Analysis of Threats in Interoperability of Medical Devices

Interoperable medical devices (IMDs) face threats due to the increased attack surface accessible by interoperability and the corresponding infrastructure. Initiating networking and coordination functionalities primarily modify medical systems' security properties. Understanding the threats is a vital first step in ultimately crafting security solutions for such systems. The key to this problem is coming up with some common types of threats or attacks with those of security and privacy, and providing this information as a roadmap. This paper analyses the security issues in interoperability of devices and presents the main types of threats that have to be considered to build a secured system.





References:
[1] Reinhold Haux, Medical informatics: Past, present, future, International Journal of medical informatics, pp. 599–610, 2010.
[2] Chemlal S., Colberg S., Satin-Smith M., Gyuricsko E., Hubbard T., Scerbo M. W., McKenzie F.D. Blood glucose individualized prediction for type 2 diabetes using iPhone application., IEEE 37th Bioengineering Conference (NEBEC), 2011.
[3] Silva, B., Lopes, I., Rodrigues, J., Ray, P.: Sapo Fitness: A Mobile Health Application for Dietary Evaluation, IEEE 13th International Conference on e-Health Networking, Applications and Services, 2011.
[4] Paschou, M., Sakkopoulos, E., Tsakalidis, A. easy HealthApps: e-HealthApps Dynamic Generation for Smartphones & Tablets, Journal of Medical Systems, Vol. 37, Issue: 3, 2012.
[5] Klug S., Krupka K., Dickhaus H., Katus H. A., Hilbel T., Displaying computerized ECG recordings and vital signs on Windows Phone 7smartphones, Computing in Cardiology, pp. 1067-1070, 2010.
[6] Karan, A., Bayraktar, C., Gümüskaya, H., Karlık, B, Diagnosing diabetes using neural networks on small mobile devices, Journal on Expert Systems with Applications, pp. 54–60, 2012.
[7] Boulos, M., Wheeler, S., Tavares, C. and Jones, R., How Smart phones are changing the face of mobile and participatory healthcare: an overview, with example from eCAALYX, BioMedical Engineering OnLine Journal, pp.10:24, 2011.
[8] http://www.bizjournals.com/nashville/blog/2016/04/why-this-health-tech-group-picked-nashville-not.html.<accessed on 6th Jan 2017>.
[9] http://medicalinteroperability.org/the-patient-safety-movementannounced-49-medical-technology<accessed on 16th Dec 2016>.
[10] T. Choen. Medical and information technologies convergence. IEEE Eng. Med. Biol. Magazine, vol.23, Issue: 3, pp: 59-64, May 2004.
[11] S. L. Grimes. Security: A new clinical engineering paradigm. IEEE Eng. Med. Biol. Magazine, vol.23, Issue: 4, pp: 80-82, August 2004.
[12] N. L. Snee and K. A. McCormick. The case for integrating public health informatics networks, IEEE Eng. Med. Biol. Mag, Vol. 23, Issue:1, pp:81-88,February 2004.
[13] M. Clarke, D. Bogia, K. Hassing, L. Steubesand, T. Chan, and D. Ayyagari. Developing a standard for personal health devices based on 11073. In EMBS, 2007.
[14] K. Venkatasubramanian, E. Vasserman, O. Sokolsky, and I. Lee. Security and interoperable-medical-device systems, part 1. IEEE Security & Privacy, Vol.10, Issue:5, pp: 61-63, 2012.
[15] A. Mashkoor, J. Sametinger, Rigorous modeling and analysis of interoperable medical devices, in: Proceedings of the International Spring Simulation Multi-Conference, Society for Modeling & Simulation, pp. 800–807, 2016.
[16] R. Taylor, K. Venkatasubramanian, Craig A. Shue, Understanding the security of interoperable medical devices, in: Proceedings of the 3rd International Conference on high confidence networked systems, pp.31-40, 2014.