Cargando…

Attack Graph Modeling for Implantable Pacemaker

Remote health monitoring systems are used to audit implantable medical devices or patients’ health in a non-clinical setting. These systems are prone to cyberattacks exploiting their critical vulnerabilities. Thus, threatening patients’ health and confidentiality. In this paper, a pacemaker automati...

Descripción completa

Detalles Bibliográficos
Autores principales: Ibrahim, Mariam, Alsheikh, Ahmad, Matar, Aseel
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2020
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7168278/
https://www.ncbi.nlm.nih.gov/pubmed/32093089
http://dx.doi.org/10.3390/bios10020014
_version_ 1783523651607330816
author Ibrahim, Mariam
Alsheikh, Ahmad
Matar, Aseel
author_facet Ibrahim, Mariam
Alsheikh, Ahmad
Matar, Aseel
author_sort Ibrahim, Mariam
collection PubMed
description Remote health monitoring systems are used to audit implantable medical devices or patients’ health in a non-clinical setting. These systems are prone to cyberattacks exploiting their critical vulnerabilities. Thus, threatening patients’ health and confidentiality. In this paper, a pacemaker automatic remote monitoring system (PARMS) is modeled using architecture analysis and design language (AADL), formally characterized, and checked using the JKind model checker tool. The generated attack graph is visualized using the Graphviz tool, and classifies security breaches through the violation of the security features of significance. The developed attack graph showed the essentiality of setting up appropriate security measures in PARMS.
format Online
Article
Text
id pubmed-7168278
institution National Center for Biotechnology Information
language English
publishDate 2020
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-71682782020-04-22 Attack Graph Modeling for Implantable Pacemaker Ibrahim, Mariam Alsheikh, Ahmad Matar, Aseel Biosensors (Basel) Article Remote health monitoring systems are used to audit implantable medical devices or patients’ health in a non-clinical setting. These systems are prone to cyberattacks exploiting their critical vulnerabilities. Thus, threatening patients’ health and confidentiality. In this paper, a pacemaker automatic remote monitoring system (PARMS) is modeled using architecture analysis and design language (AADL), formally characterized, and checked using the JKind model checker tool. The generated attack graph is visualized using the Graphviz tool, and classifies security breaches through the violation of the security features of significance. The developed attack graph showed the essentiality of setting up appropriate security measures in PARMS. MDPI 2020-02-19 /pmc/articles/PMC7168278/ /pubmed/32093089 http://dx.doi.org/10.3390/bios10020014 Text en © 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Ibrahim, Mariam
Alsheikh, Ahmad
Matar, Aseel
Attack Graph Modeling for Implantable Pacemaker
title Attack Graph Modeling for Implantable Pacemaker
title_full Attack Graph Modeling for Implantable Pacemaker
title_fullStr Attack Graph Modeling for Implantable Pacemaker
title_full_unstemmed Attack Graph Modeling for Implantable Pacemaker
title_short Attack Graph Modeling for Implantable Pacemaker
title_sort attack graph modeling for implantable pacemaker
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7168278/
https://www.ncbi.nlm.nih.gov/pubmed/32093089
http://dx.doi.org/10.3390/bios10020014
work_keys_str_mv AT ibrahimmariam attackgraphmodelingforimplantablepacemaker
AT alsheikhahmad attackgraphmodelingforimplantablepacemaker
AT mataraseel attackgraphmodelingforimplantablepacemaker