Dynamic risk assessment approach for analysing cyber security events in medical IoT networks

被引:0
|
作者
Czekster, Ricardo M. [1 ]
Webber, Thais [1 ]
Furstenau, Leonardo Bertolin [2 ]
Marcon, Cesar [3 ]
机构
[1] Aston Univ, Sch Comp Sci & Digital Technol, Aston St, Birmingham B4 7ET, England
[2] Univ Fed Rio Grande do Sul, Grad Program Ind Engn, UFRGS, BR-90035190 Porto Alegre, Brazil
[3] PUCRS Univ, Grad Program Comp Sci PPGCC, Ave Ipiranga 6681, BR-90619900 Porto Alegre, RS, Brazil
关键词
Medical Internet of Things (MIoT); Cyber security; Dynamic risk assessment; Simulation models; Data integration; Threat analysis; INTERNET; THINGS; ENVIRONMENT; CHALLENGES; DEVICES; ATTACK;
D O I
10.1016/j.iot.2024.101437
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Advancements in Medical Internet of Things (MIoT) technology ease remote health monitoring and effective management of medical devices. However, these developments also expose systems to novel cyber security risks as sophisticated threat actors exploit infrastructure vulnerabilities to access sensitive data or deploy malicious software, threatening patient safety, device reliability, and trust. This paper introduces a lightweight dynamic risk assessment approach using scenario-based simulations to analyse cyber security events in MIoT infrastructures and supplement cyber security activities within organisations. The approach includes synthetic data and threat models to enrich discrete-event simulations, offering a comprehensive understanding of emerging threats and their potential impact on healthcare settings. Our simulation scenario illustrates the model's behaviour in processing data flows and capturing the characteristics of healthcare settings. Our findings demonstrate its validity by highlighting potential threats and mitigation strategies. The insights from these simulations highlight the model's flexibility, enabling adaptation to various healthcare settings and supporting continuous risk assessment to enhance MIoT system security and resilience.
引用
收藏
页数:17
相关论文
共 50 条
  • [21] Enhancing Security in Industrial IoT: A Taxonomy-driven Approach to Risk Assessment
    Al-Hawawreh, Muna
    Doss, Robin
    2023 IEEE 22ND INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, BIGDATASE, CSE, EUC, ISCI 2023, 2024, : 434 - 443
  • [22] A Fuzzy AHP Approach for Security Risk Assessment in SCADA Networks
    Markovic-Petrovic, Jasna D.
    Stojanovic, Mirjana D.
    Rakas, Slavica V. Bostjancic
    ADVANCES IN ELECTRICAL AND COMPUTER ENGINEERING, 2019, 19 (03) : 69 - 74
  • [23] IoT cyber risk: a holistic analysis of cyber risk assessment frameworks, risk vectors, and risk ranking process
    Kandasamy, Kamalanathan
    Srinivas, Sethuraman
    Achuthan, Krishnashree
    Rangan, Venkat P.
    EURASIP JOURNAL ON INFORMATION SECURITY, 2020, 2020 (01)
  • [24] IoT cyber risk: a holistic analysis of cyber risk assessment frameworks, risk vectors, and risk ranking process
    Kamalanathan Kandasamy
    Sethuraman Srinivas
    Krishnashree Achuthan
    Venkat P. Rangan
    EURASIP Journal on Information Security, 2020
  • [25] An IOT security risk autonomic assessment algorithm
    Zheng, Ruijuan
    Zhang, Mingchuan
    Wu, Qingtao
    Yang, Chunlei
    Wei, Wangyang
    Zhang, Dan
    Ma, Zhengchao
    Telkomnika - Indonesian Journal of Electrical Engineering, 2013, 11 (02): : 819 - 826
  • [26] A Supervisory Control Approach to Dynamic Cyber-Security
    Rasouli, Mohammad
    Miehling, Erik
    Teneketzis, Demosthenis
    DECISION AND GAME THEORY FOR SECURITY, GAMESEC 2014, 2014, 8840 : 99 - 117
  • [27] A supervisory control approach to dynamic cyber-security
    Department of Electrical Engineering and Computer Science, University of Michigan, Ann Arbor
    MI, United States
    Lect. Notes Comput. Sci., (99-117):
  • [28] Dynamic Risk Assessment Enabling Automated Interventions for Medical Cyber-Physical Systems
    Leite, Fabio L., Jr.
    Schneider, Daniel
    Adler, Rasmus
    COMPUTER SAFETY, RELIABILITY, AND SECURITY, SAFECOMP 2019, 2019, 11698 : 216 - 231
  • [29] CYBER SECURITY: THREAT IDENTIFICATION, RISK AND VULNERABILITY ASSESSMENT
    Umberger, Harold
    Gheorghe, Adrian
    ENERGY SECURITY: INTERNATIONAL AND LOCAL ISSUES, THEORETICAL PERSPECTIVES, AND CRITICAL ENERGY INFRASTRUCTURES, 2008, : 247 - 269
  • [30] Cyber security risk assessment method for SCADA system
    Hossain, Nazmul
    Das, Taposh
    Islam, Tariqul
    Alam Hossain, Md
    INFORMATION SECURITY JOURNAL, 2022, 31 (05): : 499 - 510