TY - GEN
T1 - A new security framework for remote patient monitoring devices
AU - Heydari, Vahid
N1 - Publisher Copyright:
© 2020 IEEE.
PY - 2020/10/20
Y1 - 2020/10/20
N2 - Digital connectivity is fundamental to the health care system to deliver safe and effective care. However, insecure connectivity could be a major threat to patient safety and privacy (e.g., in August 2017, FDA recalled 465, 000 pacemakers because of discovering security flaws). Although connecting a patient's pacemaker to the Internet has many advantages for monitoring the patient, this connectivity opens a new door for cyber-attackers to steal the patient data or even control the pacemaker or damage it. Therefore, patients are forced to choose between connectivity and security. This paper presents a framework for secure and private communications between wearable medical devices and patient monitoring systems. The primary objective of this research is twofold, first to identify and analyze the communication vulnerabilities, second, to develop a framework for combating unauthorized access to data through the compromising of computer security. Specifically, hiding targets from cyber-attackers could prevent our system from future cyber-attacks. This is the most effective way to stop cyber-attacks in their first step.
AB - Digital connectivity is fundamental to the health care system to deliver safe and effective care. However, insecure connectivity could be a major threat to patient safety and privacy (e.g., in August 2017, FDA recalled 465, 000 pacemakers because of discovering security flaws). Although connecting a patient's pacemaker to the Internet has many advantages for monitoring the patient, this connectivity opens a new door for cyber-attackers to steal the patient data or even control the pacemaker or damage it. Therefore, patients are forced to choose between connectivity and security. This paper presents a framework for secure and private communications between wearable medical devices and patient monitoring systems. The primary objective of this research is twofold, first to identify and analyze the communication vulnerabilities, second, to develop a framework for combating unauthorized access to data through the compromising of computer security. Specifically, hiding targets from cyber-attackers could prevent our system from future cyber-attacks. This is the most effective way to stop cyber-attacks in their first step.
UR - http://www.scopus.com/inward/record.url?scp=85099594937&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85099594937&partnerID=8YFLogxK
U2 - 10.1109/ISNCC49221.2020.9297214
DO - 10.1109/ISNCC49221.2020.9297214
M3 - Conference contribution
AN - SCOPUS:85099594937
T3 - 2020 International Symposium on Networks, Computers and Communications, ISNCC 2020
BT - 2020 International Symposium on Networks, Computers and Communications, ISNCC 2020
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2020 International Symposium on Networks, Computers and Communications, ISNCC 2020
Y2 - 20 October 2020 through 22 October 2020
ER -