Security challenges in pervasive wireless medical systems and devices

Medical systems are designed for a range of end users from different professional skill groups and also people who carry the devices in and on their bodies. Open, accurate and efficient communication is the priority for medical systems and as a consequence strong protection costs are traded against the utility benefits for open systems. In this paper we assess the vulnerabilities created by the professional and end user expectations, and theorized ways to mitigate wireless risks. The benefits of wireless medical services are great in terms of efficiencies, mobility and information management. These benefits may be realized by treating the vulnerabilities and reducing the cost of adverse events.

[1]  Shadi R. Masadeh,et al.  A study of secure deployment of wireless technology in the medical fields , 2010, ISWSA '10.

[2]  Christophe Veltsos Mitigating the Blended Threat: Protecting Data and Educating Users , 2011 .

[3]  M. Petkovic Remote patient monitoring: Information reliability challenges , 2009, 2009 9th International Conference on Telecommunication in Modern Satellite, Cable, and Broadcasting Services.

[4]  Ashraf Darwish,et al.  Wearable and Implantable Wireless Sensor Network Solutions for Healthcare Monitoring , 2011, Sensors.

[5]  Mehmet Rasit Yuce,et al.  Wireless Body Area Networks: Technology, Implementation, and Applications , 2011 .

[6]  T. Kohno,et al.  Improving the security and privacy of implantable medical devices. , 2010, The New England journal of medicine.

[7]  Kevin Fu,et al.  Design challenges for secure implantable medical devices , 2012, DAC Design Automation Conference 2012.

[8]  Vimla L. Patel,et al.  Using usability heuristics to evaluate patient safety of medical devices , 2003, J. Biomed. Informatics.

[9]  H. S. Ng,et al.  Security issues of wireless sensor networks in healthcare applications , 2006 .

[10]  Andrew Meneely,et al.  Challenges for protecting the privacy of health information: required certification can leave common vulnerabilities undetected , 2010, SPIMACS '10.

[11]  Kevin Fu,et al.  Security and Privacy Qualities of Medical Devices: An Analysis of FDA Postmarket Surveillance , 2012, PloS one.

[12]  A. Sagahyroon,et al.  Monitoring patients' signs wirelessly , 2011, 2011 1st Middle East Conference on Biomedical Engineering.

[13]  Sheila E. Frankel,et al.  Establishing Wireless Robust Security Networks: A Guide to IEEE 802.11i , 2007 .

[14]  Hein S. Venter,et al.  A Forensic Readiness Model for Wireless Networks , 2010, IFIP Int. Conf. Digital Forensics.

[15]  Kevin Fu,et al.  Security and Privacy for Implantable Medical Devices , 2008, IEEE Pervasive Comput..

[16]  Bernard Segal,et al.  A literature review of the safety of medical body area network devices in magnetic resonance imaging , 2011, 2011 5th International Symposium on Medical Information and Communication Technology.

[17]  Azzedine Boukerche,et al.  Monitoring patients via a secure and mobile healthcare system , 2010, IEEE Wireless Communications.

[18]  Donald Witters,et al.  Wireless medical systems: risks, challenges, and opportunities. , 2011, Biomedical instrumentation & technology.

[19]  Franca Delmastro,et al.  Pervasive communications in healthcare , 2012, Comput. Commun..

[20]  Tadayoshi Kohno,et al.  Neurosecurity: security and privacy for neural devices. , 2009, Neurosurgical focus.

[21]  B. Cusack,et al.  Managing wireless security risks in medical services , 2014 .

[22]  Giovanni Calcagnini,et al.  RFID in healthcare environment: electromagnetic compatibility regulatory issues , 2010, 2010 Annual International Conference of the IEEE Engineering in Medicine and Biology.

[23]  Kyung Sup Kwak,et al.  Towards security issues and solutions in Wireless Body Area Networks , 2010, INC2010: 6th International Conference on Networked Computing.

[24]  Kevin Fu,et al.  They can hear your heartbeats: non-invasive security for implantable medical devices , 2011, SIGCOMM.

[25]  N. Jha,et al.  Attacking and Defending a Diabetes Therapy System , 2014 .

[26]  Allie Paquette Design of a pragmatic test lab for evaluating and testing wireless medical devices , 2011, 2011 IEEE 37th Annual Northeast Bioengineering Conference (NEBEC).

[27]  Jinhua Guo,et al.  Security Challenge and Defense in VoIP Infrastructures , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[28]  Kevin Fu,et al.  Recent Results in Computer Security for Medical Devices , 2011, MobiHealth.

[29]  Kyung Sup Kwak,et al.  Security and Privacy Issues in Wireless Sensor Networks for Healthcare Applications , 2010, Journal of Medical Systems.

[30]  Lan Wang,et al.  Securing wireless implantable devices for healthcare: Ideas and challenges , 2009, IEEE Communications Magazine.

[31]  Raimundas Matulevicius,et al.  Towards transformation guidelines from secure tropos to misuse cases (position paper) , 2011, SESS '11.

[32]  Jeremy A. Hansen,et al.  A taxonomy of vulnerabilities in implantable medical devices , 2010, SPIMACS '10.

[33]  Kevin Fu,et al.  Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).

[34]  A T Karygiannis,et al.  Wireless Network Security: 802.11, Bluetooth and Handheld Devices , 2002 .

[35]  Nada Golmie,et al.  Prevailing over wires in healthcare environments: benefits and challenges , 2006, IEEE Communications Magazine.

[36]  Athanasios V. Vasilakos,et al.  ECG-Cryptography and Authentication in Body Area Networks , 2012, IEEE Transactions on Information Technology in Biomedicine.

[37]  Seoksoo Kim,et al.  Towards a secure patient information access control in ubiquitous healthcare systems using identity-based signcryption , 2011, 13th International Conference on Advanced Communication Technology (ICACT2011).

[38]  Insup Lee,et al.  Biomedical devices and systems security , 2011, 2011 Annual International Conference of the IEEE Engineering in Medicine and Biology Society.

[39]  Sujitha Juliet Devaraj,et al.  Current trends and future challenges in wireless telemedicine system , 2011, 2011 3rd International Conference on Electronics Computer Technology.

[40]  N. Diksha,et al.  Backdoor Intrusion in Wireless Networks- problems and solutions , 2006, 2006 International Conference on Communication Technology.

[41]  Jill Schlabig Williams,et al.  The top 10 medical device challenges. , 2011, Biomedical instrumentation & technology.

[42]  Noureddine Boudriga,et al.  Security of implantable medical devices: limits, requirements, and proposals , 2014, Secur. Commun. Networks.

[43]  Steve Hanna,et al.  Take Two Software Updates and See Me in the Morning: The Case for Software Security Evaluations of Medical Devices , 2011, HealthSec.

[44]  Mihai Cretu,et al.  System for remote patient monitoring and data collection with applicability on E-health applications , 2011, 2011 7TH INTERNATIONAL SYMPOSIUM ON ADVANCED TOPICS IN ELECTRICAL ENGINEERING (ATEE).

[45]  V. Sridhar Network Security , Administration and Management : Advancing Technology and Practice , 2012 .

[46]  Ajit Singh,et al.  A Literature Review of Security Attack in Mobile Ad-hoc Networks , 2010 .

[47]  Kenji Yoshigoe,et al.  Security and Attacks in Wireless Sensor Networks , 2012 .

[48]  Niraj K. Jha,et al.  Hijacking an insulin pump: Security attacks and defenses for a diabetes therapy system , 2011, 2011 IEEE 13th International Conference on e-Health Networking, Applications and Services.