skip to main content
10.1145/3278576.3278601acmconferencesArticle/Chapter ViewAbstractPublication PageschConference Proceedingsconference-collections
research-article

Misbehavior detection of embedded IoT devices in medical cyber physical systems

Published: 22 January 2020 Publication History

Abstract

We propose a lightweight specification-based misbehavior detection technique to efficiently and effectively detect misbehavior of an IoT device embedded in a medical cyber physical system through automatic model checking and formal verification. We verify our specification-based misbehavior detection technique with a patient-controlled analgesia (PCA) device embedded in a medical health monitoring system.

References

[1]
R. Berthier and W.H. Sanders. 2011. Specification-based Intrusion Detection for Advanced Metering Infrastructures. 17th IEEE Pacific Rim Int. Symp. Dependable Computing, 184--193.
[2]
A. Bezemskij, G. Loukas, R.J. Anthony, and D. Gan. 2016. Behaviour-based anomaly detection of cyber-physical attacks on a robotic vehicle. IEEE Symposium on Cyberspace and Security, 1--8.
[3]
I.R. Chen, O. Yilmaz, and I.L. Yen. 2006. Admission control algorithms for revenue optimization with QoS guarantees in mobile wireless networks. Wireless Personal Communications, 38 (3), 357--376.
[4]
A. DaSilva et al. 2005. Decentralized intrusion detection in wireless sensor networks. 1st ACM inter. workshop on quality of service & security in wireless and mobile networks., 16--23.
[5]
N. Zhang, K. Sun, W. Lou, and Y.T. Hou. 2016. CaSE: Cache-Assisted Secure Execution on ARM Processors. IEEE Symposium on Security and Privacy.
[6]
J. Hong, C.C. Liu, and M. Govindarasu. 2014. Integrated Anomaly Detection for Cyber Security of the Substations. IEEE Trans. Smart Grid, 5 (4), 1643--1653.
[7]
S. Huda, et al. 2017. Defending unknown attacks on cyber-physical systems by semi-supervised approach and available unlabeled data. Information Sciences, 379, 211--228.
[8]
K. Ioannis, T. Dimitriou, and F. Freiling. 2007. Towards intrusion detection in wireless sensor networks. 13th European Wireless Conference.
[9]
P. Jokar, H. Nicanfar, and V.C.M. Leung. 2011. Specification-based Intrusion Detection for Home Area Networks in Smart Grids. IEEE Int. Conf. on Smart Grid Communications.
[10]
A.M. Kosek. 2016. Contextual anomaly detection for cyber-physical security in smart grids based on an artificial neural network model. IEEE Workshop on Cyber-Physical Security and Resilience in Smart Grids.
[11]
C. Kwon, S. Yantek, and I. Hwang. 2016. Real-Time Safety Assessment of Unmanned Aircraft Systems Against Stealthy Cyber Attacks. Journal of Aerospace Information Systems, 13 (1), 27--46.
[12]
R. Mitchell, and I.R. Chen. 2014. A Survey of Intrusion Detection Techniques in Cyber Physical Systems. ACM Computing Survey, 46 (4), article 55.
[13]
R. Mitchell and I.R. Chen. 2016. Modeling and Analysis of Attacks and Counter Defense Mechanisms for Cyber Physical Systems. IEEE Transactions on Reliability, 65 (1), 350--358.
[14]
S. Ntalampiras. 2016. Automatic identification of integrity attacks in cyber-physical systems. Expert Systems with Applications, 58, 164--173.
[15]
Y. Zhang, L. Wang, W. Sun, R. Green, and M. Alam. 2011. Distributed intrusion detection system in a multi-layer network architecture of smart grids. IEEE Trans. Smart Grid, 2 (4), 796--808.
[16]
J. Musa. 1993. Operational profiles in software reliability engineering. IEEE Software, 14--32.
[17]
R. Mitchell and I.R. Chen. 2015. Behavior Rule Specification-based Intrusion Detection for Safety Critical Medical Cyber Physical Systems. IEEE Transactions on Dependable and Secure Computing, 12 (1), 16--30.
[18]
R. Mitchell and I.R. Chen. 2014. Adaptive Intrusion Detection of Malicious Unmanned Air Vehicles Using Behavior Rule Specifications. IEEE Transactions on Systems, Man and Cybernetics, 44 (5), 593--604.
[19]
S.T. Cheng, C.M. Chen, and I.R. Chen. 2000. Dynamic quota-based admission control with sub-rating in multimedia servers. Multimedia Systems, 8 (2), 83--91.
[20]
I.R. Chen and F.B. Bastani. 1991. Effect of Artificial-Intelligence Planning Procedures on System Reliability. IEEE Trans Reliability, 40 (3), 364--369.
[21]
T. Song, et al. 2006. Formal Reasoning about a Specification-based Intrusion Detection for Dynamic Auto-configuration Protocols in Ad Hoc Networks. Formal Aspects in Security and Trust, 16--33.
[22]
K. Park, Y. Lin, V. Metsis, Z. Le, and F. Makedon. 2010. Abnormal human behavioral pattern detection in assisted living environments. 3rd ACM Int. Conf. Pervasive Technol. Related Assist. Environments, 9:1--9:8.
[23]
I.R. Chen, B. Gu, S.E. George, and S.T. Cheng. 2005. On failure recoverability of client-server applications in mobile wireless environments. IEEE Trans. Reliability, 54 (1), 115--122.
[24]
B.B. Zarpelao, R.S. Miani, C.T. Kawakani, and S.C. de Alvarenga. 2017. A Survey of Intrusion Detection in Internet of Things. Journal of Network and Computer Architecture, 84, 25--37.
[25]
A. Saeed, A. Ahmadinia, A. Javed, and H. Larikani. 2016. Intelligent Intrusion Detection in Low-Power IoTs. ACM Trans. Internet Technology, 16 (4), article 27.
[26]
M.T. Khan, D. Serpanos, and H. Shrobe. 2017. ARMET: Behavior-based Secure and Resilient Industrial Control Systems. Proceedings of The IEEE.
[27]
M. Kaufmann and J.S. Moore. 2017. A Computational Logic for Applicative Common Lisp. http://www.cs.utexas.edu/users/moore/acl2/.

Cited By

View all
  • (2024)IoT based smart framework to predict air quality in congested traffic areas using SV-CNN ensemble and KNN imputation modelComputers and Electrical Engineering10.1016/j.compeleceng.2024.109311118(109311)Online publication date: Aug-2024
  • (2024)An adaptive secure internet of things and cloud based disease classification strategy for smart healthcare industryWireless Networks10.1007/s11276-024-03783-531:1(879-897)Online publication date: 26-Jun-2024
  • (2023)Attack Detection for Medical Cyber-Physical Systems–A Systematic Literature ReviewIEEE Access10.1109/ACCESS.2023.327022511(41796-41815)Online publication date: 2023
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
CHASE '18: Proceedings of the 2018 IEEE/ACM International Conference on Connected Health: Applications, Systems and Engineering Technologies
September 2018
139 pages
ISBN:9781450359580
DOI:10.1145/3278576
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

In-Cooperation

  • IEEE-CS\DATC: IEEE Computer Society

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 22 January 2020

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. IoT
  2. behavior rules
  3. medical cyber physical systems
  4. zero-day attacks

Qualifiers

  • Research-article

Funding Sources

  • U.S. AFOSR
  • Institute for Information & communications Technology Promotion (IITP) by Korea government (MSIT)

Conference

CHASE '18
Sponsor:

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)18
  • Downloads (Last 6 weeks)0
Reflects downloads up to 16 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)IoT based smart framework to predict air quality in congested traffic areas using SV-CNN ensemble and KNN imputation modelComputers and Electrical Engineering10.1016/j.compeleceng.2024.109311118(109311)Online publication date: Aug-2024
  • (2024)An adaptive secure internet of things and cloud based disease classification strategy for smart healthcare industryWireless Networks10.1007/s11276-024-03783-531:1(879-897)Online publication date: 26-Jun-2024
  • (2023)Attack Detection for Medical Cyber-Physical Systems–A Systematic Literature ReviewIEEE Access10.1109/ACCESS.2023.327022511(41796-41815)Online publication date: 2023
  • (2022)Coverage Reliability of IoT Intrusion Detection System based on Attack-Defense Game Design2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)10.1109/TrustCom56396.2022.00021(74-82)Online publication date: Dec-2022
  • (2022)Medical Cyber–Physical Systems: A Solution to Smart Health and the State of the ArtIEEE Transactions on Computational Social Systems10.1109/TCSS.2021.31228079:5(1359-1386)Online publication date: Oct-2022
  • (2022)AI‐ and IoT‐based hybrid model for air quality prediction in a smart city with network assistanceIET Networks10.1049/ntw2.1205311:6(221-233)Online publication date: 20-Aug-2022
  • (2022)Intelligent and behavioral-based detection of malware in IoT spectrum sensorsInternational Journal of Information Security10.1007/s10207-022-00602-w22:3(541-561)Online publication date: 29-Jul-2022
  • (2022)Forensic Analysis of Fitness Applications on AndroidMobile Internet Security10.1007/978-981-16-9576-6_16(222-235)Online publication date: 22-Jan-2022
  • (2022)Sandbox Environment for Real Time Malware Analysis of IoT DevicesComputing Science, Communication and Security10.1007/978-3-031-10551-7_13(169-183)Online publication date: 2-Jul-2022
  • (2022)Dynamic Security Testing Techniques for the Semantic Web of ThingsTools, Languages, Methodologies for Representing Semantics on the Web of Things10.1002/9781394171460.ch5(75-91)Online publication date: 16-Sep-2022
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media