Attack-Tree Based Risk Assessment on Cloud-Oriented Wireless Body Area Network

Attack-Tree Based Risk Assessment on Cloud-Oriented Wireless Body Area Network

Theodoros Mavroeidakos, Nikolaos Peter Tsolis, Dimitrios D. Vergados, Stavros Kotsopoulos
Copyright: © 2019 |Volume: 11 |Issue: 4 |Pages: 17
ISSN: 1941-8663|EISSN: 1941-8671|EISBN13: 9781522565512|DOI: 10.4018/IJITN.2019100105
Cite Article Cite Article

MLA

Mavroeidakos, Theodoros, et al. "Attack-Tree Based Risk Assessment on Cloud-Oriented Wireless Body Area Network." IJITN vol.11, no.4 2019: pp.63-79. http://doi.org/10.4018/IJITN.2019100105

APA

Mavroeidakos, T., Tsolis, N. P., Vergados, D. D., & Kotsopoulos, S. (2019). Attack-Tree Based Risk Assessment on Cloud-Oriented Wireless Body Area Network. International Journal of Interdisciplinary Telecommunications and Networking (IJITN), 11(4), 63-79. http://doi.org/10.4018/IJITN.2019100105

Chicago

Mavroeidakos, Theodoros, et al. "Attack-Tree Based Risk Assessment on Cloud-Oriented Wireless Body Area Network," International Journal of Interdisciplinary Telecommunications and Networking (IJITN) 11, no.4: 63-79. http://doi.org/10.4018/IJITN.2019100105

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Machine-to-machine (M2M) communication is an emerging technology with unrivaled benefits in the fields of e Health and m-Health. The wireless body area networks (WBANs) consist of a major subdomain of M2M communications. The WBANs coupled with the Cloud Computing (CC) paradigm introduce a supreme infrastructure in terms of performance and Quality of Services (QoS) for the development of eHealth applications. In this article, a risk assessment aiming to disclose potential threats and highlight exploitation of health care services, is introduced. The proposed assessment is based upon the implementation of a series of steps. Initially, the health care WBAN-CC infrastructure is scrutinized; then, its threats' taxonomy is identified. Then, a risk assessment is carried out based on an attack-tree consisting of the most hazardous threats against Personally Identifiable Information (PII) disclosure. Thus, the implementation of several countermeasures is realized as a means to mitigate gaps.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.