Skip to main content

FAMID: False Alarms Mitigation in IoMT Devices

  • Conference paper
  • First Online:
Internet of Things. Advances in Information and Communication Technology (IFIPIoT 2023)

Part of the book series: IFIP Advances in Information and Communication Technology ((IFIPAICT,volume 683))

Included in the following conference series:

Abstract

Wearable and Implantable Medical Devices (WIMDs) and Physiological Closed-loop Control Systems (PCLCS) are crucial elements in the advancing field of the Internet of Medical Things (IoMT). Enhancing the safety and reliability of these devices is of utmost importance as they play a significant role in improving the lives of millions of people every year. Medical devices typically have an alert system that can safeguard patients, facilitate rapid emergency response, and be customized to individual patient needs. However, false alarms are a significant challenge to the alert mechanism system, resulting in adverse outcomes such as alarm fatigue, patient distress, treatment disruptions, and increased healthcare costs. Therefore, reducing false alarms in medical devices is crucial to promoting improved patient care. In this study, we investigate the security vulnerabilities posed by WIMDs and PCLCS and the problem of false alarms in closed-loop medical control systems. We propose an implementation-level redundancy technique that can mitigate false alarms in real-time. Our approach, FAMID, utilizes a cloud-based control algorithm implementation capable of accurately detecting and mitigating false alarms. We validate the effectiveness of our proposed approach by conducting experiments on a blood glucose dataset. With our proposed technique, all the false alarms were detected and mitigated so that the device didn’t trigger any false alarms.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 119.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Al Zamil, M.G., et al.: False-alarm detection in the fog-based internet of connected vehicles. IEEE Trans. Veh. Technol. 68(7), 7035–7044 (2019)

    Article  Google Scholar 

  2. Alshalalfah, A.L., Hamad, G.B., Mohamed, O.A.: Towards system level security analysis of artificial pancreas via uppaal-smc. In: 2019 EEE International Symposium on Circuits and Systems (ISCAS), pp. 1–5. IEEE (2019)

    Google Scholar 

  3. Alshalalfah, A.L., Hamad, G.B., Mohamed, O.A.: System-level analysis of closed-loop anesthesia control under temporal sensor faults via uppaal-smc. In: 2020 42nd Annual International Conference of the IEEE Engineering in Medicine & Biology Society (EMBC), pp. 2508–2511 (2020)

    Google Scholar 

  4. Anderson, S.M., et al.: Multinational home use of closed-loop control is safe and effective. Diabetes Care 39(7), 1143–1150 (2016)

    Google Scholar 

  5. Atlas, E., Nimri, R., Miller, S., Grunberg, E.A., Phillip, M.: Md-logic artificial pancreas system: a pilot study in adults with type 1 diabetes. Diabetes Care 33(5), 1072–1076 (2010)

    Article  Google Scholar 

  6. Beardsley, T.: R7–2016-07: Multiple vulnerabilities in animas onetouch ping insulin pump. Rapid7 blog (2016)

    Google Scholar 

  7. Bhunia, S., Hsiao, M.S., Banga, M., Narasimhan, S.: Hardware trojan attacks: threat analysis and countermeasures. Proc. IEEE 102(8), 1229–1247 (2014)

    Article  Google Scholar 

  8. Blauw, H., Keith-Hynes, P., Koops, R., DeVries, J.H.: A review of safety and design requirements of the artificial pancreas. Ann. Biomed. Eng. 44(11), 3158–3172 (2016)

    Article  Google Scholar 

  9. Chacko, A., Hayajneh, T.: Security and privacy issues with iot in healthcare. EAI Endorsed Trans. Pervasive Health Technol. 4(14) (2018)

    Google Scholar 

  10. Chen, X., Su, N., Huang, Y., Guan, J.: False-alarm-controllable radar detection for marine target based on multi features fusion via CNNS. IEEE Sens. J. 21(7), 9099–9111 (2021)

    Article  Google Scholar 

  11. Classen, J., Wegemer, D., Patras, P., Spink, T., Hollick, M.: Anatomy of a vulnerable fitness tracking system: dissecting the fitbit cloud, app, and firmware. Proc. ACM Interact. Mobile Wearable Ubiquit. Technol. 2(1), 1–24 (2018)

    Article  Google Scholar 

  12. Dasari, S.: Cerberus: a novel alerting system for flood, fire, and air quality. In: 2020 IEEE Eurasia Conference on IOT, Communication and Engineering (ECICE), pp. 98–101 (2020)

    Google Scholar 

  13. FDA-Guidance: Technical considerations for medical devices with physiologic closed-loop control technology (2021). https://www.fda.gov/regulatory-information/search-fda-guidance-documents/technical-considerations-medical-devices-physiologic-closed-loop-control-technology

  14. Halperin, D., et al.: Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses. In: 2008 IEEE Symposium on Security and Privacy (sp 2008), pp. 129–142. IEEE (2008)

    Google Scholar 

  15. Hanna, S., Rolles, R., Molina-Markham, A., Poosankam, P., Fu, K., Song, D.: Take two software updates and see me in the morning: The case for software security evaluations of medical devices

    Google Scholar 

  16. Hei, X., Du, X.: Biometric-based two-level secure access control for implantable medical devices during emergencies. In: 2011 Proceedings IEEE INFOCOM, pp. 346–350. IEEE (2011)

    Google Scholar 

  17. Hei, X., Du, X., Lin, S., Lee, I., Sokolsky, O.: Patient infusion pattern based access control schemes for wireless insulin pump system. IEEE Trans. Parallel Distrib. Syst. 26(11), 3108–3121 (2014)

    Article  Google Scholar 

  18. Hei, X., Du, X., Wu, J., Hu, F.: Defending resource depletion attacks on implantable medical devices. In: 2010 IEEE Global Telecommunications Conference GLOBECOM 2010, pp. 1–5. IEEE (2010)

    Google Scholar 

  19. Hooman, O.M., Al-Rifaie, M.M., Nicolaou, M.A.: Deep neuroevolution: training deep neural networks for false alarm detection in intensive care units. In: 2018 26th European Signal Processing Conference (EUSIPCO), pp. 1157–1161. IEEE (2018)

    Google Scholar 

  20. Hovorka, R.: Closed-loop insulin delivery: from bench to clinical practice. Nat. Rev. Endocrinol. 7(7), 385–395 (2011)

    Article  Google Scholar 

  21. International Organization for Standardization: ISO 13485:2016 - Medical devices - Quality management systems - Requirements for regulatory purposes (2018)

    Google Scholar 

  22. Joshi, S., Joshi, S.: A sensor based secured health monitoring and alert technique using iomt. In: 2019 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT), pp. 152–156 (2019)

    Google Scholar 

  23. Kim, D., Park, S., Choi, K., Kim, Y.: BurnFit: analyzing and exploiting wearable devices. In: Kim, H., Choi, D. (eds.) WISA 2015. LNCS, vol. 9503, pp. 227–239. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-31875-2_19

    Chapter  Google Scholar 

  24. Kune, D.F., et al.: Ghost talk: mitigating emi signal injection attacks against analog sensors. In: 2013 IEEE Symposium on Security and Privacy, pp. 145–159. IEEE (2013)

    Google Scholar 

  25. Li, Q., Ding, D., Conti, M.: Brain-computer interface applications: security and privacy challenges. In: 2015 IEEE conference on communications and network security (CNS), 663–666. IEEE (2015)

    Google Scholar 

  26. Li, W., Meng, W., Su, C., Kwok, L.F.: Towards false alarm reduction using fuzzy if-then rules for medical cyber physical systems. IEEE Access 6, 6530–6539 (2018)

    Article  Google Scholar 

  27. Mahmud, S., Majerus, S.J., Damaser, M.S., Karam, R.: Design tradeoffs in bioimplantable devices: a case study with bladder pressure monitoring. In: 2018 IEEE 24th International Symposium on On-Line Testing and Robust System Design (IOLTS), pp. 69–72. IEEE (2018)

    Google Scholar 

  28. Mahmud, S., Zareen, F., Olney, B., Karam, R., et al.: Trojan resilience in implantable and wearable medical devices with virtual biosensing. In: 2022 IEEE 40th International Conference on Computer Design (ICCD), pp. 577–584. IEEE (2022)

    Google Scholar 

  29. Man, C.D., Micheletto, F., Lv, D., Breton, M., Kovatchev, B., Cobelli, C.: The uva/padova type 1 diabetes simulator: new features. J. Diabetes Sci. Technol. 8(1), 26–34 (2014)

    Article  Google Scholar 

  30. Marin, E., Singelée, D., Garcia, F.D., Chothia, T., Willems, R., Preneel, B.: On the (in) security of the latest generation implantable cardiac defibrillators and how to secure them. In: Proceedings of the 32nd Annual Conference on Computer Security Applications, pp. 226–236 (2016)

    Google Scholar 

  31. Marugán, A.P., Chacón, A.M.P., Márquez, F.P.G.: Reliability analysis of detecting false alarms that employ neural networks: a real case study on wind turbines. Reliability Eng. Syst. Safety 191, 106574 (2019)

    Article  Google Scholar 

  32. Newaz, A.I., Sikder, A.K., Rahman, M.A., Uluagac, A.S.: A survey on security and privacy issues in modern healthcare systems: attacks and defenses. ACM Trans. Comput. Healthcare 2(3), 1–44 (2021)

    Article  Google Scholar 

  33. Noorin, M., Suma, K.: Iot based wearable device using wsn technology for miners. In: 2018 3rd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT), pp. 992–996 (2018)

    Google Scholar 

  34. Olney, B., Mahmud, S., Karam, R.: Evaluating edge processing requirements in next generation iot network architectures. In: Casaca, A., Katkoori, S., Ray, S., Strous, L. (eds.) IFIPIoT 2019. IAICT, vol. 574, pp. 252–269. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-43605-6_15

    Chapter  Google Scholar 

  35. Papaioannou, M., et al.: A survey on security threats and countermeasures in internet of medical things (iomt). Trans. Emerging Telecommun. Technol. 33(6), e4049 (2022)

    Article  Google Scholar 

  36. Papp, D., Ma, Z., Buttyan, L.: Embedded systems security: threats, vulnerabilities, and attack taxonomy. In: 2015 13th Annual Conference on Privacy, Security and Trust (PST), pp. 145–152. IEEE (2015)

    Google Scholar 

  37. Parveen, N., Ali, A., Ali, A.: Iot based automatic vehicle accident alert system. In: 2020 IEEE 5th International Conference on Computing Communication and Automation (ICCCA), pp. 330–333. (2020)

    Google Scholar 

  38. Pycroft, L., et al.: Brainjacking: implant security issues in invasive neuromodulation. World Neurosurgery 92, 454–462 (2016)

    Article  Google Scholar 

  39. Ransford, B., et al.: Cybersecurity and medical devices: a practical guide for cardiac electrophysiologists. Pacing Clin. Electrophysiol. 40(8), 913–917 (2017)

    Article  Google Scholar 

  40. Rasmussen, K.B., Castelluccia, C., Heydt-Benjamin, T.S., Capkun, S.: Proximity-based access control for implantable medical devices. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, pp. 410–419 (2009)

    Google Scholar 

  41. Research, G.V.: Internet of things in healthcare market worth \$861.3 billion by 2030 (March, 2023). https://www.grandviewresearch.com/press-release/global-iot-in-healthcare-market

  42. Rios, B., Butts, J.: Security evaluation of the implantable cardiac device ecosystem architecture and implementation interdependencies. WhiteScope, sl (2017)

    Google Scholar 

  43. Ronquillo, J.G., Zuckerman, D.M.: Software-related recalls of health information technology and other medical devices: Implications for fda regulation of digital health. Milbank Q. 95(3), 535–553 (2017)

    Article  Google Scholar 

  44. Saraswathi, S., Suresh, G., Katiravan, J.: False alarm detection using dynamic threshold in medical wireless sensor networks. Wireless Netw. 27, 925–937 (2021)

    Article  Google Scholar 

  45. Sidhu, S., Mohd, B.J., Hayajneh, T.: Hardware security in IOT devices with emphasis on hardware trojans. J. Sens. Actuator Netw. 8(3), 42 (2019)

    Article  Google Scholar 

  46. Spence, N., Niharika Bhardwaj, M., Paul III, D.P.: Ransomware in healthcare facilities: a harbinger of the future? Perspectives in Health Information Management, pp. 1–22 (2018)

    Google Scholar 

  47. Sundaravadivel, P., Lee, I., Mohanty, S., Kougianos, E., Rachakonda, L.: Rm-iot: an iot based rapid medical response plan for smart cities. In: 2019 IEEE International symposium on smart electronic systems (iSES)(Formerly iNiS), 241–246. IEEE (2019)

    Google Scholar 

  48. Tyagi, A.K., Sreenath, N.: Cyber physical systems: analyses, challenges and possible solutions. Internet of Things Cyber-Phys. Syst. 1, 22–33 (2021)

    Article  Google Scholar 

  49. Wehbe, T., Mooney, V.J., Javaid, A.Q., Inan, O.T.: A novel physiological features-assisted architecture for rapidly distinguishing health problems from hardware trojan attacks and errors in medical devices. In: 2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 106–109. IEEE (2017)

    Google Scholar 

  50. Xu, F., Qin, Z., Tan, C.C., Wang, B., Li, Q.: Imdguard: securing implantable medical devices with the external wearable guardian. In: 2011 Proceedings IEEE INFOCOM. IEEE, pp. 1862–1870 (2011)

    Google Scholar 

  51. Yang, Y., Wu, L., Yin, G., Li, L., Zhao, H.: A survey on security and privacy issues in internet-of-things. IEEE Internet Of Things J. 4(5), 1250–1258 (2017)

    Article  Google Scholar 

  52. Zaeri-Amirani, M., Afghah, F., Mousavi, S.: A feature selection method based on shapley value to false alarm reduction in icus a genetic-algorithm approach. In: 2018 40th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC), pp. 319–323. IEEE (2018)

    Google Scholar 

  53. Zanetti, R., Aminifar, A., Atienza, D.: Robust epileptic seizure detection on wearable systems with reduced false-alarm rate. In: 2020 42nd annual international conference of the IEEE Engineering in Medicine & Biology Society (EMBC), pp. 4248–4251. IEEE (2020)

    Google Scholar 

  54. Zhou, Y., et al.: A contrastive learning approach for icu false arrhythmia alarm reduction. Sci. Rep. 12(1), 4689 (2022)

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shakil Mahmud .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 IFIP International Federation for Information Processing

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Mahmud, S., Keller, M., Ahmed, S., Karam, R. (2024). FAMID: False Alarms Mitigation in IoMT Devices. In: Puthal, D., Mohanty, S., Choi, BY. (eds) Internet of Things. Advances in Information and Communication Technology. IFIPIoT 2023. IFIP Advances in Information and Communication Technology, vol 683. Springer, Cham. https://doi.org/10.1007/978-3-031-45878-1_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-45878-1_14

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-45877-4

  • Online ISBN: 978-3-031-45878-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics