Abstract
False data injection attacks (FDIA) are widely studied mainly in the area of smart grid, power systems and wireless sensor networks. In this paper, an overview of the FDIA is proposed including the definition and detection techniques proposed so far. The main focus of this paper is to create awareness about the impact of the FDIA in domains other than smart grid such as healthcare. The impact of FDIA in healthcare is overlooked for last couple of years around the globe. However, the recent information security incidents rise in the healthcare sector reaffirms the requirements of preventive measures for FDIA in healthcare. In this paper, we also focus on the emerging attacks on the healthcare domain to understand the importance of FDIA prevention techniques.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ahmed, M., Mahmood, A.N., Hu, J.: A survey of network anomaly detection techniques. J. Netw. Comput. Appl. 60, 19–31 (2016)
Ahmed, M., Mahmood, A.N., Hu, J.: Outlier detection, Chap. 1. In: The State of the Art in Intrusion Prevention and Detection, pp. 3–21. CRC Press, New York, January 2014
Ahmed, M., Mahmood, A.N., Islam, M.R.: A survey of anomaly detection techniques in financial domain. Future Gener. Comput. Syst. 55, 278–288 (2016)
Ahmed, M., Mahmood, A.N.: A novel approach for outlier detection and clustering improvement. In: 2013 8th IEEE Conference on Industrial Electronics and Applications (ICIEA), pp. 577–582, June 2013
Buczak, A.L., Guven, E.: A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Commun. Surv. Tutor. 18(2), 1153–1176 (2016)
Chen, J., Liang, G., Cai, Z., Hu, C., Xu, Y., Luo, F., Zhao, J.: Impact analysis of false data injection attacks on power system static security assessment. J. Mod. Power Syst. Clean Energy 4(3), 496–505 (2016)
Healthcare top target for cyberattacks in 2017: Experian predicts. http://www.healthcareitnews.com/news/. Accessed 12 May 2017
Cyber Attacks: In the Healthcare Sector. https://www.cisecurity.org/. Accessed 12 May 2017
Pachauri, G., Sharma, S.: Anomaly detection in medical wireless sensor networks using machine learning algorithms. Procedia Comput. Sci. 70, 325–333 (2015)
Salem, O., Guerassimov, A., Mehaoua, A., Marcus, A., Furht, B.: Anomaly detection scheme for medical wireless sensor networks. In: Furht, B., Agarwal, A. (eds.) Handbook of Medical and Healthcare Technologies, pp. 207–222. Springer, New York (2013). https://doi.org/10.1007/978-1-4614-8495-0_8
Salem, O., Guerassimov, A., Mehaoua, A., Marcus, A., Furht, B.: Sensor fault and patient anomaly detection and classification in medical wireless sensor networks. In: 2013 IEEE International Conference on Communications (ICC), pp. 4373–4378, June 2013
Haque, S.A., Rahman, M., Aziz, S.M.: Sensor anomaly detection in wireless sensor networks for healthcare. Sensors 15, 8764–8786 (2015)
Ahmed, M., Anwar, A., Mahmood, A.N., Shah, Z., Maher, M.J.: An investigation of performance analysis of anomaly detection techniques for big data in SCADA systems. EAI Endorsed Trans. Ind. Netw. Intell. Syst. 15(3), 5 (2015)
Liu, Y., Ning, P., Reiter, M.K.: False data injection attacks against state estimation in electric power grids. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS 1909, pp. 21–32. ACM, New York (2009)
Liu, Y., Ning, P., Reiter, M.K.: False data injection attacks against state estimation in electric power grids. ACM Trans. Inf. Syst. Secur. 14(1), 13:1–13:33 (2011)
Alemdar, H., Ersoy, C.: Wireless sensor networks for healthcare: a survey. Comput. Netw. 54(15), 2688–2710 (2010)
Tang, B., Yan, J., Kay, S., He, H.: Detection of false data injection attacks in smart grid under colored Gaussian noise. In: 2016 IEEE Conference on Communications and Network Security (CNS), pp. 172–179, October 2016
Chen, P.Y., Yang, S., McCann, J.A., Lin, J., Yang, X.: Detection of false data injection attacks in smart-grid systems. IEEE Commun. Mag. 53(2), 206–213 (2015)
Zhu, S., Setia, S., Jajodia, S., Ning, P.: Interleaved hop-by-hop authentication against false data injection attacks in sensor networks. ACM Trans. Sen. Netw. 3(3), 14 (2007)
Xie, L., Mo, Y., Sinopoli, B.: False data injection attacks in electricity markets. In: 2010 First IEEE International Conference on Smart Grid Communications, pp. 226–231, October 2010
Mo, Y., Sinopoli, B.: False data injection attacks in control systems. In: First Workshop on Secure Control Systems, CPS Week, pp. 226–231 (2010)
Rahman, M.A., Mohsenian-Rad, H.: False data injection attacks with incomplete information against smart power grids. In: 2012 IEEE Global Communications Conference (GLOBECOM), pp. 3153–3158, December 2012
Manandhar, K., Cao, X., Hu, F., Liu, Y.: Combating false data injection attacks in smart grid using kalman filter. In ICNC, pp. 16–20. IEEE (2014)
Welch, G., Bishop, G.: An introduction to the kalman filter. Technical report, Chapel Hill, NC, USA (1995)
Abdallah, A., Shen, X.S.: Efficient prevention technique for false data injection attack in smart grid. In: 2016 IEEE International Conference on Communications (ICC), pp. 1–6, May 2016
Healthcare Breach Report 2016. http://www.ciphertex.com/. Accessed 12 May 2017
Insurance Fraud: Community Health Systems. https://www.justice.gov/. Accessed 12 May 2017
Community Health Systems, Inc. http://www.chs.net/. Accessed 12 May 2017
Ransomware: Hollywood Presbyterian Medical Center. http://resources.infosecinstitute.com/category/healthcare-information-security/. Accessed 12 May 2017
Why Health Care is Especially Vulnerable to Ransomware Attacks. http://fortune.com/2017/05/15/ransomware-attack-healthcare/. Accessed 12 May 2017
Ransomeware Rising. http://www.healthcareitnews.com/news/ransomware. Accessed 12 May 2017
Why Health Care is Especially Vulnerable to Ransomware Attacks. http://www.verizonenterprise.com. Accessed 12 May 2017
90,000 Patients Compromised at UW Medicine. https://www.infosecurity-magazine.com/. Accessed 12 May 2017
Ahmed, M., Kaysar, J.: Phishing attack protection-PAP-approaches for fairness in web usage. Int. J. Comput. Sci. Issues 8(6), 258–261 (2011)
MEDJACK: UCLA Health. http://pulse.embs.org/may-2016/healthcare-hacked/. Accessed 12 May 2017
Healthcare organizations boost spending on cyber security. https://betanews.com/2017/02/21/healthcare-security-spending/. Accessed 12 May 2017
High demand for medical records in the black market. https://www.promisec.com/industries/health-care/. Accessed 12 May 2017
Morrow, B.: BYOD security challenges: control and protect your most sensitive data. Netw. Secur. 2012(12), 5–8 (2012)
Cyber attacks: a growing risk for healthcare professionals. https://securitybrief.com.au. Accessed 12 May 2017
The World’s specialist insurance market. https://www.lloyds.com/. Accessed 12 May 2017
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Ahmed, M., Barkat Ullah, A.S.S.M. (2018). False Data Injection Attacks in Healthcare. In: Boo, Y., Stirling, D., Chi, L., Liu, L., Ong, KL., Williams, G. (eds) Data Mining. AusDM 2017. Communications in Computer and Information Science, vol 845. Springer, Singapore. https://doi.org/10.1007/978-981-13-0292-3_12
Download citation
DOI: https://doi.org/10.1007/978-981-13-0292-3_12
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-0291-6
Online ISBN: 978-981-13-0292-3
eBook Packages: Computer ScienceComputer Science (R0)