Skip to main content

Security for Cyber-Physical Systems in Healthcare

  • Chapter
  • First Online:
Health 4.0: How Virtualization and Big Data are Revolutionizing Healthcare

Abstract

The great leap forward of cyber-physical systems has made provision for future personalized medicine. However, these systems are prone to cyber attacks. To provide patients with secure and reliable healthcare experience, the security issues of cyber-physical systems should be thoughtfully studied and addressed. Thus, this chapter initiates a discussion on security for cyber-physical systems. The security issues with their core components, namely wireless body area network , Cloud computing, and 5G are discussed. This chapter also presents an analysis of the potential contribution of virtualization technologies on security enhancement.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 119.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 159.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 159.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Newsroom (ed) (2014) Mhealth, What is it?—Infographic. https://ec.europa.eu/digital-single-market/en/news/mhealth-what-it-infographic. Accessed 24 Sept 2016

  2. Collins FS, Varmus H (2015) A new initiative on precision medicine. New England J Med 372(9):793–795

    Article  Google Scholar 

  3. 5G-PPP (2014). https://5g-ppp.eu. Accessed 24 Sept 2016

  4. Choi JS, Zhou M (2010) Recent advances in wireless sensor networks for health monitoring. Int J Intell Control Syst 14:49–58

    Google Scholar 

  5. Vervloet M, Linn AJ, van Weert JC, De Bakker DH, Bouvy M, Van Dijk L (2012) The effectiveness of interventions using electronic reminders to improve adherence to chronic medication: a systematic review of the literature. J Am Med Inform Assoc 19(5):696–704

    Article  Google Scholar 

  6. Rashidi P, Mihailidis A (2013) A survey on ambient-assisted living tools for older adults. IEEE J Biomedical Health Inform 17:579–590. doi:10.1109/JBHI.2012.2234129

    Article  Google Scholar 

  7. Zhang Y, Qiu M, Tsai CW, Hassan MM, Alamri A (2015) Health-CPS: healthcare cyber-physical system assisted by cloud and big data

    Google Scholar 

  8. IEEE Standards Association, 802.15. 6-2012 IEEE standards for local and metropolitan area networks–Part 15.6: Wireless Body Area Networks

    Google Scholar 

  9. Bangash J, Abdullah A, Anisi M, Khan AW (2014) A survey of routing protocols in wireless body sensor networks. Sensors 14:1322–1357. doi:10.3390/s140101322

    Article  Google Scholar 

  10. Zigbee A (2012) ZigBee Security specification overview. http://www.zigbee.org/download/standards-zigbee-specification/. Accessed 24 Sept 2016

  11. Bluetooth (2010) Bluetooth specifications. https://www.bluetooth.org/docman/handlers/downloaddoc.ashx?doc_id=229737. Accessed 24 Sept 2016

  12. Augustin A, Yi J, Clausen T, Townsley WM (2016) A study of LoRa: long range and low power networks for the internet of things. Sensors 16(9):1466

    Article  Google Scholar 

  13. Delmastro F (2012) Pervasive communications in healthcare. Comput Comm 35:1284–1295. doi:10.1016/j.comcom.2012.04.018

    Article  Google Scholar 

  14. Sun J, Zhu X, Zhang C, Fang (2012) Security and privacy for mobile health-care (m-Health) systems. In: Elsevier BV (ed) Handbook on securing cyber-physical critical infrastructure, pp 677–704. doi:10.1016/B978-0-12-415815-3.00027-3

  15. Dariz L, Selvatici M, Ruggeri M, Abrishambaf R (2016) Smart and wearable wireless sensors: scenario analysis and communication issues. In: Proceedings of the 2016 IEEE international conference on industrial technology (ICIT), IEEE, pp 1938–1943. doi:10.1109/ICIT.2016.7475063

  16. News Standards (2016) IEEE Commun Mag 54(7):14–16. doi:10.1109/MCOM.2016.7514158

    Article  Google Scholar 

  17. Gozalvez J (2016) New 3GPP standard for IoT [Mobile Radio]. IEEE Veh Technol Mag 11(1):14–20. doi:10.1109/MVT.2015.2512358

    Article  Google Scholar 

  18. Advanced Pro Heath Jr RW, Honig M, Nagata S, Parkvall S, Soong AC (2016) LTE-Advanced Pro: part 3 [guest editorial]. IEEE Commun Mag 54(7):52–53

    Google Scholar 

  19. Wu H, Cai J, Xiao H, Chen Y, Li YNR, Lu Z (2016) High-rank MIMO precoding for future LTE-Advanced Pro. In: Proceedings of the 2016 IEEE 83rd vehicular technology conference (VTC Spring), IEEE, pp 1–6

    Google Scholar 

  20. Riazul Islam SM, Daehan K, Humaun Kabir M, Hossain M, Kyung-Sup K (2015) The internet of things for health care: a comprehensive survey. IEEE Access 3:678–708. doi:10.1109/ACCESS.2015.2437951

    Article  Google Scholar 

  21. Agrawal VM, Chauhan H (2015) An overview of security issues in mobile ad hoc networks. Int J Comput En Sci 1:9–17. ISSN: 0976-6367

    Google Scholar 

  22. Jo M, Han L, Tan ND, In HP (2015) A survey: Energy exhausting attacks in MAC protocols in WBANs. Telecommun Syst 58:153–164. doi:10.1007/s11235-014-9897-0

  23. Kang J, Adibi S (2015) A review of security protocols in mHealth wireless body area networks (WBAN). In: Communications in computer and Information Science, ed: Springer, Berlin, pp 61–83. doi:10.1007/978-3-319-19210-9_5

  24. Silva BMC, Rodrigues JJPC, de la Torre Díez I, López-Coronado M, Saleem K (2015) Mobile-health: a review of current state in 2015. J Biomed Inform 56:265–272. doi:10.1016/j.jbi.2015.06.003

    Article  Google Scholar 

  25. Kart F, Miao G, Moser LE, Melliar-Smith P (2007) A distributed e-healthcare system based on the service oriented architecture. In: Proceedings of the IEEE International conference on services computing, SCC 2007, pp 652–659. doi:10.1109/SCC.2007.2

  26. Egbogah EE, Fapojuwo AO (2011) A survey of system architecture requirements for health care-based wireless sensor setworks. Sensors 11:4875–4898. doi:10.3390/s110504875

    Article  Google Scholar 

  27. Ullah S, Mohaisen M, Alnuem MA (2013) A review of IEEE 802.15.6 MAC, PHY, and security specifications. Int J Distrib Sens Netw 2013:1–12. doi:10.1155/2013/950704

    Article  Google Scholar 

  28. Kumar P, Lee HJ (2011) Security issues in healthcare applications using wireless medical sensor networks: a survey. Sensors 12:55–91. doi:10.3390/s120100055

    Article  Google Scholar 

  29. Latré B, Braem B, Moerman I, Blondia C, Demeester P (2010) A survey on wireless body area networks. Wireless Netw 17:1–18. doi:10.1007/s11276-010-0252-4

    Article  Google Scholar 

  30. Hayajneh T, Almashaqbeh G, Ullah S, Vasilakos AV (2014) A survey of wireless technologies coexistence in WBAN: analysis and open research issues. Wireless Netw 20:2165–2199. doi:10.1007/s11276-014-0736-8

    Article  Google Scholar 

  31. Butun I, Morgera SD, Sankar R (2014) A survey of intrusion detection systems in wireless sensor networks. IEEE Comm Survey Tuts 16:266–282. doi:10.1109/SURV.2013.050113.00191

    Article  Google Scholar 

  32. Sawand A, Djahel S, Zhang Z, Nait-Abdesselam F (2015) Toward energy-efficient and trustworthy eHealth monitoring system. China Commun 12:46–65. doi:10.1109/CC.2015.7084383

    Article  Google Scholar 

  33. Saleem K, Derhab A, Orgun MA, Al-Muhtadi J, Rodrigues JJ, Khalil MS, Ali Ahmed A (2016) Cost-effective encryption-based autonomous routing protocol for efficient and secure wireless sensor networks. Sensors 16(4):460

    Article  Google Scholar 

  34. Group IT (2012, 2016). IEEE 802.15 WPAN Task Group 6 body area networks. Available via http://www.ieee802.org/15/pub/TG6.html. Accessed 24 Sept 2016

  35. Suo H et al (2012) Security in the internet of things: a review. In: Proceedings of the 2012 international conference on computer science and electronics engineering (ICCSEE)

    Google Scholar 

  36. Schneider P, Horn G (2015) Towards 5G security. In: Trustcom/BigDataSE/ISPA, 2015 IEEE

    Google Scholar 

  37. Schneider D (2012) The state of network security. Netw Security 2012(2):14–20

    Article  Google Scholar 

  38. Sergey S, Sieber M, Norden M (2015) Azure RMS security evaluation guide. Microsoft

    Google Scholar 

  39. Dowlin N, Gilad-Bachrach R, Laine K, Lauter K, MNaehrig M, Wernsing J (2015) Manual for using homomorphic encryption for bioinformatics. Microsoft Research

    Google Scholar 

  40. Naveed M, Kamara S, Wright CV (2015) Inference attacks on property-preserving encrypted databases. In: Proceedings of the 22nd ACM SIGSAC conference on computer and communications security—CCS’15, pp 644–655

    Google Scholar 

  41. Chen L, Jordan S, Liu Y-K, Moody D, Peralta R, Perlner R, Smith-Tone D (2016) NISTIR 8105 Draft—Report on post-quantum cryptography

    Google Scholar 

  42. Reimsbach-Kounatze C (2015) The proliferation of ‘Big Data’ and implications for official statistics and statistical agencies. Christian Reimsbach-Kounatze

    Google Scholar 

  43. Leimbach T, Hallinan D, Bachlechner D, Weber A, Jaglo M, Hennen L, Nielsen RØ, Nentwich M, Strauß S, Lynn T, Hunt G (2014) Potential and impacts of cloud computing services and social network websites

    Google Scholar 

  44. Khattak HAK, Abbass H, Naeem A, Saleem K, Iqbal W (2015) Security concerns of cloud-based healthcare systems: a perspective of moving from single-cloud to a multi-cloud infrastructure. In: Proceedings of the 2015 17th international conference on e-health networking, application and services (HealthCom), IEEE, pp 61–67

    Google Scholar 

  45. Sajid A, Abbas H, Saleem K (2016) Cloud-assisted IoT-based SCADA systems security: a review of the state of the art and future challenges. IEEE Access 4:1375–1384

    Article  Google Scholar 

  46. Mitra RN, Agrawal DP (2015) 5G mobile technology: a survey. ICT Express 1(3):132–137

    Article  Google Scholar 

  47. Gupta A, Jha RK (2015) A survey of 5G network: architecture and emerging technologies. IEEE Access 3:1206–1232

    Article  Google Scholar 

  48. Bleicher A (2013) The 5G phone future [News]. IEEE Spectr 50(7):15–16

    Article  Google Scholar 

  49. West DM (2016) How 5G technology enables the health internet of things

    Google Scholar 

  50. Zheng J et al (2013) Emerging wearable medical devices towards personalized healthcare. In: Proceedings of the 8th international conference on body area networks. ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), Boston, Massachusetts, pp 427–431

    Google Scholar 

  51. Ojanen T (2016) Making the essence of fundamental rights real: the court of justice of the European Union clarifies the structure of fundamental rights under the charter. Eur Const Law Rev 12(02):318–329

    Article  Google Scholar 

  52. Ferrer-Roca O, Méndez DG (2012) Health 4.0 in the i2i Era. Int J Reliable Qual E-Healthc (IJRQEH) 1(1): 43–57

    Google Scholar 

  53. Abdelwahab S et al (2016) Network function virtualization in 5G. IEEE Comm Mag 54(4):84–91

    Article  Google Scholar 

  54. Hakiri A, Berthou P (2015) Leveraging SDN for the 5G networks, in software defined mobile networks (SDMN). Wiley, New York, pp 61–80

    Google Scholar 

  55. Milenkoski A et al (2016) Security position paper network function virtualization. https://downloads.cloudsecurityalliance.org/assets/research/virtualization/Security_Position_Paper-Network_Function_Virtualization.pdf. Accessed 25 Sept 2016

  56. Agyapong PK et al (2014) Design considerations for a 5G network architecture. IEEE Comm Mag 52(11):65–75

    Article  Google Scholar 

  57. Sgandurra D, Lupu E (2016) Evolution of attacks, threat models, and solutions for virtualized systems. ACM Comput Surv 48(3):1–38

    Article  Google Scholar 

  58. Myerson J (2016) Addressing NFV security issues in the enterprise. http://searchsecurity.techtarget.com/feature/Addressing-NFV-security-issues-in-the-enterprise. Accessed 19 Sept 2016

  59. Au D (2013) Network virtualization and what it means for security. http://www.securityweek.com/network-virtualization-and-what-it-means-security. Accessed 18 Sept 2016

  60. Liyanage M et al (2015) Leveraging LTE security with SDN and NFV. In: Proceedings of the 2015 IEEE 10th international conference on industrial and information systems (ICIIS)

    Google Scholar 

  61. Yan Z, Zhang P, Vasilakos AV (2015) A security and trust framework for virtualized networks and software-defined networking. Security Comm Netw, Security and communication networks. doi:10.1002/sec.1243

    Google Scholar 

  62. Andress J, Winterfeld S (2014) Chapter 10—Computer network attack, in cyber warfare. Syngress, Boston, pp 181–192 (Second Edition)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kashif Saleem .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Saleem, K., Tan, Z., Buchanan, W. (2017). Security for Cyber-Physical Systems in Healthcare. In: Thuemmler, C., Bai, C. (eds) Health 4.0: How Virtualization and Big Data are Revolutionizing Healthcare. Springer, Cham. https://doi.org/10.1007/978-3-319-47617-9_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-47617-9_12

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-47616-2

  • Online ISBN: 978-3-319-47617-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics