Abstract
Medical devices are the machines or instruments that play a vital role in diagnosis or treatment for patients in a healthcare ecosystem. As technologies advances so are these medical devices, and with time they are getting smarter and interconnected to themselves and other devices. These smarter devices attract attracts hackers to launch cyber-attack against these machines targeting vulnerabilities that exist within them. In this paper, we provide a brief description of medical devices in relation to different regulatory bodies, through which we try to understand the need to make the medical device safe for the users. We explore the vulnerabilities of medical devices and how they may be exploited to infiltrate the full healthcare system and other devices in the network. The paper covers three recent incidents of medical device vulnerabilities and explores the concept of blockchain that may be used to limit the vulnerabilities and their limitation. To ensure patient safety and privacy, it is essential that all relevant bodies including manufacturers, regulators, healthcare providers, etc. understand the risk and take proper steps to limit the threats.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Cybersecurity vulnerabilities in certain GE healthcare clinical information central stations and telemetry servers: Safety communication. https://www.fda.gov/medical-devices/safety-communications/cybersecurity-vulnerabilities-certain-ge-healthcare-clinical-information-central-stations-and. Accessed on 04 Oct 2021
Healthcare cyberattacks doubled in 2020, with 28% tied to ransomware. https://healthitsecurity.com/news/healthcare-cyberattacks-doubled-in-2020-with-28-tied-to-ransomware. Accessed on 04 Oct 2021
How fda medical device cybersecurity guidance affects providers. https://healthitsecurity.com/features/how-fda-medical-device-cybersecurity-guidance-affects-providers. Accessed on 04 Oct 2021
Making the case for medical device cybersecurity. https://www.darkreading.com/edge-articles/making-the-case-for-medical-device-cybersecurity. Accessed on 04 Oct 2021
Medical device cyber security guidance for industry. https://www.tga.gov.au/publication/medical-device-cyber-security-guidance-industry. Accessed on 04 Oct 2021
Medtech and the internet of medical things. https://www2.deloitte.com/global/en/pages/life-sciences-and-healthcare/articles/medtech-internet-of-medical-things.html. Accessed on 04 Oct 2021
Mysignals. http://www.my-signals.com/. Accessed on 04 Oct 2021
Urgent/11 cybersecurity vulnerabilities safety communciation. https://www.fda.gov/medical-devices/safety-communications/urgent11-cybersecurity-vulnerabilities-widely-used-third-party-software-component-may-introduce. Accessed on 04 Oct 2021
Va, ul collaboration advances case for medical device security standards. https://www.healthcareitnews.com/news/va-ul-collaboration-advances-case-medical-device-security-standards. Accessed on 04 Oct 2021
Agbo, C.C., Mahmoud, Q.H., Eklund, J.M.: Blockchain technology in healthcare: a systematic review. Healthcare 7(2) (2019)
Ahmed, M.: False image injection prevention using ichain. Appl. Sci. 9(20) (2019). https://doi.org/10.3390/app9204328
Ahmed, M., Barkat Ullah, A.S.S.M.: False data injection attacks in healthcare. In: Boo, Y.L., Stirling, D., Chi, L., Liu, L., Ong, K.L., Williams, G. (eds.) Data Mining, pp. 192–202. Springer Singapore, Singapore (2018). https://doi.org/10.1007/978-981-13-0292-3_12
Ahmed, M., Byreddy, S., Nutakki, A., Sikos, L.F., Haskell-Dowland, P.: Ecu-ioht: a dataset for analyzing cyberattacks in internet of health things. Ad Hoc Netw. 122, 102621 (2021)
Ahmed, M., Pathan, A.S.K.: False data injection attack (fdia): an overview and new metrics for fair evaluation of its countermeasure. Compl. Adap. Syst. Model. 8, 1–14 (2020)
Attia, O., Khoufi, I., Laouiti, A., Adjih, C.: An IoT-blockchain architecture based on hyperledger framework for healthcare monitoring application. In: 2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS), pp. 1–5 (2019)
Bostami, B., Ahmed, M., Choudhury, S.: False Data Injection Attacks in Internet of Things, pp. 47–58. Springer International Publishing, Cham (2019). https://doi.org/10.48550/arXiv.1910.01716
