Skip to main content

Security Analysis and a Potential Layer to Layer Security Solution of Medical Cyber-Physical Systems

  • Chapter
  • First Online:
A Handbook of Internet of Things in Biomedical and Cyber Physical System

Part of the book series: Intelligent Systems Reference Library ((ISRL,volume 165))

Abstract

Cyber-Physical Systems (CPS) is feedback systems that are a concoction of closely integrated physical processes, communication and computation which interacts with the human through various modalities. It is developed as the censorious infrastructure in the different implementing platform and has the perspective to influence our day to day life. The applications of these systems vary from the power grid, communication, and transportation to health care and many more. There is an exponential growth of Medical Cyber-Physical Systems (MCPS). In MCPS, the cyber aspects are embodied in the analyzing computer and the communications to the Internet. Moreover, the cyber-physical countenance interacts directly with the patients. The patient represents the physical perspective with regards to therapeutic devices. CPS has an impact on different aspects of the medical system. However, it has a plethora of security challenges in this field of application. Various threats and attacks have been newly introduced for MCPS. Security becomes a top concern for MCPS. Progress in technology has made it important to develop a new proposition for security. In this chapter, we present a security analysis of Medical Cyber-Physical System and provide a layer to layer solution to the security issues and recapitulate the security issues of MCPS from independent perspectives.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Lu, T., Xu, B., Guo, X., Zhao, L., Xie, F.: A new multilevel framework for cyber-physical system security. In: First international Workshop on the Swarm at the Edge of the Cloud (2013)

    Google Scholar 

  2. Gamage, T.T., McMillin, B.M., Roth, T.P.: Enforcing information flow security properties in cyber-physical systems: a generalized framework based on compensation. In: 2010 IEEE 34th Annual Computer Software and Applications Conference Workshops (COMPSACW), pp. 158–163 (2010)

    Google Scholar 

  3. Lee, E.A.: Cyber physical systems: design challenges. In: 11th IEEE Symposium on Object Oriented Real-Time Distributed Computing (ISORC), pp. 363–369 (2008)

    Google Scholar 

  4. Gunes, V., Peter, S., Givargis, T., Vahid, F.: A survey on concepts, applications, and challenges in cyber-physical systems. KSII Trans. Internet Inf. Syst. 8(12) (2014)

    Google Scholar 

  5. Dey, N., Ashour, A.S., Shi, F., Fong, S.J., Tavares, J.M.R.S.: Medical cyber-physical systems: a survey. J. Med. Syst. 42(4), 74 (2018)

    Article  Google Scholar 

  6. Cyber-Physical Systems—A Concept Map. [Online]. Available: https://ptolemy.berkeley.edu/projects/cps/. Accessed: 13 Apr 2019

  7. Devi, P.V., Kalaichelvi, V.: Security issues in medical cyber physical systems (MCPS)—a survey. Int. J. Pure Math. 117(20), 319–324 (2017)

    Google Scholar 

  8. Shafi, Q.: Cyber physical systems security: a brief survey. In: 2012 12th International Conference on Computational Science and Its Applications, Salvador, Bahia, Brazil, pp. 146–150 (2012)

    Google Scholar 

  9. Miclea, L., Sanislav, T.: About dependability in cyber-physical systems. In: 2011 9th East-West Design & Test Symposium (EWDTS), Sevastopol, Ukraine, pp. 17–21 (2011)

    Google Scholar 

  10. Lu, T., Lin, J., Zhao, L., Li, Y., Peng, Y.: A security architecture in cyber-physical systems: security theories, analysis, simulation and application fields. Int. J. Secur. Appl. 9(7), 1–16 (2015)

    Google Scholar 

  11. Zhang, B., Ma, X.-X., Qin, Z.-G.: Security architecture on the trusting internet of things. J. Electron. Sci. Technol. 9(4), 364–367 (2011)

    Google Scholar 

  12. Khan, R., Khan, S.U., Zaheer, R., Khan, S.: Future internet: the internet of things architecture, possible applications and key challenges. In: 2012 10th International Conference on Frontiers of Information Technology, Islamabad, Pakistan, pp. 257–260 (2012)

    Google Scholar 

  13. Suo, H., Wan, J., Zou, C., Liu, J.: Security in the internet of things: a review. In: 2012 International Conference on Computer Science and Electronics Engineering, vol. 3, pp. 648–651 (2012)

