Using Fuzzy Cognitive Map Approach for Assessing Cybersecurity for Telehealth Scenario

  • Thiago PoletoEmail author
  • Rodrigo Cleiton Paiva de Oliveira
  • Ayara Letícia Bentes da Silva
  • Victor Diogho Heuer de Carvalho
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1160)


Health organizations are investing in the development of telehealth systems to expand advances in health care to the homes of the Brazilian population. The adoption of telehealth aims to broaden basic monitoring and promote access to health services. Telehealth systems present a confidential data set containing patient health history, medication prescriptions, and medical diagnostics. However, in Brazil, there are no cybersecurity studies to address factors that impact patient manipulation and data transfer. Understanding cybersecurity impacts is critical for telehealth development strategies. The research reported here used several factors related to cyberattacks and cybersecurity vulnerabilities, combined with the approach to Fuzzy Cognitive Maps (FCMs), to identify the links between these elements. An evaluation using FCMs has proven to be able to describe the complexity of the system by providing an appropriate visual tool for staff to develop planning. The experimental results of the study contributed to supporting cybersecurity improvements in telehealth.


Telehealth Cybersecurity Cyberattacks Fuzzy Cognitive Maps 



This research was partially supported by a foundation affiliated with the Ministry of Education in Brazil, and the Brazilian National Research Council (CNPq). The authors would like to acknowledge PROPESP/UFPA.


  1. 1.
    Bernardes, A.C.F., Coimbra, L.C., Serra, H.O.: Use of Maranhão Telehealth Program as a tool to support continuing health education. Rev. Panam. Salud Pública 42, 1–9 (2018)CrossRefGoogle Scholar
  2. 2.
    Brazil: Telehealth Core Costs - Instruction Manual, National Telehealth Brazil Network Program. Ministry of Health (2015)Google Scholar
  3. 3.
    Kruse, C.S., Krowski, N., Rodriguez, B., Tran, L., Vela, J., Brooks, M.: Telehealth and patient satisfaction: a systematic review and narrative analysis. BMJ Open 7(8), 1–12 (2017)CrossRefGoogle Scholar
  4. 4.
    Ahmed, Y., Naqvi, S., Josephs, M.: Cybersecurity metrics for enhanced protection of healthcare IT systems. In: 2019 13th International Symposium on Medical Information and Communication Technology (ISMICT), Oslo, Norway, pp 1–9 (2019)Google Scholar
  5. 5.
    KPMG: Health Care and Cyber Security: Increasing Threats Require Increased Capabilities, (2018)Google Scholar
  6. 6.
    Zhou, L., Thieret, R., Watzlaf, V., Dealmeida, D., Parmanto, B.: A telehealth privacy and security self-assessment questionnaire for telehealth providers: development and validation. Int. J. Telerehabilitation 11(1), 3–14 (2019)CrossRefGoogle Scholar
  7. 7.
    Arbelaez, A.: Securing Telehealth Remote Patient Monitoring Ecosystem Cybersecurity for the Healthcare Sector. National Institute of Standards and Technology (NIST), November 2018Google Scholar
  8. 8.
    de Gusmão, A.P.H., Silva, M.M., Poleto, T., e Silva, L.C., Costa, A.P.C.S.: Cybersecurity risk analysis model using fault tree analysis and fuzzy decision theory. Int. J. Inf. Manag. 43, 248–260 (2018)CrossRefGoogle Scholar
  9. 9.
    Montero-Canela, R., Zambrano-Serrano, E., Tamariz-Flores, E.I., Muñoz-Pacheco, J.M., Torrealba-Meléndez, R.: Fractional chaos based-cryptosystem for generating encryption keys in Ad Hoc networks. Ad Hoc Netw. 97, 102005 (2019)CrossRefGoogle Scholar
  10. 10.
    Andriole, K.P.: Security of electronic medical information and patient privacy: what you need to know. J. Am. Coll. Radiol. 11(12), 1212–1216 (2014)CrossRefGoogle Scholar
  11. 11.
    Nagasubramanian, G., Sakthivel, R.K., Patan, R., et al.: Securing e-health records using keyless signature infrastructure blockchain technology in the cloud. Neural Comput. Appl. 32, 639–647 (2020). Scholar
  12. 12.
    Davidson, E., Simpson, C.R., Demiris, G., Sheikh, A., McKinstry, B.: Integrating telehealth care-generated data with the family practice electronic medical record: qualitative exploration of the views of primary care staff. Interact. J. Med. Res. 26, e29 (2013)CrossRefGoogle Scholar
  13. 13.
    Li, Y., Fuller, B., Stafford, T., Ellis, S.: Information securing in organizations: a dialectic perspective. In: SIGMIS-CPR 2019 – Proceedings of the 2019 Computer and People Research Conference, pp 125–130 (2019)Google Scholar
  14. 14.
    Jennett, P.A., Andruchuk, K.: Telehealth: ‘real life’ implementation issues. Comput. Methods Programs Biomed. 64(3), 169–174 (2001)CrossRefGoogle Scholar
  15. 15.
    Tweneboah-Koduah, S., Skouby, K.E., Tadayoni, R.: Cyber security threats to IoT applications and service domains. Wirel. Pers. Commun. 95(1), 169–185 (2017)CrossRefGoogle Scholar
  16. 16.
    Nesbitt, T.S., Cole, S.L., Pellegrino, L., Keast, P.: Rural outreach in home telehealth: assessing challenges and reviewing successes. Telemed. J. E Health 12, 2 (2006)CrossRefGoogle Scholar
  17. 17.
    Makhdoom, I., Abolhasan, M., Lipman, J., Liu, R.P., Ni, W.: Anatomy of threats to the internet of things. IEEE Commun. Surv. Tutor. 21(2), 1636–1675 (2019). SecondquarterCrossRefGoogle Scholar
  18. 18.
    Dondossola, G., Garrone, F., Szanto, J.: Cyber risk assessment of power control systems - a metrics weighed by attack experiments. In: IEEE Power and Energy Society General Meeting, pp 1–9 (2011)Google Scholar
  19. 19.
    Zheng,Y., Zhang, X.: Path sensitive static analysis of web applications for remote code execution vulnerability detection, In: Proceedings of the International Conference on Software Engineering, pp 652–661 (2013)Google Scholar
  20. 20.
    Rebollo, O., Mellado, D., Fernández-Medina, E.: A systematic review of information security governance frameworks in the cloud computing environment. J. Univers. Comput. Sci. 18(6), 798–815 (2012)Google Scholar
  21. 21.
    Raoof, A. Matrawy, A.: The effect of buffer management strategies on 6LoWPAN’s response to buffer reservation attacks. In: IEEE International Conference on Communication, pp 1–7 (2017)Google Scholar
  22. 22.
    Liu, M., Li, K., Chen, T.: Security testing of web applications: a search-based approach for detecting SQL injection vulnerabilities. In: Companion - Proceedings of the 2019 Genetic and Evolutionary Computation Conference Companion (GECCO 2019), pp 417–418 (2019)Google Scholar
  23. 23.
    Krishnan, S., Anjana, M.S., Rao, S.N.: Security considerations for IoT in smart buildings. In: IEEE International Conference on Computational Intelligence and Computing Research (ICCIC 2017), Coimbatore, pp. 1–4 (2017)Google Scholar
  24. 24.
    Iglesias, F., Zseby, T.: Analysis of network traffic features for anomaly detection. Mach. Learn. 101(1–3), 59–84 (2015)MathSciNetCrossRefGoogle Scholar
  25. 25.
    Qin, F., Lu, S., Zhou, Y.: SafeMem: exploiting ECC-memory for detecting memory leaks and memory corruption during production runs. In: Proceedings of the International Symposium on High-Performance Computer Architecture, pp 291–302 (2005)Google Scholar
  26. 26.
    Falcarin, P., Scandariato, R., Baldi, M.: Remote trust with aspect-oriented programming. In: Proceedings of the International Conference on Advanced Information Networking and Applications (AINA 2006), vol. 1, pp 451–456 (2006)Google Scholar
  27. 27.
    Arjunkar, M.R., Sambare, A.S., Jain, S.R.: A survey on: detection & prevention of energy draining attacks (vampire attacks). Int. J. Comput. Sci. Appl. 8(1), 13–16 (2015)Google Scholar
  28. 28.
    Fournaris, A.P., Fraile, L.P., Koufopavlou, O.: Exploiting hardware vulnerabilities to attack embedded system devices: a survey of potent microarchitectural attacks. Electronics 6, 3 (2017)CrossRefGoogle Scholar
  29. 29.
    Kosko, B.: Fuzzy cognitive maps. Int. J. Man Mach. Stud. 24(1), 65–75 (1986)CrossRefGoogle Scholar
  30. 30.
    Stylios, C.D., Groumpos, P.P.: Fuzzy cognitive maps multi-model for complex. Manufact. Syst. 34, 8 (2001)Google Scholar
  31. 31.
    Papageorgiou, E.I., Hatwágner, M.F., Buruzs, A., Kóczy, L.T.: A concept reduction approach for fuzzy cognitive map models in decision making and management. Neurocomputing 232, 16–33 (2017)CrossRefGoogle Scholar
  32. 32.
    Papageorgiou, E.I., Subramanian, J., Karmegam, A., Papandrianos, N.: A risk management model for familial breast cancer: a new application using Fuzzy Cognitive Map method. Comput. Methods Programs Biomed. 122(2), 123–135 (2015)CrossRefGoogle Scholar
  33. 33.
    Chandrasekaran, A.D., Ramkumar, C., Siva E.P., Balaji, N.: Average maps model of super fuzzy cognitive to analyze middle class family problem. In: AIP Conference Proceedings, vol. 2112(1) (2019)Google Scholar
  34. 34.
    Mirghafoori, S.H., Sharifabadi, A.M., Takalo, S.K.: Development of causal model of sustainable hospital supply chain management using the intuitionistic fuzzy cognitive map (IFCM) method. J. Ind. Eng. Manag. 11(3), 588–605 (2018)Google Scholar
  35. 35.
    López, C., Ishizaka, A.: A hybrid FCM-AHP approach to predict impacts of offshore outsourcing location decisions on supply chain resilience. J. Bus. Res. 103(2017), 495–507 (2017)Google Scholar
  36. 36.
    Anninou, A.P., Groumpos, P.P., Polychronopoulos, P.: Modeling health diseases using competitive fuzzy cognitive maps. In: IFIP Advances in Information and Communication Technology (2013)Google Scholar
  37. 37.
    Karagiannis, I.E. Groumpos, P.P.: Modeling and analysis of a hybrid-energy system using fuzzy cognitive maps. In: 2013 21st Mediterranean Conference on Control and Automation (MED 2013) - Conference Proceedings (2013)Google Scholar

Copyright information

© The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2020

Authors and Affiliations

  • Thiago Poleto
    • 1
    Email author
  • Rodrigo Cleiton Paiva de Oliveira
    • 1
  • Ayara Letícia Bentes da Silva
    • 1
  • Victor Diogho Heuer de Carvalho
    • 2
  1. 1.Universidade Federal Do ParáBelémBrazil
  2. 2.Universidade Federal AlagoasDelmiro GouveiaBrazil

Personalised recommendations