Abstract
The great leap forward of cyber-physical systems has made provision for future personalized medicine. However, these systems are prone to cyber attacks. To provide patients with secure and reliable healthcare experience, the security issues of cyber-physical systems should be thoughtfully studied and addressed. Thus, this chapter initiates a discussion on security for cyber-physical systems. The security issues with their core components, namely wireless body area network , Cloud computing, and 5G are discussed. This chapter also presents an analysis of the potential contribution of virtualization technologies on security enhancement.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Newsroom (ed) (2014) Mhealth, What is it?—Infographic. https://ec.europa.eu/digital-single-market/en/news/mhealth-what-it-infographic. Accessed 24 Sept 2016
Collins FS, Varmus H (2015) A new initiative on precision medicine. New England J Med 372(9):793–795
5G-PPP (2014). https://5g-ppp.eu. Accessed 24 Sept 2016
Choi JS, Zhou M (2010) Recent advances in wireless sensor networks for health monitoring. Int J Intell Control Syst 14:49–58
Vervloet M, Linn AJ, van Weert JC, De Bakker DH, Bouvy M, Van Dijk L (2012) The effectiveness of interventions using electronic reminders to improve adherence to chronic medication: a systematic review of the literature. J Am Med Inform Assoc 19(5):696–704
Rashidi P, Mihailidis A (2013) A survey on ambient-assisted living tools for older adults. IEEE J Biomedical Health Inform 17:579–590. doi:10.1109/JBHI.2012.2234129
Zhang Y, Qiu M, Tsai CW, Hassan MM, Alamri A (2015) Health-CPS: healthcare cyber-physical system assisted by cloud and big data
IEEE Standards Association, 802.15. 6-2012 IEEE standards for local and metropolitan area networks–Part 15.6: Wireless Body Area Networks
Bangash J, Abdullah A, Anisi M, Khan AW (2014) A survey of routing protocols in wireless body sensor networks. Sensors 14:1322–1357. doi:10.3390/s140101322
Zigbee A (2012) ZigBee Security specification overview. http://www.zigbee.org/download/standards-zigbee-specification/. Accessed 24 Sept 2016
Bluetooth (2010) Bluetooth specifications. https://www.bluetooth.org/docman/handlers/downloaddoc.ashx?doc_id=229737. Accessed 24 Sept 2016
Augustin A, Yi J, Clausen T, Townsley WM (2016) A study of LoRa: long range and low power networks for the internet of things. Sensors 16(9):1466
Delmastro F (2012) Pervasive communications in healthcare. Comput Comm 35:1284–1295. doi:10.1016/j.comcom.2012.04.018
Sun J, Zhu X, Zhang C, Fang (2012) Security and privacy for mobile health-care (m-Health) systems. In: Elsevier BV (ed) Handbook on securing cyber-physical critical infrastructure, pp 677–704. doi:10.1016/B978-0-12-415815-3.00027-3
Dariz L, Selvatici M, Ruggeri M, Abrishambaf R (2016) Smart and wearable wireless sensors: scenario analysis and communication issues. In: Proceedings of the 2016 IEEE international conference on industrial technology (ICIT), IEEE, pp 1938–1943. doi:10.1109/ICIT.2016.7475063
News Standards (2016) IEEE Commun Mag 54(7):14–16. doi:10.1109/MCOM.2016.7514158
Gozalvez J (2016) New 3GPP standard for IoT [Mobile Radio]. IEEE Veh Technol Mag 11(1):14–20. doi:10.1109/MVT.2015.2512358
Advanced Pro Heath Jr RW, Honig M, Nagata S, Parkvall S, Soong AC (2016) LTE-Advanced Pro: part 3 [guest editorial]. IEEE Commun Mag 54(7):52–53
Wu H, Cai J, Xiao H, Chen Y, Li YNR, Lu Z (2016) High-rank MIMO precoding for future LTE-Advanced Pro. In: Proceedings of the 2016 IEEE 83rd vehicular technology conference (VTC Spring), IEEE, pp 1–6
Riazul Islam SM, Daehan K, Humaun Kabir M, Hossain M, Kyung-Sup K (2015) The internet of things for health care: a comprehensive survey. IEEE Access 3:678–708. doi:10.1109/ACCESS.2015.2437951
Agrawal VM, Chauhan H (2015) An overview of security issues in mobile ad hoc networks. Int J Comput En Sci 1:9–17. ISSN: 0976-6367
Jo M, Han L, Tan ND, In HP (2015) A survey: Energy exhausting attacks in MAC protocols in WBANs. Telecommun Syst 58:153–164. doi:10.1007/s11235-014-9897-0
Kang J, Adibi S (2015) A review of security protocols in mHealth wireless body area networks (WBAN). In: Communications in computer and Information Science, ed: Springer, Berlin, pp 61–83. doi:10.1007/978-3-319-19210-9_5
Silva BMC, Rodrigues JJPC, de la Torre DÃez I, López-Coronado M, Saleem K (2015) Mobile-health: a review of current state in 2015. J Biomed Inform 56:265–272. doi:10.1016/j.jbi.2015.06.003
Kart F, Miao G, Moser LE, Melliar-Smith P (2007) A distributed e-healthcare system based on the service oriented architecture. In: Proceedings of the IEEE International conference on services computing, SCC 2007, pp 652–659. doi:10.1109/SCC.2007.2
Egbogah EE, Fapojuwo AO (2011) A survey of system architecture requirements for health care-based wireless sensor setworks. Sensors 11:4875–4898. doi:10.3390/s110504875
Ullah S, Mohaisen M, Alnuem MA (2013) A review of IEEE 802.15.6 MAC, PHY, and security specifications. Int J Distrib Sens Netw 2013:1–12. doi:10.1155/2013/950704
Kumar P, Lee HJ (2011) Security issues in healthcare applications using wireless medical sensor networks: a survey. Sensors 12:55–91. doi:10.3390/s120100055
Latré B, Braem B, Moerman I, Blondia C, Demeester P (2010) A survey on wireless body area networks. Wireless Netw 17:1–18. doi:10.1007/s11276-010-0252-4
Hayajneh T, Almashaqbeh G, Ullah S, Vasilakos AV (2014) A survey of wireless technologies coexistence in WBAN: analysis and open research issues. Wireless Netw 20:2165–2199. doi:10.1007/s11276-014-0736-8
Butun I, Morgera SD, Sankar R (2014) A survey of intrusion detection systems in wireless sensor networks. IEEE Comm Survey Tuts 16:266–282. doi:10.1109/SURV.2013.050113.00191
Sawand A, Djahel S, Zhang Z, Nait-Abdesselam F (2015) Toward energy-efficient and trustworthy eHealth monitoring system. China Commun 12:46–65. doi:10.1109/CC.2015.7084383
Saleem K, Derhab A, Orgun MA, Al-Muhtadi J, Rodrigues JJ, Khalil MS, Ali Ahmed A (2016) Cost-effective encryption-based autonomous routing protocol for efficient and secure wireless sensor networks. Sensors 16(4):460
Group IT (2012, 2016). IEEE 802.15 WPAN Task Group 6 body area networks. Available via http://www.ieee802.org/15/pub/TG6.html. Accessed 24 Sept 2016
Suo H et al (2012) Security in the internet of things: a review. In: Proceedings of the 2012 international conference on computer science and electronics engineering (ICCSEE)
Schneider P, Horn G (2015) Towards 5G security. In: Trustcom/BigDataSE/ISPA, 2015 IEEE
Schneider D (2012) The state of network security. Netw Security 2012(2):14–20
Sergey S, Sieber M, Norden M (2015) Azure RMS security evaluation guide. Microsoft
Dowlin N, Gilad-Bachrach R, Laine K, Lauter K, MNaehrig M, Wernsing J (2015) Manual for using homomorphic encryption for bioinformatics. Microsoft Research
Naveed M, Kamara S, Wright CV (2015) Inference attacks on property-preserving encrypted databases. In: Proceedings of the 22nd ACM SIGSAC conference on computer and communications security—CCS’15, pp 644–655
Chen L, Jordan S, Liu Y-K, Moody D, Peralta R, Perlner R, Smith-Tone D (2016) NISTIR 8105 Draft—Report on post-quantum cryptography
Reimsbach-Kounatze C (2015) The proliferation of ‘Big Data’ and implications for official statistics and statistical agencies. Christian Reimsbach-Kounatze
Leimbach T, Hallinan D, Bachlechner D, Weber A, Jaglo M, Hennen L, Nielsen RØ, Nentwich M, Strauß S, Lynn T, Hunt G (2014) Potential and impacts of cloud computing services and social network websites
Khattak HAK, Abbass H, Naeem A, Saleem K, Iqbal W (2015) Security concerns of cloud-based healthcare systems: a perspective of moving from single-cloud to a multi-cloud infrastructure. In: Proceedings of the 2015 17th international conference on e-health networking, application and services (HealthCom), IEEE, pp 61–67
Sajid A, Abbas H, Saleem K (2016) Cloud-assisted IoT-based SCADA systems security: a review of the state of the art and future challenges. IEEE Access 4:1375–1384
Mitra RN, Agrawal DP (2015) 5G mobile technology: a survey. ICT Express 1(3):132–137
Gupta A, Jha RK (2015) A survey of 5G network: architecture and emerging technologies. IEEE Access 3:1206–1232
Bleicher A (2013) The 5G phone future [News]. IEEE Spectr 50(7):15–16
West DM (2016) How 5G technology enables the health internet of things
Zheng J et al (2013) Emerging wearable medical devices towards personalized healthcare. In: Proceedings of the 8th international conference on body area networks. ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), Boston, Massachusetts, pp 427–431
Ojanen T (2016) Making the essence of fundamental rights real: the court of justice of the European Union clarifies the structure of fundamental rights under the charter. Eur Const Law Rev 12(02):318–329
Ferrer-Roca O, Méndez DG (2012) Health 4.0 in the i2i Era. Int J Reliable Qual E-Healthc (IJRQEH) 1(1): 43–57
Abdelwahab S et al (2016) Network function virtualization in 5G. IEEE Comm Mag 54(4):84–91
Hakiri A, Berthou P (2015) Leveraging SDN for the 5G networks, in software defined mobile networks (SDMN). Wiley, New York, pp 61–80
Milenkoski A et al (2016) Security position paper network function virtualization. https://downloads.cloudsecurityalliance.org/assets/research/virtualization/Security_Position_Paper-Network_Function_Virtualization.pdf. Accessed 25 Sept 2016
Agyapong PK et al (2014) Design considerations for a 5G network architecture. IEEE Comm Mag 52(11):65–75
Sgandurra D, Lupu E (2016) Evolution of attacks, threat models, and solutions for virtualized systems. ACM Comput Surv 48(3):1–38
Myerson J (2016) Addressing NFV security issues in the enterprise. http://searchsecurity.techtarget.com/feature/Addressing-NFV-security-issues-in-the-enterprise. Accessed 19 Sept 2016
Au D (2013) Network virtualization and what it means for security. http://www.securityweek.com/network-virtualization-and-what-it-means-security. Accessed 18 Sept 2016
Liyanage M et al (2015) Leveraging LTE security with SDN and NFV. In: Proceedings of the 2015 IEEE 10th international conference on industrial and information systems (ICIIS)
Yan Z, Zhang P, Vasilakos AV (2015) A security and trust framework for virtualized networks and software-defined networking. Security Comm Netw, Security and communication networks. doi:10.1002/sec.1243
Andress J, Winterfeld S (2014) Chapter 10—Computer network attack, in cyber warfare. Syngress, Boston, pp 181–192 (Second Edition)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Saleem, K., Tan, Z., Buchanan, W. (2017). Security for Cyber-Physical Systems in Healthcare. In: Thuemmler, C., Bai, C. (eds) Health 4.0: How Virtualization and Big Data are Revolutionizing Healthcare. Springer, Cham. https://doi.org/10.1007/978-3-319-47617-9_12
Download citation
DOI: https://doi.org/10.1007/978-3-319-47617-9_12
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-47616-2
Online ISBN: 978-3-319-47617-9
eBook Packages: EngineeringEngineering (R0)