Burleson, W., Clark, S.S., Ransford, B., Fu, K.: Design challenges for secure implantable medical devices. In: DAC Design Automation Conference 2012, pp. 12–17 (2012). https://doi.org/10.1145/2228360.2228364
Chase, P., et al.: The evolving state of medical device cybersecurity. Biomed. Inst. Technol. 52 (2018). https://doi.org/10.2345/0899-8205-52.2.103
Clark, S.S., Fu, K.: Recent results in computer security for medical devices. In: Nikita, K.S., Lin, J.C., Fotiadis, D.I., Arredondo Waldmeyer, M.T. (eds.) Wireless Mobile Communication and Healthcare, pp. 111–118. Springer, Berlin, Heidelberg (2012). https://doi.org/10.1007/978-3-642-29734-2_16
Dwivedi, A.D., Srivastava, G., Dhar, S., Singh, R.: A decentralized privacy-preserving healthcare blockchain for IoT. Sensors 19(2) (2019)
Ellouze, F., Fersi, G., Jmaiel, M.: Blockchain for internet of medical things: a technical review. In: Jmaiel, M., Mokhtari, M., Abdulrazak, B., Aloulou, H., Kallel, S. (eds.) The Impact of Digital Technologies on Public Health in Developed and Developing Countries, pp. 259–267. Springer International Publishing, Cham (2020). https://doi.org/10.1007/978-3-030-51517-1_22
Garbelini, M.E., Wang, C., Chattopadhyay, S., Sumei, S., Kurniawan, E.: Sweyntooth: unleashing mayhem over bluetooth low energy. In: 2020 USENIX Annual Technical Conference (USENIX ATC 20), pp. 911–925. USENIX Association (2020). https://www.usenix.org/conference/atc20/presentation/garbelini
Kumar, S., Hu, Y., Andersen, M.P., Popa, R.A., Culler, D.E.: JEDI: Many-to-many end-to-end encryption and key delegation for IoT. In: 28th USENIX Security Symposium (USENIX Security 19), pp. 1519–1536. USENIX Association, Santa Clara, CA (2019). https://www.usenix.org/conference/usenixsecurity19/presentation/kumar-sam
McCauley, V., Williams, P.: Trusted interoperability and the patient safety issues of parasitic health care software. In: 9th Australian Information Security Management Conference, AISM; Conference date: 05–12-2011 Through 07–12-2011, pp. 189–195 (2011)
Sametinger., J., Rozenblit., J.: Security scores for medical devices. In: Proceedings of the 9th International Joint Conference on Biomedical Engineering Systems and Technologies - SmartMedDev, (BIOSTEC 2016), pp. 533–541. INSTICC, SciTePress (2016). https://doi.org/10.5220/0005838805330541
Uddin, M.A., Stranieri, A., Gondal, I., Balasubramanian, V.: A patient agent to manage blockchains for remote patient monitoring. Stud. Health Technol. Inform. 254, 105–115 (2018)
Uddin, M.A., Stranieri, A., Gondal, I., Balasubramanian, V.: Blockchain leveraged decentralized IoT ehealth framework. Internet of Things 9, 100159 (2020)
Williams, P.A.H., Woodward, A.: Cybersecurity vulnerabilities in medical devices: a complex environment and multifaceted problem. Med. Dev. (Auckland, N.Z.) 8, 305–316 (2015)
Xu, Y., Tran, D., Tian, Y., Alemzadeh, H.: Poster abstract: Analysis of cyber-security vulnerabilities of interconnected medical devices. In: 2019 IEEE/ACM International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE), pp. 23–24 (2019). https://doi.org/10.1109/CHASE48038.2019.00017
Yaqoob, T., Abbas, H., Atiquzzaman, M.: Security vulnerabilities, attacks, countermeasures, and regulations of networked medical devices-a review. IEEE Commun. Surv. Tutor. 21(4), 3723–3768 (2019). https://doi.org/10.1109/COMST.2019.2914094
Yip, M.: Ultra-low-power circuits and systems for wearable and implantable medical devices. Ph.D. thesis, Massachusetts Institute of Technology, Cambridge, MA, USA (2013). http://hdl.handle.net/1721.1/84902
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Rahman, S., Suleski, T., Ahmed, M., Kayes, A.S.M. (2022). An Investigation of Vulnerabilities in Internet of Health Things. In: Jin, H., Liu, C., Pathan, AS.K., Fadlullah, Z.M., Choudhury, S. (eds) Cognitive Radio Oriented Wireless Networks and Wireless Internet. CROWNCOM WiCON 2021 2021. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 427. Springer, Cham. https://doi.org/10.1007/978-3-030-98002-3_22
Download citation
DOI: https://doi.org/10.1007/978-3-030-98002-3_22
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-98001-6
Online ISBN: 978-3-030-98002-3
eBook Packages: Computer ScienceComputer Science (R0)