Cyber Attacks on Healthcare Devices Using Unmanned Aerial Vehicles

被引:0
作者
Sibi Chakkaravarthy Sethuraman
Vaidehi Vijayakumar
Steven Walczak
机构
[1] Vellore Institute of Technology,School of Information & Florida Center for Cybersecurity
[2] University of South Florida,undefined
来源
Journal of Medical Systems | 2020年 / 44卷
关键词
Mobile healthcare; Cyber threats; Drone; Body area network (BAN); Implantable medical device (IMD); Unmanned aerial vehicle (UAV);
D O I
暂无
中图分类号
学科分类号
摘要
The growing use of wireless technology in healthcare systems and devices makes these systems particularly open to cyber-based attacks, including denial of service and information theft via sniffing (eaves-dropping) and phishing attacks. Evolving technology enables wireless healthcare systems to communicate over longer ranges, which opens them up to greater numbers of possible threats. Unmanned aerial vehicles (UAV) or drones present a new and evolving attack surface for compromising wireless healthcare systems. An enumeration of the types of wireless attacks capable via drones are presented, including two new types of cyber threats: a stepping stone attack and a cloud-enabled attack. A real UAV is developed to test and demonstrate the vulnerabilities of healthcare systems to this new threat vector. The UAV successfully attacked a simulated smart hospital environment and also a small collection of wearable healthcare sensors. Compromise of wearable or implanted medical devices can lead to increased morbidity and mortality.
引用
收藏
相关论文
共 50 条
[21]   Aerial and underwater sound of unmanned aerial vehicles (Uav) [J].
Erbe C. ;
Parsons M. ;
Duncan A. ;
Osterrieder S.K. ;
Allen K. .
Journal of Unmanned Vehicle Systems, 2017, 5 (03) :92-101
[22]   The Problem of Recycling of Unmanned Aerial Vehicles [J].
Kordos, Adrian ;
Kmiotek, Malgorzata ;
Zylka, Wojciech ;
Muszynski, Tomasz .
ADVANCES IN SCIENCE AND TECHNOLOGY-RESEARCH JOURNAL, 2024, 18 (07) :277-288
[23]   Cybersecurity in unmanned aerial vehicles (UAVs) [J].
Ly, Bora ;
Ly, Romny .
Journal of Cyber Security Technology, 2021, 5 (02) :120-137
[24]   USE OF UNMANNED AERIAL VEHICLES IN POLAND [J].
Puniach, Edyta ;
Kwartnik-Pruc, Anita ;
Cwiakala, Pawel .
GEOGRAPHIC INFORMATION SYSTEMS CONFERENCE AND EXHIBITION - GIS ODYSSEY 2016, 2016, :207-217
[25]   Event-Triggered Formation Tracking Control for Unmanned Aerial Vehicles Subjected to Deception Attacks [J].
Sun, Biao ;
Gu, Zhou ;
Xiong, Tianyi .
ELECTRONICS, 2021, 10 (22)
[26]   Detecting and tracking vehicles in traffic by unmanned aerial vehicles [J].
Wang, Liang ;
Chen, Fangliang ;
Yin, Huiming .
AUTOMATION IN CONSTRUCTION, 2016, 72 :294-308
[27]   Citation patterns of publications using unmanned aerial vehicles in ecology and conservation [J].
Dujon, Antoine M. .
JOURNAL OF UNMANNED VEHICLE SYSTEMS, 2020, 8 (01) :1-10
[28]   Localization of drone operator using Unmanned Aerial Vehicles: Preliminary research [J].
Magdalenic, Ivan ;
Vrcek, Neven ;
Tomas, Boris ;
Guomundsson, Karl Solvi .
CENTRAL EUROPEAN CONFERENCE ON INFORMATION AND INTELLIGENT SYSTEMS, CECIIS 2022, 2022, :335-339
[29]   Using Advanced Manufacturing to Produce Unmanned Aerial Vehicles: A Feasibility Study [J].
Easter, Steven ;
Turman, Jonathan ;
Sheffler, David ;
Balazs, Michael ;
Rotner, Jonathan .
GROUND/AIR MULTISENSOR INTEROPERABILITY, INTEGRATION, AND NETWORKING FOR PERSISTENT ISR IV, 2013, 8742
[30]   Aeromagnetic Exploration using Unmanned Aerial Vehicles: Current and Future Trends [J].
Kim, Bona .
GEOPHYSICS AND GEOPHYSICAL EXPLORATION, 2020, 23 (03) :178-191