Skip to main content

False Data Injection Attacks in Healthcare

  • Conference paper
  • First Online:
Data Mining (AusDM 2017)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 845))

Included in the following conference series:

Abstract

False data injection attacks (FDIA) are widely studied mainly in the area of smart grid, power systems and wireless sensor networks. In this paper, an overview of the FDIA is proposed including the definition and detection techniques proposed so far. The main focus of this paper is to create awareness about the impact of the FDIA in domains other than smart grid such as healthcare. The impact of FDIA in healthcare is overlooked for last couple of years around the globe. However, the recent information security incidents rise in the healthcare sector reaffirms the requirements of preventive measures for FDIA in healthcare. In this paper, we also focus on the emerging attacks on the healthcare domain to understand the importance of FDIA prevention techniques.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ahmed, M., Mahmood, A.N., Hu, J.: A survey of network anomaly detection techniques. J. Netw. Comput. Appl. 60, 19–31 (2016)

    Article  Google Scholar 

  2. Ahmed, M., Mahmood, A.N., Hu, J.: Outlier detection, Chap. 1. In: The State of the Art in Intrusion Prevention and Detection, pp. 3–21. CRC Press, New York, January 2014

    Google Scholar 

  3. Ahmed, M., Mahmood, A.N., Islam, M.R.: A survey of anomaly detection techniques in financial domain. Future Gener. Comput. Syst. 55, 278–288 (2016)

    Article  Google Scholar 

  4. Ahmed, M., Mahmood, A.N.: A novel approach for outlier detection and clustering improvement. In: 2013 8th IEEE Conference on Industrial Electronics and Applications (ICIEA), pp. 577–582, June 2013

    Google Scholar 

  5. Buczak, A.L., Guven, E.: A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Commun. Surv. Tutor. 18(2), 1153–1176 (2016)

    Article  Google Scholar 

  6. Chen, J., Liang, G., Cai, Z., Hu, C., Xu, Y., Luo, F., Zhao, J.: Impact analysis of false data injection attacks on power system static security assessment. J. Mod. Power Syst. Clean Energy 4(3), 496–505 (2016)

    Article  Google Scholar 

  7. Healthcare top target for cyberattacks in 2017: Experian predicts. http://www.healthcareitnews.com/news/. Accessed 12 May 2017

  8. Cyber Attacks: In the Healthcare Sector. https://www.cisecurity.org/. Accessed 12 May 2017

  9. Pachauri, G., Sharma, S.: Anomaly detection in medical wireless sensor networks using machine learning algorithms. Procedia Comput. Sci. 70, 325–333 (2015)

    Article  Google Scholar 

  10. Salem, O., Guerassimov, A., Mehaoua, A., Marcus, A., Furht, B.: Anomaly detection scheme for medical wireless sensor networks. In: Furht, B., Agarwal, A. (eds.) Handbook of Medical and Healthcare Technologies, pp. 207–222. Springer, New York (2013). https://doi.org/10.1007/978-1-4614-8495-0_8

    Chapter  Google Scholar 

  11. Salem, O., Guerassimov, A., Mehaoua, A., Marcus, A., Furht, B.: Sensor fault and patient anomaly detection and classification in medical wireless sensor networks. In: 2013 IEEE International Conference on Communications (ICC), pp. 4373–4378, June 2013

    Google Scholar 

  12. Haque, S.A., Rahman, M., Aziz, S.M.: Sensor anomaly detection in wireless sensor networks for healthcare. Sensors 15, 8764–8786 (2015)

    Article  Google Scholar 

  13. Ahmed, M., Anwar, A., Mahmood, A.N., Shah, Z., Maher, M.J.: An investigation of performance analysis of anomaly detection techniques for big data in SCADA systems. EAI Endorsed Trans. Ind. Netw. Intell. Syst. 15(3), 5 (2015)

    Google Scholar 

  14. Liu, Y., Ning, P., Reiter, M.K.: False data injection attacks against state estimation in electric power grids. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS 1909, pp. 21–32. ACM, New York (2009)

    Google Scholar 

  15. Liu, Y., Ning, P., Reiter, M.K.: False data injection attacks against state estimation in electric power grids. ACM Trans. Inf. Syst. Secur. 14(1), 13:1–13:33 (2011)

    Article  Google Scholar 

  16. Alemdar, H., Ersoy, C.: Wireless sensor networks for healthcare: a survey. Comput. Netw. 54(15), 2688–2710 (2010)

    Article  Google Scholar 

  17. Tang, B., Yan, J., Kay, S., He, H.: Detection of false data injection attacks in smart grid under colored Gaussian noise. In: 2016 IEEE Conference on Communications and Network Security (CNS), pp. 172–179, October 2016

    Google Scholar 

  18. Chen, P.Y., Yang, S., McCann, J.A., Lin, J., Yang, X.: Detection of false data injection attacks in smart-grid systems. IEEE Commun. Mag. 53(2), 206–213 (2015)

    Article  Google Scholar 

  19. Zhu, S., Setia, S., Jajodia, S., Ning, P.: Interleaved hop-by-hop authentication against false data injection attacks in sensor networks. ACM Trans. Sen. Netw. 3(3), 14 (2007)

    Article  Google Scholar 

  20. Xie, L., Mo, Y., Sinopoli, B.: False data injection attacks in electricity markets. In: 2010 First IEEE International Conference on Smart Grid Communications, pp. 226–231, October 2010

    Google Scholar 

  21. Mo, Y., Sinopoli, B.: False data injection attacks in control systems. In: First Workshop on Secure Control Systems, CPS Week, pp. 226–231 (2010)

    Google Scholar 

  22. Rahman, M.A., Mohsenian-Rad, H.: False data injection attacks with incomplete information against smart power grids. In: 2012 IEEE Global Communications Conference (GLOBECOM), pp. 3153–3158, December 2012

    Google Scholar 

  23. Manandhar, K., Cao, X., Hu, F., Liu, Y.: Combating false data injection attacks in smart grid using kalman filter. In ICNC, pp. 16–20. IEEE (2014)

    Google Scholar 

  24. Welch, G., Bishop, G.: An introduction to the kalman filter. Technical report, Chapel Hill, NC, USA (1995)

    Google Scholar 

  25. Abdallah, A., Shen, X.S.: Efficient prevention technique for false data injection attack in smart grid. In: 2016 IEEE International Conference on Communications (ICC), pp. 1–6, May 2016

    Google Scholar 

  26. Healthcare Breach Report 2016. http://www.ciphertex.com/. Accessed 12 May 2017

  27. Insurance Fraud: Community Health Systems. https://www.justice.gov/. Accessed 12 May 2017

  28. Community Health Systems, Inc. http://www.chs.net/. Accessed 12 May 2017

  29. Ransomware: Hollywood Presbyterian Medical Center. http://resources.infosecinstitute.com/category/healthcare-information-security/. Accessed 12 May 2017

  30. Why Health Care is Especially Vulnerable to Ransomware Attacks. http://fortune.com/2017/05/15/ransomware-attack-healthcare/. Accessed 12 May 2017

  31. Ransomeware Rising. http://www.healthcareitnews.com/news/ransomware. Accessed 12 May 2017

  32. Why Health Care is Especially Vulnerable to Ransomware Attacks. http://www.verizonenterprise.com. Accessed 12 May 2017

  33. 90,000 Patients Compromised at UW Medicine. https://www.infosecurity-magazine.com/. Accessed 12 May 2017

  34. Ahmed, M., Kaysar, J.: Phishing attack protection-PAP-approaches for fairness in web usage. Int. J. Comput. Sci. Issues 8(6), 258–261 (2011)

    Google Scholar 

  35. MEDJACK: UCLA Health. http://pulse.embs.org/may-2016/healthcare-hacked/. Accessed 12 May 2017

  36. Healthcare organizations boost spending on cyber security. https://betanews.com/2017/02/21/healthcare-security-spending/. Accessed 12 May 2017

  37. High demand for medical records in the black market. https://www.promisec.com/industries/health-care/. Accessed 12 May 2017

  38. Morrow, B.: BYOD security challenges: control and protect your most sensitive data. Netw. Secur. 2012(12), 5–8 (2012)

    Article  Google Scholar 

  39. Cyber attacks: a growing risk for healthcare professionals. https://securitybrief.com.au. Accessed 12 May 2017

  40. The World’s specialist insurance market. https://www.lloyds.com/. Accessed 12 May 2017

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohiuddin Ahmed .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ahmed, M., Barkat Ullah, A.S.S.M. (2018). False Data Injection Attacks in Healthcare. In: Boo, Y., Stirling, D., Chi, L., Liu, L., Ong, KL., Williams, G. (eds) Data Mining. AusDM 2017. Communications in Computer and Information Science, vol 845. Springer, Singapore. https://doi.org/10.1007/978-981-13-0292-3_12

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-0292-3_12

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-0291-6

  • Online ISBN: 978-981-13-0292-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics