Identifying and Modeling Security Threats for IoMT Edge Network using Markov Chain and Common Vulnerability Scoring System (CVSS)

04/23/2021
by   Maha Ali Allouzi, et al.
0

In this work, we defined an attack vector for networks utilizing the Internet of Medical Things (IoMT) devices and compute the probability distribution of IoMT security threats based on Markov chain and Common Vulnerability Scoring System (CVSS). IoMT is an emerging technology that improves patients' quality of life by permitting personalized e-health services without restrictions on time and site. The IoMT consists of embedded objects, sensors, and actuators that transmit and receive medical data. These Medical devices are vulnerable to different types of security threats, and thus, they pose a significant risk to patient's privacy and safety. Because security is a critical factor for successfully merging IoMT into pervasive healthcare systems, there is an urgent need for new security mechanisms to prevent threats on the IoMT edge network. Toward this direction, the first step is defining an attack vector that an attacker or unauthorized user can take advantage of to penetrate and tamper with medical data. In this article, we specify a threat model for the IoMT edge network. We identify any vulnerabilities or weaknesses within the IoMT network that allow unauthorized privileges and threats that can utilize these weaknesses to compromise the IoMT edge network. Finally, we compute the probability distribution of IoMT threats based on the Markov transition probability matrix.

READ FULL TEXT

page 7

page 11

research
05/15/2020

A Survey on Security and Privacy Issues in Modern Healthcare Systems: Attacks and Defenses

The recent advancements in computing systems and wireless communications...
research
07/19/2022

Privacy Threats on the Internet of Medical Things

The Internet of Medical Things (IoMT) is a frequent target of attacks – ...
research
01/09/2019

Risk analysis beyond vulnerability and resilience - characterizing the defensibility of critical systems

A common problem in risk analysis is to characterize the overall securit...
research
02/17/2020

A New Methodology for Information Security Risk Assessment for Medical Devices and Its Evaluation

As technology advances towards more connected and digital environments, ...
research
04/16/2018

A framework for mitigating zero-day attacks in IoT

Internet of Things (IoT) aims at providing connectivity between every co...
research
11/29/2018

Security, Privacy and Safety Risk Assessment for Virtual Reality Learning Environment Applications

Social Virtual Reality based Learning Environments (VRLEs) such as vSoci...
research
02/14/2019

Markov Chain-based Cost-Optimal Control Charts for Healthcare Data

Control charts have traditionally been used in industrial statistics, bu...

Please sign up or login with your details

Forgot password? Click here to reset