False Data Injection Attacks in Healthcare

Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 845)


False data injection attacks (FDIA) are widely studied mainly in the area of smart grid, power systems and wireless sensor networks. In this paper, an overview of the FDIA is proposed including the definition and detection techniques proposed so far. The main focus of this paper is to create awareness about the impact of the FDIA in domains other than smart grid such as healthcare. The impact of FDIA in healthcare is overlooked for last couple of years around the globe. However, the recent information security incidents rise in the healthcare sector reaffirms the requirements of preventive measures for FDIA in healthcare. In this paper, we also focus on the emerging attacks on the healthcare domain to understand the importance of FDIA prevention techniques.


FDIA Smart grid Healthcare 


  1. 1.
    Ahmed, M., Mahmood, A.N., Hu, J.: A survey of network anomaly detection techniques. J. Netw. Comput. Appl. 60, 19–31 (2016)CrossRefGoogle Scholar
  2. 2.
    Ahmed, M., Mahmood, A.N., Hu, J.: Outlier detection, Chap. 1. In: The State of the Art in Intrusion Prevention and Detection, pp. 3–21. CRC Press, New York, January 2014Google Scholar
  3. 3.
    Ahmed, M., Mahmood, A.N., Islam, M.R.: A survey of anomaly detection techniques in financial domain. Future Gener. Comput. Syst. 55, 278–288 (2016)CrossRefGoogle Scholar
  4. 4.
    Ahmed, M., Mahmood, A.N.: A novel approach for outlier detection and clustering improvement. In: 2013 8th IEEE Conference on Industrial Electronics and Applications (ICIEA), pp. 577–582, June 2013Google Scholar
  5. 5.
    Buczak, A.L., Guven, E.: A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Commun. Surv. Tutor. 18(2), 1153–1176 (2016)CrossRefGoogle Scholar
  6. 6.
    Chen, J., Liang, G., Cai, Z., Hu, C., Xu, Y., Luo, F., Zhao, J.: Impact analysis of false data injection attacks on power system static security assessment. J. Mod. Power Syst. Clean Energy 4(3), 496–505 (2016)CrossRefGoogle Scholar
  7. 7.
    Healthcare top target for cyberattacks in 2017: Experian predicts. http://www.healthcareitnews.com/news/. Accessed 12 May 2017
  8. 8.
    Cyber Attacks: In the Healthcare Sector. https://www.cisecurity.org/. Accessed 12 May 2017
  9. 9.
    Pachauri, G., Sharma, S.: Anomaly detection in medical wireless sensor networks using machine learning algorithms. Procedia Comput. Sci. 70, 325–333 (2015)CrossRefGoogle Scholar
  10. 10.
    Salem, O., Guerassimov, A., Mehaoua, A., Marcus, A., Furht, B.: Anomaly detection scheme for medical wireless sensor networks. In: Furht, B., Agarwal, A. (eds.) Handbook of Medical and Healthcare Technologies, pp. 207–222. Springer, New York (2013).  https://doi.org/10.1007/978-1-4614-8495-0_8CrossRefGoogle Scholar
  11. 11.
    Salem, O., Guerassimov, A., Mehaoua, A., Marcus, A., Furht, B.: Sensor fault and patient anomaly detection and classification in medical wireless sensor networks. In: 2013 IEEE International Conference on Communications (ICC), pp. 4373–4378, June 2013Google Scholar
  12. 12.
    Haque, S.A., Rahman, M., Aziz, S.M.: Sensor anomaly detection in wireless sensor networks for healthcare. Sensors 15, 8764–8786 (2015)CrossRefGoogle Scholar
  13. 13.
    Ahmed, M., Anwar, A., Mahmood, A.N., Shah, Z., Maher, M.J.: An investigation of performance analysis of anomaly detection techniques for big data in SCADA systems. EAI Endorsed Trans. Ind. Netw. Intell. Syst. 15(3), 5 (2015)Google Scholar
  14. 14.
    Liu, Y., Ning, P., Reiter, M.K.: False data injection attacks against state estimation in electric power grids. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS 1909, pp. 21–32. ACM, New York (2009)Google Scholar
  15. 15.
    Liu, Y., Ning, P., Reiter, M.K.: False data injection attacks against state estimation in electric power grids. ACM Trans. Inf. Syst. Secur. 14(1), 13:1–13:33 (2011)CrossRefGoogle Scholar
  16. 16.
