Analysis of Threats in Interoperability of Medical Devices
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 32799
Analysis of Threats in Interoperability of Medical Devices

Authors: M. Sandhya, R. M. Madhumitha, Sharmila Sankar

Abstract:

Interoperable medical devices (IMDs) face threats due to the increased attack surface accessible by interoperability and the corresponding infrastructure. Initiating networking and coordination functionalities primarily modify medical systems' security properties. Understanding the threats is a vital first step in ultimately crafting security solutions for such systems. The key to this problem is coming up with some common types of threats or attacks with those of security and privacy, and providing this information as a roadmap. This paper analyses the security issues in interoperability of devices and presents the main types of threats that have to be considered to build a secured system.

Keywords: Interoperability, threats, attacks, medical devices.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1130583

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1466

References:


[1] Reinhold Haux, Medical informatics: Past, present, future, International Journal of medical informatics, pp. 599–610, 2010.
[2] Chemlal S., Colberg S., Satin-Smith M., Gyuricsko E., Hubbard T., Scerbo M. W., McKenzie F.D. Blood glucose individualized prediction for type 2 diabetes using iPhone application., IEEE 37th Bioengineering Conference (NEBEC), 2011.
[3] Silva, B., Lopes, I., Rodrigues, J., Ray, P.: Sapo Fitness: A Mobile Health Application for Dietary Evaluation, IEEE 13th International Conference on e-Health Networking, Applications and Services, 2011.
[4] Paschou, M., Sakkopoulos, E., Tsakalidis, A. easy HealthApps: e-HealthApps Dynamic Generation for Smartphones & Tablets, Journal of Medical Systems, Vol. 37, Issue: 3, 2012.
[5] Klug S., Krupka K., Dickhaus H., Katus H. A., Hilbel T., Displaying computerized ECG recordings and vital signs on Windows Phone 7smartphones, Computing in Cardiology, pp. 1067-1070, 2010.
[6] Karan, A., Bayraktar, C., Gümüskaya, H., Karlık, B, Diagnosing diabetes using neural networks on small mobile devices, Journal on Expert Systems with Applications, pp. 54–60, 2012.
[7] Boulos, M., Wheeler, S., Tavares, C. and Jones, R., How Smart phones are changing the face of mobile and participatory healthcare: an overview, with example from eCAALYX, BioMedical Engineering OnLine Journal, pp.10:24, 2011.
[8] http://www.bizjournals.com/nashville/blog/2016/04/why-this-health-tech-group-picked-nashville-not.html..
[9] http://medicalinteroperability.org/the-patient-safety-movementannounced-49-medical-technology.
[10] T. Choen. Medical and information technologies convergence. IEEE Eng. Med. Biol. Magazine, vol.23, Issue: 3, pp: 59-64, May 2004.
[11] S. L. Grimes. Security: A new clinical engineering paradigm. IEEE Eng. Med. Biol. Magazine, vol.23, Issue: 4, pp: 80-82, August 2004.
[12] N. L. Snee and K. A. McCormick. The case for integrating public health informatics networks, IEEE Eng. Med. Biol. Mag, Vol. 23, Issue:1, pp:81-88,February 2004.
[13] M. Clarke, D. Bogia, K. Hassing, L. Steubesand, T. Chan, and D. Ayyagari. Developing a standard for personal health devices based on 11073. In EMBS, 2007.
[14] K. Venkatasubramanian, E. Vasserman, O. Sokolsky, and I. Lee. Security and interoperable-medical-device systems, part 1. IEEE Security & Privacy, Vol.10, Issue:5, pp: 61-63, 2012.
[15] A. Mashkoor, J. Sametinger, Rigorous modeling and analysis of interoperable medical devices, in: Proceedings of the International Spring Simulation Multi-Conference, Society for Modeling & Simulation, pp. 800–807, 2016.
[16] R. Taylor, K. Venkatasubramanian, Craig A. Shue, Understanding the security of interoperable medical devices, in: Proceedings of the 3rd International Conference on high confidence networked systems, pp.31-40, 2014.