Cyber Attacks on Healthcare Devices Using Unmanned Aerial Vehicles

被引:0
|
作者
Sibi Chakkaravarthy Sethuraman
Vaidehi Vijayakumar
Steven Walczak
机构
[1] Vellore Institute of Technology,School of Information & Florida Center for Cybersecurity
[2] University of South Florida,undefined
来源
关键词
Mobile healthcare; Cyber threats; Drone; Body area network (BAN); Implantable medical device (IMD); Unmanned aerial vehicle (UAV);
D O I
暂无
中图分类号
学科分类号
摘要
The growing use of wireless technology in healthcare systems and devices makes these systems particularly open to cyber-based attacks, including denial of service and information theft via sniffing (eaves-dropping) and phishing attacks. Evolving technology enables wireless healthcare systems to communicate over longer ranges, which opens them up to greater numbers of possible threats. Unmanned aerial vehicles (UAV) or drones present a new and evolving attack surface for compromising wireless healthcare systems. An enumeration of the types of wireless attacks capable via drones are presented, including two new types of cyber threats: a stepping stone attack and a cloud-enabled attack. A real UAV is developed to test and demonstrate the vulnerabilities of healthcare systems to this new threat vector. The UAV successfully attacked a simulated smart hospital environment and also a small collection of wearable healthcare sensors. Compromise of wearable or implanted medical devices can lead to increased morbidity and mortality.
引用
收藏
相关论文
共 50 条
  • [1] Cyber Attacks on Healthcare Devices Using Unmanned Aerial Vehicles
    Sethuraman, Sibi Chakkaravarthy
    Vijayakumar, Vaidehi
    Walczak, Steven
    JOURNAL OF MEDICAL SYSTEMS, 2020, 44 (01)
  • [2] Cyber Attacks and Vulnerabilities Assessment for Unmanned Aerial Vehicles Communication Systems
    Hadi, Hassan Jalil
    Cao, Yue
    Proceedings - 2022 International Conference on Frontiers of Information Technology, FIT 2022, 2022, : 213 - 218
  • [3] How to Detect Cyber-attacks in Unmanned Aerial Vehicles Network?
    Sedjelmaci, Hichem
    Senouci, Sidi Mohammed
    Messous, Mohamed-Ayoub
    2016 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2016,
  • [4] A Survey on Cyber Security of Unmanned Aerial Vehicles
    He D.-J.
    Du X.
    Qiao Y.-R.
    Zhu Y.-K.
    Fan Q.
    Luo W.
    Jisuanji Xuebao/Chinese Journal of Computers, 2019, 42 (05): : 1076 - 1094
  • [5] A System-Theoretic Measure for Quantification of Vulnerabilities to Cyber Attacks with Application to Unmanned Aerial Vehicles
    Tahavori, Maryamsadat
    2020 7TH INTERNATIONAL CONFERENCE ON CONTROL, DECISION AND INFORMATION TECHNOLOGIES (CODIT'20), VOL 1, 2020, : 492 - 495
  • [6] Event-Triggered Attitude Controller Design for Unmanned Aerial Vehicles under Cyber Attacks
    Han, Seungyong
    Guo, Xuyang
    Jin, Yongsik
    Lim, Yongseob
    Kommuri, Suneel Kumar
    2024 33RD INTERNATIONAL SYMPOSIUM ON INDUSTRIAL ELECTRONICS, ISIE 2024, 2024,
  • [7] Security of Unmanned Aerial Vehicles: Dynamic state estimation under cyber-physical attacks
    Petnga, Leonard
    Xu, Huan
    2016 INTERNATIONAL CONFERENCE ON UNMANNED AIRCRAFT SYSTEMS (ICUAS), 2016, : 811 - 819
  • [8] Cyber-physical control of unmanned aerial vehicles
    Jamshidi, M.
    Betancourt, A. S. Jaimes
    Gomez, J.
    SCIENTIA IRANICA, 2011, 18 (03) : 663 - 668
  • [9] Analysis and Design of Stealthy Cyber Attacks on Unmanned Aerial Systems
    Kwon, Cheolhyeon
    Liu, Weiyi
    Hwang, Inseok
    JOURNAL OF AEROSPACE INFORMATION SYSTEMS, 2014, 11 (08): : 525 - 539
  • [10] Simulation of Sensor Spoofing Attacks on Unmanned Aerial Vehicles using the Gazebo Simulator
    Pekaric, Irdin
    Arnold, David
    Felderer, Michael
    2022 IEEE 22ND INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY, AND SECURITY COMPANION, QRS-C, 2022, : 44 - 53