Skip to main content

Knowledge Organization Systems to Support Cyber-Resilience in Medical Smart Home Environments

  • Chapter
  • First Online:
Cybersecurity for Smart Cities

Abstract

While real-time/near real-time healthcare solutions for the elderly are becoming increasingly popular in medical smart homes, the IT infrastructure and the sensitive information collected using sensor networks can be exposed to cyberattacks. The management of such systems requires 24/7/365 monitoring and partial automation. However, the wide variety of data formats used by the various vendors’ products in medical smart homes cannot be used directly by software agents for data aggregation and data fusion, let alone to support the overall cybersecurity posture. This can be enabled by capturing the semantics of the components of the sensor networks used in these settings. Network anomalies, sensor failure, and sensor data tampering can be detected automatically by performing automated reasoning. In this chapter, we present an overview of knowledge organization systems in a medical smart home environment. We discuss the cyberattack types that occurred in the medical smart home setting and the role of legislation and standards. Finally, we discuss information security countermeasures for cyber-resilience to improve overall the Medical IoT infrastructure.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    Photoplethysmogram.

  2. 2.

    Electrocardiography.

  3. 3.

    Magnetic Resonance Imaging.

  4. 4.

    Computed Tomography.

  5. 5.

    https://www.cyber.gov.au/acsc/view-all-content/advisories/2020-013-ransomware-targeting-au-stralian-aged-care-and-healthcare-sectors.

  6. 6.

    Therapeutic Goods Administration.

  7. 7.

    https://www.tga.gov.au/sites/default/files/medical-device-cyber-security-guidance-industry.pdf.

  8. 8.

    Radio Frequency Identification.

  9. 9.

    Wireless Sensor Networks.

References

  1. Mansell Robin (1994) Information and communication technology policy research in the united kingdom: a perspective. Can J Commun 19(1):1–11

    Article  Google Scholar 

  2. Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci E (2002) Wireless sensor networks: a survey. Comput Netw 38:393–422

    Article  Google Scholar 

  3. Bennasar M, Price BA, Stuart A, Gooch D, Mccormick C, Mehta V, Clare L, Blaine A, Stuart A, Gooch D, Mccormick C, Bandara AK (2019) Knowledge-based architecture for recognising activities of older people. 23rd International Conference on Knowledge-Based and Intelligent Information & Engineering Systems, 159:590–599

    Google Scholar 

  4. Hammi B, Zeadally S, Khatoun R, Nebhen J (2022) Survey on smart homes: vulnerabilities, risks, and countermeasures. Comput Secur 117

    Google Scholar 

  5. Kamel MBM, George LE (2013) Remote patient tracking and monitoring system. Int J Comput Sci Mob Comput 2:88–94

    Google Scholar 

  6. Wazid M, Das AK, Rodrigues JJPC, Shetty S, Park Y (2019) IoMT malware detection approaches: analysis and research challenges. IEEE Access 7:182459–182476

    Google Scholar 

  7. Mitchell Lauren L, Peterson Colleen M, Rud Shaina R, Jutkowitz Eric, Sarkinen Andrielle, Trost Sierra, Porta Carolyn M, Finlay Jessica M, Gaugler Joseph E (2020) “It’s like a cyber-security blanket’’: the utility of remote activity monitoring in family dementia care. J Appl Gerontol 39(1):86–98

    Article  Google Scholar 

  8. World Health Organization (2021) Ageing and health. pp 5–9. Online available at https://www.who.int/news-room/fact-sheets/detail/ageing-and-health

  9. Australian government (2017) Australian law reform commission. Who are older australians? pp 1–8

    Google Scholar 

  10. Frey Bruce B (1996) Health insurance portability and accountability Act. The SAGE Encyclopedia of Educational Research, Measurement, and Evaluation 12–14:2018

    Google Scholar 

  11. Alromaihi S, Elmedany W, Balakrishna C (2018) Cyber security challenges of deploying IoT in smart cities for healthcare applications. In: Proceedings - 2018 IEEE 6th International Conference on Future Internet of Things and Cloud Workshops, W-FiCloud 2018. pp 140–145

    Google Scholar 

  12. Nasiri S, Sadoughi F, Tadayon MH, Dehnad A (2019) Security requirements of internet of things-based healthcare system: a survey study. Acta Inform Med 2(4):253–258

    Google Scholar 

  13. Sikos LF (2019) Data science in cybersecurity and cyberthreat intelligence

    Google Scholar 

  14. Yaqoob Tehreem, Abbas Haider, Atiquzzaman Mohammed (2019) Security vulnerabilities, attacks, countermeasures, and regulations of networked medical devices-a review. IEEE Commun Surv Tutor 21(4):3723–3768