    Google Scholar 

  14. Hu, L., Xie, N., Kuang, Z., Zhao, K.: Review of cyber-physical system architecture. In: 2012 IEEE 15th International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing Workshops, Shenzhen, TBD, China, pp. 25–30 (2012)

    Google Scholar 

  15. Ashibani, Y., Mahmoud, Q.H.: Cyber physical systems security: analysis, challenges and solutions. Comput. Secur. 68, 81–97 (2017)

    Article  Google Scholar 

  16. Konstantinou, C., Maniatakos, M., Saqib, F., Hu, S., Plusquellic, J., Jin, Y.: Cyber-physical systems: a security perspective. In: 2015 20th IEEE European Test Symposium (ETS), Cluj-Napoca, Romania, pp. 1–8 (2015)

    Google Scholar 

  17. Rad, C.-R., Hancu, O., Takacs, I.-A., Olteanu, G.: Smart monitoring of potato crop: a cyber-physical system architecture model in the field of precision agriculture. Agric. Agric. Sci. Procedia 6, 73–79 (2015)

    Google Scholar 

  18. Mehdipour, F., Nunna, K.C., Murakami, K.J.: A smart cyber-physical systems-based solution for pest control (work in progress). In: 2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing, pp. 1248–1253 (2013)

    Google Scholar 

  19. Caramihai, S.I., Dumitrache, I.: Agricultural enterprise as a complex system: a cyber physical systems approach. In: 2015 20th International Conference on Control Systems and Computer Science, pp. 659–664 (2015)

    Google Scholar 

  20. Taha, W., Cartwright, R., Philippsen, R., Zeng, Y.: Developing a first course on cyber-physical systems. In: Proceedings of the WESE’14: Workshop on Embedded and Cyber-Physical Systems Education—WESE’14, New Delhi, India, pp. 1–8 (2015)

    Google Scholar 

  21. Martins, G., Bhatia, S., Koutsoukos, X., Stouffer, K., Tang, C., Candell, R.: Towards a systematic threat modeling approach for cyber-physical systems. In: 2015 Resilience Week (RWS), Philadelphia, PA, USA, pp. 1–6 (2015)

    Google Scholar 

  22. Jin, X., Haddad, W.M., Hayakawa, T.: An adaptive control architecture for cyber-physical system security in the face of sensor and actuator attacks and exogenous stochastic disturbances, p. 6 (2018)

    Google Scholar 

  23. Banerjee, A., Venkatasubramanian, K.K., Mukherjee, T., Gupta, S.K.S.: Ensuring safety, security, and sustainability of mission-critical cyber-physical systems. Proc. IEEE 100(1), 283–299 (2012)

    Article  Google Scholar 

  24. Ahmed, S.H., Kim, G., Kim, D.: Cyber physical system: architecture, applications and research challenges. In: Wireless Days (WD), 2013 IFIP, pp. 1–5 (2013)

    Google Scholar 

  25. Sierla, S., O’Halloran, B.M., Karhela, T., Papakonstantinou, N., Tumer, I.Y.: Common cause failure analysis of cyber—physical systems situated in constructed environments. Res. Eng. Design 24(4), 375–394 (2013)

    Article  Google Scholar 

  26. Gurgen, L., Gunalp, O., Benazzouz, Y., Galissot, M.: Self-aware cyber-physical systems and applications in smart buildings and cities. In: Design, Automation & Test in Europe Conference & Exhibition (DATE), 2013, Grenoble, France, pp. 1149–1154 (2013)

    Google Scholar 

  27. Cassandras, C.G.: Smart cities as cyber-physical social systems. Engineering 2(2), 156–158 (2016)

    Article  Google Scholar 

  28. Mazumdar, S., et al.: AXIOM: a hardware-software platform for cyber physical systems. In: 2016 Euromicro Conference on Digital System Design (DSD), pp. 539–546 (2016)

    Google Scholar 

  29. Shi, J., Wan, J., Yan, H., Suo, H.: A survey of cyber-physical systems. In: 2011 International Conference on Wireless Communications and Signal Processing (WCSP), Nanjing, China, pp. 1–6 (2011)

    Google Scholar 

  30. Li, Y.-T., Jacob, M., Akingba, G., Wachs, J.P.: A cyber-physical management system for delivering and monitoring surgical instruments in the OR. Surgical Innov. 20(4), 377–384 (2013)

    Article  Google Scholar 

  31. Dogaru, D.I., Dumitrache, I.: Cyber-physical systems in healthcare networks. In: 2015 E-Health and Bioengineering Conference (EHB), pp. 1–4 (2015)

    Google Scholar 

  32. Lee, I., Sokolsky, O.: Medical cyber physical systems. In: Design Automation Conference, pp. 743–748 (2010)

    Google Scholar 

  33. Celdrán, A.H., Pérez, M.G., Clemente, F.J.G., Pérez, G.M.: Sustainable securing of medical cyber-physical systems for the healthcare of the future. Sustain. Comput. Inf. Syst. 19, 138–146 (2018)

    Google Scholar 

  34. Choi, J.S., Zhou, M.C.: Recent advances in wireless sensor networks for health monitoring. Int. J. Intell. Control Syst. 15(4), 49–58 (2010)

    Google Scholar 

  35. Kim, C., Sun, M., Mohan, S., Yun, H., Sha, L., Abdelzaher, T.F.: A framework for the safe interoperability of medical devices in the presence of network failures. In: Proceedings of the 1st ACM/IEEE International Conference on Cyber-Physical Systems, pp. 149–158 (2010)

    Google Scholar 

  36. Kumar, J.S., Patel, D.R.: A survey on internet of things: security and privacy issues. Int. J. Comput. Appl. 90(11) (2014)

    Google Scholar 

  37. Mahmoud, R., Yousuf, T., Aloul, F., Zualkernan, I.: Internet of things (IoT) security: current status, challenges and prospective measures. In: 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST), London, United Kingdom, pp. 336–341 (2015)

    Google Scholar 

  38. What is a Stakeholder? Definition of Stakeholder—ProjectManager.com. [Online]. Available: https://www.projectmanager.com/blog/what-is-a-stakeholder. Accessed: 11 Apr 2019

  39. Almohri, H., Cheng, L., Yao, D., Alemzadeh, H.: On threat modeling and mitigation of medical cyber-physical systems. In: 2017 IEEE/ACM International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE), pp. 114–119 (2017)

    Google Scholar 

  40. Aghili, S.F., Ashouri-Talouki, M., Mala, H.: DoS, impersonation and de-synchronization attacks against an ultra-lightweight RFID mutual authentication protocol for IoT. J. Supercomput. 74(1), 509–525 (2018)

    Article  Google Scholar 

  41. What is a denial of service attack (DoS)? Palo Alto Networks. [Online]. Available: https://www.paloaltonetworks.com/cyberpedia/what-is-a-denial-of-service-attack-dos. Accessed: 13 Apr 2019

  42. Zhao, K., Ge, L.: A survey on the internet of things security. In: 2013 Ninth International Conference on Computational Intelligence and Security, Emeishan 614201, China, pp. 663–667 (2013)

    Google Scholar 

  43. Ali, S., Anwar, R.W., Hussain, O.K.: Cyber security for cyber physical systems: a trust-based approach 9 (2005)

    Google Scholar 

  44. Pathan, A.-S.K., Lee, H.-W., Hong, C.S.: Security in wireless sensor networks: issues and challenges. In: 2006 8th International Conference Advanced Communication Technology, vol. 2, p. 6 (2006)

    Google Scholar 

  45. What is a man-in-the-middle attack? [Online]. Available: https://us.norton.com/internetsecurity-wifi-what-is-a-man-in-the-middle-attack.html. Accessed: 13 Apr 2019

  46. Kao, J.-C., Marculescu, R.: Eavesdropping minimization via transmission power control in ad-hoc wireless networks. In: 2006 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks, vol. 2, pp. 707–714 (2006)

    Google Scholar 

  47. Raza, S., Mälardalens högskola: lightweight security solutions for the internet of things. School of Innovation, Design and Engineering, Mälardalen University, Västerås (2013)

    Google Scholar 

  48. Zia, T., Zomaya, A.: Security issues in wireless sensor networks. In: 2006 International Conference on Systems and Networks Communications (ICSNC’06), pp. 40–40 (2006)

    Google Scholar 

  49. Peng, Y., Lu, T., Liu, J., Gao, Y., Guo, X., Xie, F.: Cyber-physical system risk assessment. In: 2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Beijing, China, pp. 442–447 (2013)

    Google Scholar 

  50. Bonaci, T., Bushnell, L., Poovendran, R.: Node capture attacks in wireless sensor networks: a system theoretic approach. In: 49th IEEE Conference on Decision and Control (CDC), Atlanta, GA, USA, pp. 6765–6772 (2010)

    Google Scholar 

  51. Bhattacharya, R.: A comparative study of physical attacks on wireless sensor networks. Int. J. Res. Eng. Technol. 2(1), 72–74 (2013)

    Article  Google Scholar 

  52. Mohammadi, S., Jadidoleslamy, H.: A comparison of link layer attacks on wireless sensor networks. Int. J. Appl. Graph Theory Wirel. Ad Hoc Netw. Sens. Netw. 3(1), 35–56 (2011)

    Google Scholar 

  53. Anwar, R.W., Bakhtiari, M., Zainal, A., Abdullah, A.H., Qureshi, K.N.: Security issues and attacks in wireless sensor network, p. 4 (2014)

    Google Scholar 

  54. Undercoffer, J., Avancha, S., Joshi, A., Pinkston, J.: Security for sensor networks. In: CADIP Research Symposium, pp. 25–26 (2002)

    Google Scholar 

  55. Cardenas, A.A., Amin, S., Sinopoli, B., Giani, A., Perrig, A., Sastry, S.: Challenges for securing cyber physical systems, p. 4 (2015)

    Google Scholar 

  56. Li, Y., Shi, L., Cheng, P., Chen, J., Quevedo, D.E.: Jamming attack on cyber-physical systems: a game-theoretic approach. In: 2013 IEEE International Conference on Cyber Technology in Automation, Control and Intelligent Systems, China, pp. 252–257 (2013)

    Google Scholar 

  57. Maheshwari, P.: Security issues of cyber physical system: a review. Int. J. Comput. Appl. 7–11 (2016)

    Google Scholar 

  58. Gaddam, N., Kumar, G.S.A., Somani, A.K.: Securing physical processes against cyber attacks in cyber-physical systems, p. 3 (2008)

    Google Scholar 

  59. Sharma, K., Ghose, M.K.: Wireless sensor networks: an overview on its security threats. IJCA, Special Issue on “Mobile Ad-hoc Networks” MANETs, pp. 42–45 (2010)

    Google Scholar 

  60. Xing, K., Srinivasan, S.S.R., Jose, M., Li, J., Cheng, X.: Attacks and countermeasures in sensor networks: a survey. In: Network Security, pp. 251–272. Springer, Berlin (2010)

    Chapter  Google Scholar 

  61. Maheshwari, R., Gao, J., Das, S.R.: Detecting wormhole attacks in wireless networks using connectivity information. In: IEEE INFOCOM 2007-26th IEEE International Conference on Computer Communications, pp. 107–115 (2007)

    Google Scholar 

  62. Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. In: Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, pp. 113–127 (2003)

    Google Scholar 

  63. Tumrongwittayapak, C., Varakulsiripunth, R.: Detecting Sinkhole attacks in wireless sensor networks. In: 2009 ICCAS-SICE, pp. 1966–1971 (2009)

    Google Scholar 

  64. Padmavathi, D.G., Shanmugapriya, M.D.: A survey of attacks, security mechanisms and challenges in wireless sensor networks 4(1), 9 (2009)

    Google Scholar 

  65. Kocabas, O., Soyata, T., Aktas, M.K.: Emerging security mechanisms for medical cyber physical systems. IEEE/ACM Trans. Comput. Biol. Bioinf. 13(3), 401–416 (2016)

    Article  Google Scholar 

  66. 900 MHz Class 0 RFIDTag Specification | Radio Frequency Identification | Information And Communications Technology. [Online]. Available: https://www.scribd.com/document/43619345/900-MHz-Class-0-RFIDTag-Specification. Accessed: 12 Apr 2019

  67. Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., Ribagorda, A.: RFID systems: a survey on security threats and proposed solutions. In: Cuenca, P., Orozco-Barbosa, L. (eds.) Personal Wireless Communications, vol. 4217, pp. 159–170. Springer, Berlin, Heidelberg (2006)

    Chapter  Google Scholar 

  68. Batina, L., Guajardo, J., Kerins, T., Mentens, N., Tuyls, P., Verbauwhede, I.: Public-key cryptography for RFID-tags. In: Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW’07), White Plains, NY, USA, pp. 217–222 (2007)

    Google Scholar 

  69. Singh, E.R., Mahajan, E.S.: Improved elliptic curve cryptography with RFID protocol based on DNA technique 5 (2017)

    Google Scholar 

  70. Trappe, W.: The challenges facing physical layer security. IEEE Commun. Mag. 53(6), 16–20 (2015)

    Article  Google Scholar 

  71. Mujahid, U., Najam-ul-Islam, M., Shami, M.A.: RCIA: a new ultralightweight RFID authentication protocol using recursive hash. Int. J. Distrib. Sens. Netw. 11(1), 642180 (2015)

    Article  Google Scholar 

  72. Mujahid, U., Najam-ul-Islam, M., Sarwar, S.: A new ultralightweight RFID authentication protocol for passive low cost tags: KMAP. Wirel. Pers. Commun. 94(3), 725–744 (2017)

    Article  Google Scholar 

  73. Beqqal, M.E., Azizi, M.: Review on security issues in RFID systems. Adv. Sci. Technol. Eng. Syst. J. 2(6), 194–202 (2017)

    Article  Google Scholar 

  74. Wang, J., Abid, H., Lee, S., Shu, L., Xia, F.: A secured health care application architecture for cyber-physical systems. arXiv preprint arXiv:1201.0213 (2011)

  75. Hu, F., Ziobro, J., Tillett, J., Sharma, N.K.: Secure Wireless Sensor Networks: Problems and Solutions, vol. 1, no. 4, p. 11 (2003)

    Google Scholar 

  76. Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: Proceedings of the 6th Annual International Conference on Mobile Computing and Networking—MobiCom’00, Boston, Massachusetts, United States, pp. 255–265 (2000)

    Google Scholar 

  77. Michiardi, P., Molva, R.: Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In: Jerman-Blažič, B., Klobučar, T. (eds.) Advanced Communications and Multimedia Security, vol. 100, pp. 107–121. Springer, Boston, MA, USA (2002)

    Chapter  Google Scholar 

  78. Blazevic, L., Buttyan, L., Capkun, S., Giordano, S., Hubaux, J.-P., Le Boudec, J.-Y.: Self organization in mobile ad hoc networks: the approach of Terminodes. IEEE Commun. Mag. 39(6), 166–174 (2001)

    Article  Google Scholar 

  79. Buchegger, S., Le Boudec, J.-Y.: Nodes bearing grudges: towards routing security, fairness, and robustness in mobile ad hoc networks. In: Proceedings 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing, Canary Islands, Spain, pp. 403–410 (2002)

    Google Scholar 

  80. Khan, K., Goodridge, W., Ragbir, D.: Security in wireless sensor networks 9 (2012)

    Google Scholar 

  81. Chawla, H.: Some issues and challenges of wireless sensor networks. Int. J. Adv. Res. Comput. Sci. Softw. Eng.

    Google Scholar 

  82. Jing, Q., Vasilakos, A.V., Wan, J., Lu, J., Qiu, D.: Security of the internet of things: perspectives and challenges. Wirel. Netw. 20(8), 2481–2501 (2014)

    Article  Google Scholar 

  83. Gupta, K.: Design issues and challenges in wireless sensor networks. Int. J. Comput. Appl. 112(4), 7 (2015)

    Google Scholar 

  84. Chelli, K.: Security issues in wireless sensor networks: attacks and countermeasures 6 (2015)

    Google Scholar 

  85. Jadhav, R., Vatsala, V.: Security issues and solutions in wireless sensor networks. Int. J. Comput. Appl. 162(2), 14–19 (2017)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mehedi Hasan Raju .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Raju, M.H., Ahmed, M.U., Atiqur Rahman Ahad, M. (2020). Security Analysis and a Potential Layer to Layer Security Solution of Medical Cyber-Physical Systems. In: Balas, V., Solanki, V., Kumar, R., Ahad, M. (eds) A Handbook of Internet of Things in Biomedical and Cyber Physical System. Intelligent Systems Reference Library, vol 165. Springer, Cham. https://doi.org/10.1007/978-3-030-23983-1_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-23983-1_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-23982-4

  • Online ISBN: 978-3-030-23983-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics