache,et al.  Agricultural Enterprise as a Complex System: A Cyber Physical Systems Approach , 2015, 2015 20th International Conference on Control Systems and Computer Science.

[25]  Athanasios V. Vasilakos,et al.  Security of the Internet of Things: perspectives and challenges , 2014, Wireless Networks.

[26]  Juan E. Tapiador,et al.  RFID Systems: A Survey on Security Threats and Proposed Solutions , 2006, PWC.

[27]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[28]  Delia Ioana Dogaru,et al.  Cyber-physical systems in healthcare networks , 2015, 2015 E-Health and Bioengineering Conference (EHB).

[29]  Kalpana Sharma,et al.  Wireless Sensor Networks: An Overview on its Security Threats , 2010 .

[30]  Jean-Yves Le Boudec,et al.  Nodes bearing grudges: towards routing security, fairness, and robustness in mobile ad hoc networks , 2002, Proceedings 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing.

[31]  Maede Ashouri-Talouki,et al.  DoS, impersonation and de-synchronization attacks against an ultra-lightweight RFID mutual authentication protocol for IoT , 2017, The Journal of Supercomputing.

[32]  Jie Gao,et al.  Detecting Wormhole Attacks in Wireless Networks Using Connectivity Information , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[33]  Radha Poovendran,et al.  Node capture attacks in wireless sensor networks: A system theoretic approach , 2010, 49th IEEE Conference on Decision and Control (CDC).

[34]  Frank Vahid,et al.  A Survey on Concepts, Applications, and Challenges in Cyber-Physical Systems , 2014, KSII Trans. Internet Inf. Syst..

[35]  Sarmad Ullah Khan,et al.  Future Internet: The Internet of Things Architecture, Possible Applications and Key Challenges , 2012, 2012 10th International Conference on Frontiers of Information Technology.

[36]  Qusay H. Mahmoud,et al.  Cyber physical systems security: Analysis, challenges and solutions , 2017, Comput. Secur..

[37]  Insup Lee,et al.  Medical Cyber Physical Systems , 2010, Design Automation Conference.

[38]  Albert Y. Zomaya,et al.  Security Issues in Wireless Sensor Networks , 2006, 2006 International Conference on Systems and Networks Communications (ICSNC'06).

[39]  Khushboo Gupta,et al.  Design Issues and Challenges in Wireless Sensor Networks , 2015 .

[40]  Edward A. Lee Cyber Physical Systems: Design Challenges , 2008, 2008 11th IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (ISORC).

[41]  David A. Wagner,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.

[42]  Nikolaos Papakonstantinou,et al.  Common cause failure analysis of cyber–physical systems situated in constructed environments , 2013, Research in Engineering Design.

[43]  Kazuaki Murakami,et al.  A Smart Cyber-physical Systems-Based Solution for Pest Control (Work in Progress) , 2013, 2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing.

[44]  Lui Sha,et al.  A framework for the safe interoperability of medical devices in the presence of network failures , 2010, ICCPS '10.

[45]  Yang Li,et al.  A Security Architecture in Cyber-Physical Systems: Security Theories, Analysis, Simulation and Application Fields , 2015 .

[46]  Levent Gürgen,et al.  Self-aware cyber-physical systems and applications in smart buildings and cities , 2013, 2013 Design, Automation & Test in Europe Conference & Exhibition (DATE).

[47]  Rutuja Jadhav,et al.  Security Issues and Solutions in Wireless Sensor Networks , 2017 .

[48]  Michail Maniatakos,et al.  Cyber-physical systems: A security perspective , 2015, 2015 20th IEEE European Test Symposium (ETS).

[49]  Umar Mujahid,et al.  RCIA: A New Ultralightweight RFID Authentication Protocol Using Recursive Hash , 2015, Int. J. Distributed Sens. Networks.

[50]  Nilanjan Dey,et al.  Medical cyber-physical systems: A survey , 2018, Journal of Medical Systems.

[51]  Liang Hu,et al.  Review of Cyber-Physical System Architecture , 2012, 2012 IEEE 15th International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing Workshops.

[52]  Qaisar Shafi,et al.  Cyber Physical Systems Security: A Brief Survey , 2012, 2012 12th International Conference on Computational Science and Its Applications.

[53]  Syed Hassan Ahmed,et al.  Cyber Physical System: Architecture, applications and research challenges , 2013, 2013 IFIP Wireless Days (WD).

[54]  Richard Candell,et al.  Towards a systematic threat modeling approach for cyber-physical systems , 2015, 2015 Resilience Week (RWS).

[55]  Shahzad Sarwar,et al.  A New Ultralightweight RFID Authentication Protocol for Passive Low Cost Tags: KMAP , 2017, Wirel. Pers. Commun..

[56]  Christos G. Cassandras,et al.  Smart Cities as Cyber-Physical Social Systems , 2016 .

[57]  Jiafu Wan,et al.  A survey of Cyber-Physical Systems , 2011, 2011 International Conference on Wireless Communications and Signal Processing (WCSP).

[58]  Tianbo Lu,et al.  Cyber-physical System Risk Assessment , 2013, 2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[59]  Rina Bhattacharya A COMPARATIVE STUDY OF PHYSICAL ATTACKS ON WIRELESS SENSOR NETWORKS , 2013 .

[60]  Piyush Maheshwari,et al.  Security Issues of Cyber Physical System: A Review , 2016 .

[61]  Jiafu Wan,et al.  Security in the Internet of Things: A Review , 2012, 2012 International Conference on Computer Science and Electronics Engineering.

[62]  Tim Kerins,et al.  Public-Key Cryptography for RFID-Tags , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07).

[63]  Ruttikorn Varakulsiripunth,et al.  Detecting Sinkhole attacks in wireless sensor networks , 2009, 2009 ICCAS-SICE.

[64]  Choong Seon Hong,et al.  Security in wireless sensor networks: issues and challenges , 2006, 2006 8th International Conference Advanced Communication Technology.

[65]  Yu-Ting Li,et al.  A Cyber-Physical Management System for Delivering and Monitoring Surgical Instruments in the OR , 2013, Surgical innovation.

[66]  Srdjan Capkun,et al.  Self-organization in mobile ad hoc networks: the approach of Terminodes , 2001, IEEE Commun. Mag..