    Article  Google Scholar 

  15. Culmone Rosario, Giuliodori Paolo, Quadrini Michela (2015) Human activity recognition using a semantic ontology-based framework. Int J Adv Intell Syst 8(2):159–168

    Google Scholar 

  16. Sharma N, Mangla M, Mohanty SN, Gupta D, Tiwari P, Shorfuzzaman M, Rawashdeh M(2021) A smart ontology-based IoT framework for remote patient monitoring. Biomed Signal Process Control 68

    Google Scholar 

  17. Martino BD, Esposito A, Liguori S, Ospedale F, Maisto SA, Nacchia S (2018) A fuzzy prolog and ontology driven framework for medical diagnosis using IoT devices. Advances in intelligent systems and computing, 611:875–884

    Google Scholar 

  18. Guerrero E, Nieves JC, Lindgren H (2016) An activity-centric argumentation framework for assistive technology aimed at improving health. Argum Comput 7(1):5–33

    Google Scholar 

  19. Guerrero E, Lindgren H, Nieves JC (2013) ALI, an ambient assisted living system for supporting behavior change. VIII Workshop on Agents Applied in Health Care (A2HC 2013). Mci, pp 81–92

    Google Scholar 

  20. Negin Farhood, Brémond François (2019) An unsupervised framework for online spatiotemporal detection of activities of daily living by hierarchical activity models. Sensors (Switzerland) 19(19):1–34

    Article  Google Scholar 

  21. Mahler T, Elovici Y, Shahar Y (2020) A new methodology for information security risk assessment for medical devices and its evaluation

    Google Scholar 

  22. Hassija V, Chamola V, Bajpai BC, Naren, Zeadally S (2021) Security issues in implantable medical devices: Fact or fiction? Sustain Cities Soc 66(April 2020):102552

    Google Scholar 

  23. Los Angles Times. Hollywood hospital pays \$17,000 in bitcoin to hackers; FBI investigating, pp 1–10

    Google Scholar 

  24. Farringer Deborah R (2017) Send us the bitcoin or patients will die: addressing the risks of ransomware attacks on hospitals. Seattle Univ Law Rev 40(3):16–23

    Google Scholar 

  25. Mahler T, Nissim N, Shalom E, Goldenberg I, Hassman G, Makori A, Kochav I, Elovici Y, Shahar Y (2018) Know your enemy: characteristics of cyber-attacks on medical imaging devices, pp 2–7

    Google Scholar 

  26. Australian Cyber Security Centre (2022) 2020-013 Ransomware targeting australian aged care and healthcare sectors, pp 1–6

    Google Scholar 

  27. Cheu S (2020) Cyber attack warning: Providers advised to take precautions

    Google Scholar 

  28. Boyi Xu, Da Li Xu, Cai Hongming, Xie Cheng, Jingyuan Hu, Fenglin Bu (2014) Ubiquitous data accessing method in iot-based information system for emergency medical services. IEEE Trans Ind Inform 10(2):1578–1586

    Article  Google Scholar 

  29. Dridi A, Sassi S, Faiz S (2018) Towards a semantic medical internet of things. In: Proceedings of IEEE/ACS International Conference on Computer Systems and Applications, AICCSA, Oct-2017. pp 1421–1428

    Google Scholar 

  30. Pazienza A, Polimeno G, Vitulano F, Maruccia Y (2019) Towards a digital future: an innovative semantic iot integrated platform for industry 4.0, healthcare, and territorial control. In: Conference Proceedings - IEEE International Conference on Systems, Man and Cybernetics, Oct-2019. pp 587–592

    Google Scholar 

  31. Mavrogiorgou A, Kiourtis A, Kyriazis D (2020) Identification of IoT medical devices APIs through ontology mapping techniques. EAI/Springer Innovations in Communication and Computing, pp 39–54

    Google Scholar 

  32. Hasan MK, Ghazal TM , Saeed RA, Pandey B, Gohel H, Eshmawi AA, Abdel-Khalek S, Alkhassawneh HM (2022) A review on security threats, vulnerabilities, and counter measures of 5G enabled internet-of-medical-things. IET Commun 16(5):421–432

    Google Scholar 

  33. Ahmed G, Mehmood D, Shahzad K, Malick RAS (2021) An efficient routing protocol for internet of medical things focusing hot spot node problem. Int J Distrib Sens Netw 17(2)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kulsoom S. Bughio .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Bughio, K.S., Sikos, L.F. (2023). Knowledge Organization Systems to Support Cyber-Resilience in Medical Smart Home Environments. In: Ahmed, M., Haskell-Dowland, P. (eds) Cybersecurity for Smart Cities. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-031-24946-4_5

Download citation

Publish with us

Policies and ethics