    Alemdar, H., Ersoy, C.: Wireless sensor networks for healthcare: a survey. Comput. Netw. 54(15), 2688–2710 (2010)CrossRefGoogle Scholar
  17. 17.
    Tang, B., Yan, J., Kay, S., He, H.: Detection of false data injection attacks in smart grid under colored Gaussian noise. In: 2016 IEEE Conference on Communications and Network Security (CNS), pp. 172–179, October 2016Google Scholar
  18. 18.
    Chen, P.Y., Yang, S., McCann, J.A., Lin, J., Yang, X.: Detection of false data injection attacks in smart-grid systems. IEEE Commun. Mag. 53(2), 206–213 (2015)CrossRefGoogle Scholar
  19. 19.
    Zhu, S., Setia, S., Jajodia, S., Ning, P.: Interleaved hop-by-hop authentication against false data injection attacks in sensor networks. ACM Trans. Sen. Netw. 3(3), 14 (2007)CrossRefGoogle Scholar
  20. 20.
    Xie, L., Mo, Y., Sinopoli, B.: False data injection attacks in electricity markets. In: 2010 First IEEE International Conference on Smart Grid Communications, pp. 226–231, October 2010Google Scholar
  21. 21.
    Mo, Y., Sinopoli, B.: False data injection attacks in control systems. In: First Workshop on Secure Control Systems, CPS Week, pp. 226–231 (2010)Google Scholar
  22. 22.
    Rahman, M.A., Mohsenian-Rad, H.: False data injection attacks with incomplete information against smart power grids. In: 2012 IEEE Global Communications Conference (GLOBECOM), pp. 3153–3158, December 2012Google Scholar
  23. 23.
    Manandhar, K., Cao, X., Hu, F., Liu, Y.: Combating false data injection attacks in smart grid using kalman filter. In ICNC, pp. 16–20. IEEE (2014)Google Scholar
  24. 24.
    Welch, G., Bishop, G.: An introduction to the kalman filter. Technical report, Chapel Hill, NC, USA (1995)Google Scholar
  25. 25.
    Abdallah, A., Shen, X.S.: Efficient prevention technique for false data injection attack in smart grid. In: 2016 IEEE International Conference on Communications (ICC), pp. 1–6, May 2016Google Scholar
  26. 26.
    Healthcare Breach Report 2016. http://www.ciphertex.com/. Accessed 12 May 2017
  27. 27.
    Insurance Fraud: Community Health Systems. https://www.justice.gov/. Accessed 12 May 2017
  28. 28.
    Community Health Systems, Inc. http://www.chs.net/. Accessed 12 May 2017
  29. 29.
    Ransomware: Hollywood Presbyterian Medical Center. http://resources.infosecinstitute.com/category/healthcare-information-security/. Accessed 12 May 2017
  30. 30.
    Why Health Care is Especially Vulnerable to Ransomware Attacks. http://fortune.com/2017/05/15/ransomware-attack-healthcare/. Accessed 12 May 2017
  31. 31.
    Ransomeware Rising. http://www.healthcareitnews.com/news/ransomware. Accessed 12 May 2017
  32. 32.
    Why Health Care is Especially Vulnerable to Ransomware Attacks. http://www.verizonenterprise.com. Accessed 12 May 2017
  33. 33.
    90,000 Patients Compromised at UW Medicine. https://www.infosecurity-magazine.com/. Accessed 12 May 2017
  34. 34.
    Ahmed, M., Kaysar, J.: Phishing attack protection-PAP-approaches for fairness in web usage. Int. J. Comput. Sci. Issues 8(6), 258–261 (2011)Google Scholar
  35. 35.
    MEDJACK: UCLA Health. http://pulse.embs.org/may-2016/healthcare-hacked/. Accessed 12 May 2017
  36. 36.
    Healthcare organizations boost spending on cyber security. https://betanews.com/2017/02/21/healthcare-security-spending/. Accessed 12 May 2017
  37. 37.
    High demand for medical records in the black market. https://www.promisec.com/industries/health-care/. Accessed 12 May 2017
  38. 38.
    Morrow, B.: BYOD security challenges: control and protect your most sensitive data. Netw. Secur. 2012(12), 5–8 (2012)CrossRefGoogle Scholar
  39. 39.
    Cyber attacks: a growing risk for healthcare professionals. https://securitybrief.com.au. Accessed 12 May 2017
  40. 40.
    The World’s specialist insurance market. https://www.lloyds.com/. Accessed 12 May 2017

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  1. 1.Canberra Institute of TechnologyReidAustralia

Personalised recommendations