Skip to main content

Smart Hospitals and Cyber Security Attacks

  • Conference paper
  • First Online:
Digital Technologies and Applications (ICDTA 2021)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 211))

Included in the following conference series:

Abstract

Until now, the Covid-19 pandemic was infected more than 37,167,291 people around the world in 212 countries and territories, killed 1,071,181 people since its appearance in December in Wuhan, of which more than 7,876,942 people in the United States, 6,979,434 people in the India and 5,057,958 people in Brazil (Novel Coronavirus (2019-nCoV) situation reports - World Health Organization (WHO), 2019 Novel Coronavirus (2019-nCoV) in the U.S -. U.S. Centers for Disease Control and Prevention (CDC), symptoms of Novel Coronavirus (2019-nCoV) – CDC, china Travel Advisory - U.S. State Department, accessed January 31, 2020.). This large number of infected people caused saturation in hospitals and put a big pressure on the intensive care units and hospital beds. While the medical staff are fighting to save the lives of these patients, others are playing with these lives by making cyber-attacks on research centers and health institutions, recently case was in September 2020, a woman in Germany died during a ransomware attack on the Duesseldorf University Hospital. Smart hospitals are one of the most affected because they use its technology (Smart hospitals) that generates a lot of personal and critical data, these hospitals are equipped with “things” that are used for patient monitoring, maintenance, remote operation and control like wearables, smart pills, smart beds, remote monitoring systems, RTHS (Real-time Health Systems), biosensors, glucose measurement devices, robots, equipment monitoring devices, and more. In this paper, we will propose a new secured system model to keep these hospital systems safe against cyber-attacks by using verification and classification of treatment requests and controlling the patients’ health using “sensors” to ensure the safety of the requested operations.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Novel Coronavirus (2019-nCoV) situation reports - World Health Organization (WHO), 2019 Novel Coronavirus (2019-nCoV) in the U.S -. U.S. Centers for Disease Control and Prevention (CDC), symptoms of Novel Coronavirus (2019-nCoV) – CDC, china Travel Advisory - U.S. State Department. Accessed 31 Jan 2020

    Google Scholar 

  2. Chahid Y, Benabdellah M, Azizi A (2017) Internet of things security. In: International conference on wireless technologies, embedded and intelligent systems (WITS). https://doi.org/10.1109/WITS.2017.7934655

  3. Al-Refaie A, Chen T, Judeh M (2018) Optimal operating room scheduling for normal and unexpected events in a smart hospital. Oper Res Int J 18:579–602. https://doi.org/10.1007/s12351-016-0244-y

  4. Hurysz T, Romisher A, Campbell D, Ottenstein Maia (2020) Utilizing the smart rooms device to improve patient experience in hospitals. Phase 1. Paper 12. https://jdc.jefferson.edu/si_dh_2022_phase1/12

  5. Gandhi DA, Ghosal M (2018) Second international conference on inventive communication and computational technologies (ICICCT). https://doi.org/10.1109/ICICCT.2018.8473026

  6. Internet of Things (IoT) in Utility - Global Market Research and Forecast, 2015–2025 Report ID: HeyReport6861 | Number of pages: 80 | Publish Date: Feb 2019 | Publisher: HeyReport | Category: ICT and Media

    Google Scholar 

  7. Internet of Things (IoT) in Healthcare Market Size, Share & Trends Analysis Report By Component (Service, System & Software), By Connectivity Technology (Satellite, Cellular), By End Use (CRO, Hospital & Clinic), By Application, and Segment Forecasts, 2019–2025, Report ID: 978-1-68038-857-2

    Google Scholar 

  8. https://blog.checkpoint.com/2020/03/19/covid-19-impact-as-retailers-close-their-doors-hackers-open-for-business/

  9. Phil Muncaster UK / EMEA News Reporter, Infosecurity Magazine https://www.infosecurity-magazine.com/news/covid19-drive-phishing-emails-667

  10. Salih FI et al. (2019) IoT security risk management model for healthcare industry. Malaysian J Comput Sci [S.l.] 131–144. ISSN 0127-9084. https://doi.org/10.22452/mjcs.sp2019no3.9. Accessed 10 May 2020

  11. Farahani B, Firouzi F, Badaroglu VCM, Constant N, Mankodiya K (2017) Towards fog-driven IoT eHealth: promises and challenges of IoT in medicine and healthcare. Elsevier. https://doi.org/10.1016/j.future.2017.04.036

  12. Negash B et al. (2018) Leveraging fog computing for healthcare IoT. In: Rahmani A, Liljeberg P, Preden JS, Jantsch A (eds) Fog computing in the internet of things. Springer, Cham. https://doi.org/10.1007/978-3-319-57639-8_8

  13. Abouzakhar NS, Jones A, Angelopoulou O (2017) Internet of things security: a review of risks and threats to healthcare sector. In: IEEE international conference on internet of things (iThings) and IEEE green computing and communications (GreenCom) and IEEE cyber, physical and social computing (CPSCom) and IEEE smart data (SmartData). https://doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData.2017.62

  14. Kammüller F (2019) Combining secure system design with risk assessment for IoT healthcare systems. In: IEEE international conference on pervasive computing and communications workshops (PerCom workshops). https://doi.org/10.1109/PERCOMW.2019.8730776

  15. Almulhim M, Zaman N (2018) International conference on advanced communication technology (ICACT). https://doi.org/10.23919/ICACT.2018.8323802

  16. Chahid Y, Benabdellah M, Azizi A (2017) Internet of things protocols comparison, architecture, vulnerabilities and security: State of the art. In: ACM international conference proceeding series, a65

    Google Scholar 

  17. Kannouf N, Labbi M, Benabdellah M, Azizi A (2018) Security of information exchange between readers and tags. In: Maleh Y, Ezzati A, Belaissaoui M (eds.) Security and privacy in smart sensor networks, pp 368–396. IGI Global, Hershey. https://doi.org/10.4018/978-1-5225-5736-4.ch016

  18. Kannouf N, Douzi Y, Benabdellah M, Azizi A (2015) Security on RFID technology. In: 2015 international conference on cloud technologies and applications (CloudTech), Marrakech, pp 1–5. https://doi.org/10.1109/CloudTech.2015.7336997

  19. Eddy M, Perlroth N (2020) Cyber Attack Suspected in German Woman’s Death, New York Times, 18 September 2020

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Chahid, Y., Benabdellah, M., Kannouf, N. (2021). Smart Hospitals and Cyber Security Attacks. In: Motahhir, S., Bossoufi, B. (eds) Digital Technologies and Applications. ICDTA 2021. Lecture Notes in Networks and Systems, vol 211. Springer, Cham. https://doi.org/10.1007/978-3-030-73882-2_27

Download citation

Publish with us

Policies and ethics