2016
DOI: 10.1109/access.2016.2521727
|View full text |Cite
|
Sign up to set email alerts
|

Security Tradeoffs in Cyber Physical Systems: A Case Study Survey on Implantable Medical Devices

Abstract: The new culture of networked systems that offer everywhere accessible services has given rise to various types of security tradeoffs. In fact, with the evolution of physical systems that keep getting integrated with cyber frameworks, cyber threats have far more critical effects as they get reflected on the physical environment. As a result, the issue of security of cyber physical systems requires a special holistic treatment. In this paper, we study the tradeoff between security, safety, and availability in su… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
68
0
3

Year Published

2018
2018
2022
2022

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 126 publications
(71 citation statements)
references
References 73 publications
0
68
0
3
Order By: Relevance
“…One example of a usability issue is the aforementioned trade-off between the usability of an implant outside a medical environment and its vulnerability to cybersecurity attacks. Another one, again in the context of implantable devices, is the fact that authentication may be problematic in emergency situations (Camara et al, 2015;Altawy and Youssef, 2016). Because usability can differ for different demographics, there is a tight connection between this desideratum and one of the outstanding ethical issues concerning ICT in health, emerging from our review: the fact that vulnerable groups and those with special needs must be taken into particular consideration.…”
Section: Usabilitymentioning
confidence: 96%
“…One example of a usability issue is the aforementioned trade-off between the usability of an implant outside a medical environment and its vulnerability to cybersecurity attacks. Another one, again in the context of implantable devices, is the fact that authentication may be problematic in emergency situations (Camara et al, 2015;Altawy and Youssef, 2016). Because usability can differ for different demographics, there is a tight connection between this desideratum and one of the outstanding ethical issues concerning ICT in health, emerging from our review: the fact that vulnerable groups and those with special needs must be taken into particular consideration.…”
Section: Usabilitymentioning
confidence: 96%
“…Generally, IoT devices work in diverse surroundings to accomplish different goals. However, their operation must meet a comprehensive security requirement in cyber and physical states [60,62]. IoT systems are complex and contain multidisciplinary arrangements.…”
Section: Iot Security Threatsmentioning
confidence: 99%
“…Currently, collecting valuable personal information, particularly personal health data, has become rampant on the black market [62]. The value of personal health information on the black market is $50 compared with $1.50 for credit card information and $3 for a social security number [62]. Moreover, an attacker can eavesdrop on communication channels to track the location of the IoT device holder if its communication channel is within range [72,73], thus causing a violation of privacy.…”
Section: ) Cyber Threatsmentioning
confidence: 99%
“…With the improvement of wireless communication technologies, the implantable medical devices (IMDs), such as pacemakers, cranial nerve stimulators, and cochlear implants, have been widely used in the medical services field [1,2]. All these micro devices implanted in patients' body can continuously monitor and collect data to reflect the patient's health.…”
Section: Introductionmentioning
confidence: 99%