Survey on IoT based Cyber Security Issues and Autonomous Solutions for Implantable Medical Devices

Main Article Content

Thyagarajan. C
Vijay Bhanu. S
Suthir. S

Abstract

In today’s world the technology has got boomed up to the peak. So as a measure of this technology peak we could see that the enhancement of this has raised very large. This technology booming has also impacted health care sector. In our paper we are going to discuss much on implantable medical devices and its uses which plays a major role in patient’s life. This IMD’s are going to be the life changing aspect of each and every patient. These devices are highly controlled IoT devices (i.e.) those devices are connected through internet which will help doctors to track the details of the patients remotely. On the other hand since all these devices are connected to internet, these are easily hacked by the hackers. The factors of how those devices are much vulnerable and what are all the threats that will make these devices to malfunction and lead a problem to the patients is discussed. And also this will lead the health sector to fall in their reputation. IMD’s are of many types which are in existing in the Medical industry. But we are going to consider some IMD’s as example and we have planned to make a detailed study on the problems on those devices. All these devices are vulnerable since it is connected to internet. So our aim is to completely or partially reduce the risks on those devices via communication network. We have also showcased the possible threats and vulnerabilities chances on those devices. The main scenarios of device control issues and possible solutions have been discussed in this article.

Article Details

How to Cite
C, T., S, V. B., & S, S. (2023). Survey on IoT based Cyber Security Issues and Autonomous Solutions for Implantable Medical Devices. International Journal on Recent and Innovation Trends in Computing and Communication, 11(8s), 175–185. https://doi.org/10.17762/ijritcc.v11i8s.7188
Section
Articles

References

Abdul Razaque,Fathi Amsaad,Meer Jaro Khan , Salim hariri, Shujing Chen, Siting chen, Xingchen Ji, “Survey: Cybersecurity Vulnerabilities, Attacks and Solutions in the Medical Domain”

Heena Rathore, Amr Mohamed, Abdulla Al-Ali, Xiaojiang Du, Mohsen Guizani, “A Review of Security Challenges, Attacks and Resolutions for Wireless Medical Devices”

Z. Esat Ankaral?, A.Fatih Demir, Marwa Qaraqe2, Qammer H. Abbasi, Erchin Serpedin, Huseyin Arslan1, and Richard D. Gitlin“Physical Layer Security for Wireless Implantable Medical Devices”

Arthur Gatouillat, Youakim Badr, Bertrand Massot, and Ervin Sejdic, “Internet of Medical Things: A Review of Recent Contributions Dealing with Cyber-Physical Systems in Medicine” submitted in IEEE internet of things journal.

Muhammad ali siddiqi , Christian doerr, And Christos strydis “IMDfence: Architecting a Secure Protocol for Implantable Medical Devices” published in IEEE access on Aug 11,2020.

Matan kintzlinger , aviad cohen , nir nissim , moshe rav-acha, Vladimir khalameizer, yuval elovici , yuval shahar , and amos katz, “CardiWall: A Trusted Firewall for the Detection of Malicious Clinical Programming of Cardiac Implantable Electronic Devices” published in IEEE access on Mar 05,2020.

Tahreem Yaqoob, Haider Abbas, Senior Member, IEEE, and Mohammed Atiquzzaman “Security Vulnerabilities, Attacks, Countermeasures, and Regulations of Networked Medical Devices ? A Review” published in IEEE Communications Surveys and Tutorials.

Ikram Ud Din , (Senior Member, Ieee), Ahmad Almogren , (Senior Member, Ieee), Mohsen Guizani , (Fellow, Ieee), AND MANSOUR ZUAIR“A Decade of Internet of Things: Analysis in the Light of Healthcare Applications” published in IEEE Access.

Aliya Tabasum, Zeineb Safi, Wadha AlKhater, Abdullatif Shikfa, “Cybersecurity Issues in Implanted Medical Devices”Submitted in International Conference on Computer and Applications.

AKM Iqtidar Newaz , Amit Kumar Sikder , Mohammad Ashiqur Rahman, and A. Selcuk Uluagac, “HealthGuard: A Machine Learning-Based Security Framework for Smart Healthcare Systems” submitted at 6th International Conference on Social Networks Analysis, Management and Security.

J. Radcliffe, “Hacking medical devices for fun and insulin: Breaking the human scada system,” in Black Hat Conference presentation slides, 2011.

P. A. Williams and A. J. Woodward, “Cybersecurity vulnerabilities in medical devices: a complex environment and multifaceted problem,” Medical Devices (Auckland, NZ), vol. 8, p. 305, 2015.

D. Halperin, T. S. Heydt-Benjamin, B. Ransford, S. S. Clark, B. Defend, W. Morgan, K. Fu, T. Kohno, and W. H. Maisel, “Pacemakers and implantable cardiac defifibrillators: Software radio attacks and zero-power defenses,” in Security and Privacy, 2008. IEEE, pp. 129–142.

Xiaoguang Liu, Ziqing Wang , Chunhua Jin , Fagen Li3 And Gaoping Li ” A Blockchain-based Medical Data Sharing and Protection Scheme:” published in IEEE access.

Z B Zheng, S A Xie, H N Dai, X P Chen, and H M Wang, “An overview of blockchain technology: architecture, consensus, and future trends,” 2017 IEEE International Congress on Big Data, Honolulu, USA, 2017, pp.557-

564.

I Bentov, C Lee, A Mizrahi, and M Rosenfeld, “Proof of activity: extending bitcoin’s proof of work via proof of stake extended abstract]y,” Acm Sigmetrics Performance Evaluation Review, vol.42, no.3, 2014, pp.34-37.

Y Yuan and F Y Wang, “Blockchain: the state of the art and future trends,”Acta Automat. Sinica, vol.42, no.4, 2016, pp.481-494.

M Blaze, G Bleumer, and M Strauss, “Divertible protocols and atomic proxy cryptography,” International Conference on the Theory and Applications of Cryptographic Techniques, Espoo, Finland, 1998, pp.127-144.

R Canetti and S Hohemberger, “Chosen-ciphertext secure proxy reencryption,”14th ACM conference on Computer and communications security, Alexandria, USA, 2007, pp.185-194.

L F Guo and B Lu, “Effificient proxy re-encryption with keyword search scheme,” Journal of Computer Research and Development, vol.51, no.6, 2014, pp.1221-1228.

L. Pycroft, S. G. Boccard, S. L. Owen, J. F. Stein, J. J. Fitzgerald, A. L. Green, and T. Z. Aziz, “Brainjacking: Implant Security Issues in Invasive Neuromodulation,” World Neurosurgery, vol. 92, pp. 454–462, Aug. 2016. Online]. Available:http://linkinghub.elsevier.com/retrieve/pii/S1878875016302728

C. Camara, P. Peris-Lopez, and J. E. Tapiador, “Security and privacy issues in implantable medical devices: A comprehensive survey,” Journal of Biomedical Informatics, vol. 55, no. Supplement C, pp. 272–289, Jun. 2015. Online]. Available:http://www.sciencedirect.com/science/article/pii/S153204641500074X

I. Stine, M. Rice, S. Dunlap, and J. Pecarina, “A cyber risk scoring system for medical devices,” International Journal of Critical Infrastructure Protection, 2017.

H. Boyes, “Cybersecurity and cyber-resilient supply chains,” Technology Innovation Management Review, vol. 5, no. 4, p. 28, 2015.

S. Nagarakatte et al., WatchdogLite: Hardware-Accelerated Compiler Based Pointer Checking, 12th Annual IEEE/ACM International Symposium on Code Generation and Optimization, Orlando, FL, USA. ACM, p. 175, 2014.

A. Menon, S. Murugan et al., Shakti-T: A RISC-V Processor with Light Weight Security Extensions, 2017 Proceedings of the Hardware and Architectural Support for Security and Privacy. ACM, pp. 12, 2017.

M. Zhang, A. Raghunathan, and N. K. Jha, ‘‘MedMon: Securing medical devices through wireless monitoring and anomaly detection,’’ IEEE Trans. Biomed. Circuits Syst., vol. 7, no. 6, pp. 871–881, Dec. 2013.

A. Kaadan and H. H. Refai, ‘‘Securing wireless medical devices,’’ in Proc. IEEE Global Commun. Conf. (GLOBECOM), Dec. 2012, pp. 942–948.

A. Bordia, S. Verma, and K. Srivastava, “Effect of garlic (allium sativum) on blood lipids, blood sugar, fifibrinogen and fifibrinolytic activity in patients with coronary artery disease,” Prostaglandins, leukotrienes and essential fatty acids, vol. 58, no. 4, pp. 257–263, 1998.

D. Klachko, T. Lie, E. Cunningham, G. Chase, and T. Burns, “Blood glucose levels during walking in normal and diabetic subjects,” Diabetes, vol. 21, no. 2, pp. 89–100, 1972.

L. Davi, D. Alexandra, E. Manuel, F. Thomas, H. Thorsten, H. Ralf, N. Stefan, and S. Ahmad-Reza Sadeghi, ”MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones”, NDSS, vol. 26, pp. 27-40, 2012.

L. Cheng, Program Anomaly Detection Against Data-Oriented Attacks, Virginia Polytechnic Institute and State University, 2018.

Q. Jing, A. V. Vasilakos, J. Wan, J. Lu, and D. Qiu, “Security of the Internet of Things: Perspectives and challenges,” Wireless Netw., vol. 20, no. 8, pp. 2481–2501, Nov. 2014.

T. Yaqoob, H. Abbas, and M. Atiquzzaman, “Security vulnerabilities, attacks, countermeasures, and regulations of networked medical devices—A review,” IEEE Commun. Surveys Tuts., vol. 21, no. 4, pp. 3723–3768, 4th Quart., 2019.

R. M. Seepers, J. H. Weber, Z. Erkin, I. Sourdis, and C. Strydis, ‘‘Secure key-exchange protocol for implants using heartbeats,’’ in Proc. ACM Int. Conf. Comput. Frontiers CF, 2016, pp. 119–126.

V. Pournaghshband, M. Sarrafzadeh, and P. Reiher, ‘‘Securing legacy mobile medical devices,’’ in Proc. Int. Conf. Wireless Mobile Commun. Healthcare. Berlin, Germany: Springer, 2012, pp. 163–172.

J. Sorber, M. Shin, R. Peterson, C. Cornelius, S. Mare, A. Prasad, Z. Marois, E. Smithayer, and D. Kotz, ‘‘An amulet for trustworthy wearable mHealth,’’ in Proc. 12th Workshop Mobile Comput. Syst. Appl. HotMobile, 2012, p. 7.

N. Chandramowliswaran, S. Srinivasan, and C. T. Segar, “A note on linear based set associative cache address system,” International Journal on Computer Science and Engineering, vol. 4, no. 8, pp. 1383–1386, 2012.

A. Subasi, M. Radhwan, R. Kurdi, and K. Khateeb, “Iot based mobile healthcare system for human activity recognition,” in 2018 15th Learning and Technology Conference (L&T). IEEE, 2018, pp. 29–34.

K. E. Jeon, J. She, P. Soonsawad, and P. C. Ng, “Ble beacons for internet of things applications: Survey, challenges, and opportunities,” IEEE Internet of Things Journal, vol. 5, no. 2, pp. 811–828, 2018.

G. Geraci, H. S. Dhillon, J. G. Andrews, J. Yuan, and I. B. Collings, “Physical layer security in downlink multi-antenna cellular networks,” IEEE Trans. Commun., vol. 62, no. 6, pp. 2006–2021, June 2014.

Joseph Miller, Peter Thomas, Maria Hernandez, Juan González, Carlos Rodríguez. Machine Learning for Decision Support in Uncertain Environments. Kuwait Journal of Machine Learning, 2(3). Retrieved from http://kuwaitjournals.com/index.php/kjml/article/view/205

Y. Pei, Y. c. Liang, L. Zhang, K. C. Teh, and K. H. Li, “Secure communication over miso cognitive radio channels,” IEEE Trans. on Wireless Commun., vol. 9, no. 4, pp. 1494–1502, April 2010.

Y. Zou, X. Wang, and W. Shen, “Optimal relay selection for physical layer security in cooperative wireless networks,” IEEE J. Sel. Areas Commun, vol. 31, no. 10, pp. 2099–2111, Oct 2013.

X. He and A. Yener, “Cooperation with an untrusted relay: A secrecy perspective,” IEEE Trans. Inf. Theory, vol. 56, no. 8, pp. 3807–3827, Aug 2010.

Y. Deng, L. Wang, M. Elkashlan, A. Nallanathan, and R. K. Mallik,“Physical layer security in three-tier wireless sensor networks: A stochastic geometry approach,” IEEE Trans. Inf. Forensics Security,vol. 11, no. 6, pp. 1128–1138, June 2016.

T. Cameron, “Safety and effificacy of spinal cord stimulation for the treatment of chronic pain: a 20-year literature review,” Journal of Neurosurgery: Spine, vol. 100, no. 3, pp. 254–267, 2004.

S. J. Majerus, P. C. Fletter, M. S. Damaser, and S. L. Garverick, “Low power wireless micromanometer system for acute and chronic bladder pressure monitoring,” IEEE Transactions on Biomedical Engineering, vol. 58, no. 3, pp. 763–767, 2011.

C. Srdjan and B. Daniel, “On the security and privacy risks in cochlear implants,” Technical report/Swiss Federal Institute of Technology Zurich, Department of Computer Science, vol. 677, 2010.

Arfaoui, Amel, Ali Kribeche, and Sidi-Mohammed Senouci."Context-aware anonymous authentication protocols in the internet of things dedicated to e-health applications." Computer Networks 159 (2019): 23-36.

Masdari, Mohammad, and Safiyyeh Ahmadzadeh. "A survey and taxonomy of the authentication schemes in Telecare Medicine Information Systems." Journal of Network and Computer Applications 87 (2017): 1-19.