Cargando…
Attack Graph Modeling for Implantable Pacemaker
Remote health monitoring systems are used to audit implantable medical devices or patients’ health in a non-clinical setting. These systems are prone to cyberattacks exploiting their critical vulnerabilities. Thus, threatening patients’ health and confidentiality. In this paper, a pacemaker automati...
Autores principales: | , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2020
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7168278/ https://www.ncbi.nlm.nih.gov/pubmed/32093089 http://dx.doi.org/10.3390/bios10020014 |
_version_ | 1783523651607330816 |
---|---|
author | Ibrahim, Mariam Alsheikh, Ahmad Matar, Aseel |
author_facet | Ibrahim, Mariam Alsheikh, Ahmad Matar, Aseel |
author_sort | Ibrahim, Mariam |
collection | PubMed |
description | Remote health monitoring systems are used to audit implantable medical devices or patients’ health in a non-clinical setting. These systems are prone to cyberattacks exploiting their critical vulnerabilities. Thus, threatening patients’ health and confidentiality. In this paper, a pacemaker automatic remote monitoring system (PARMS) is modeled using architecture analysis and design language (AADL), formally characterized, and checked using the JKind model checker tool. The generated attack graph is visualized using the Graphviz tool, and classifies security breaches through the violation of the security features of significance. The developed attack graph showed the essentiality of setting up appropriate security measures in PARMS. |
format | Online Article Text |
id | pubmed-7168278 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2020 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-71682782020-04-22 Attack Graph Modeling for Implantable Pacemaker Ibrahim, Mariam Alsheikh, Ahmad Matar, Aseel Biosensors (Basel) Article Remote health monitoring systems are used to audit implantable medical devices or patients’ health in a non-clinical setting. These systems are prone to cyberattacks exploiting their critical vulnerabilities. Thus, threatening patients’ health and confidentiality. In this paper, a pacemaker automatic remote monitoring system (PARMS) is modeled using architecture analysis and design language (AADL), formally characterized, and checked using the JKind model checker tool. The generated attack graph is visualized using the Graphviz tool, and classifies security breaches through the violation of the security features of significance. The developed attack graph showed the essentiality of setting up appropriate security measures in PARMS. MDPI 2020-02-19 /pmc/articles/PMC7168278/ /pubmed/32093089 http://dx.doi.org/10.3390/bios10020014 Text en © 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Ibrahim, Mariam Alsheikh, Ahmad Matar, Aseel Attack Graph Modeling for Implantable Pacemaker |
title | Attack Graph Modeling for Implantable Pacemaker |
title_full | Attack Graph Modeling for Implantable Pacemaker |
title_fullStr | Attack Graph Modeling for Implantable Pacemaker |
title_full_unstemmed | Attack Graph Modeling for Implantable Pacemaker |
title_short | Attack Graph Modeling for Implantable Pacemaker |
title_sort | attack graph modeling for implantable pacemaker |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7168278/ https://www.ncbi.nlm.nih.gov/pubmed/32093089 http://dx.doi.org/10.3390/bios10020014 |
work_keys_str_mv | AT ibrahimmariam attackgraphmodelingforimplantablepacemaker AT alsheikhahmad attackgraphmodelingforimplantablepacemaker AT mataraseel attackgraphmodelingforimplantablepacemaker |