Cyber Attacks on Healthcare Devices Using Unmanned Aerial Vehicles

被引:0
|
作者
Sibi Chakkaravarthy Sethuraman
Vaidehi Vijayakumar
Steven Walczak
机构
[1] Vellore Institute of Technology,School of Information & Florida Center for Cybersecurity
[2] University of South Florida,undefined
来源
关键词
Mobile healthcare; Cyber threats; Drone; Body area network (BAN); Implantable medical device (IMD); Unmanned aerial vehicle (UAV);
D O I
暂无
中图分类号
学科分类号
摘要
The growing use of wireless technology in healthcare systems and devices makes these systems particularly open to cyber-based attacks, including denial of service and information theft via sniffing (eaves-dropping) and phishing attacks. Evolving technology enables wireless healthcare systems to communicate over longer ranges, which opens them up to greater numbers of possible threats. Unmanned aerial vehicles (UAV) or drones present a new and evolving attack surface for compromising wireless healthcare systems. An enumeration of the types of wireless attacks capable via drones are presented, including two new types of cyber threats: a stepping stone attack and a cloud-enabled attack. A real UAV is developed to test and demonstrate the vulnerabilities of healthcare systems to this new threat vector. The UAV successfully attacked a simulated smart hospital environment and also a small collection of wearable healthcare sensors. Compromise of wearable or implanted medical devices can lead to increased morbidity and mortality.
引用
收藏
相关论文
共 50 条
  • [21] Unmanned Aerial Vehicles in Peril: Investigating and Addressing Cyber Threats to UAVs
    Oracevic, Alma
    Salman, Ahmad
    2024 INTERNATIONAL CONFERENCE ON SMART APPLICATIONS, COMMUNICATIONS AND NETWORKING, SMARTNETS-2024, 2024,
  • [22] MAVR: Code Reuse Stealthy Attacks and Mitigation on Unmanned Aerial Vehicles
    Habibi, Javid
    Gupta, Aditi
    Carlson, Stephen
    Panicker, Ajay
    Bertino, Elisa
    2015 IEEE 35TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, 2015, : 642 - 652
  • [23] Fast Reactive Mechanism for Desired Trajectory Attacks on Unmanned Aerial Vehicles
    Gu, Yapei
    Guo, Kexin
    Zhao, Chenlong
    Yu, Xiang
    Guo, Lei
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2023, 19 (08) : 8976 - 8984
  • [24] Security of unmanned aerial vehicle systems against cyber-physical attacks
    Rani, Chaitanya
    Modares, Hamidreza
    Sriram, Raghavendra
    Mikulski, Dariusz
    Lewis, Frank L.
    JOURNAL OF DEFENSE MODELING AND SIMULATION-APPLICATIONS METHODOLOGY TECHNOLOGY-JDMS, 2016, 13 (03): : 331 - 342
  • [25] UNMANNED AERIAL VEHICLES
    TREGO, L
    AEROSPACE ENGINEERING, 1994, 14 (03) : 15 - 15
  • [26] Unmanned aerial vehicles
    Scarpa, F
    AIRCRAFT ENGINEERING AND AEROSPACE TECHNOLOGY, 2001, 73 (04): : 401 - 402
  • [27] Detecting Attacks and Locating Malicious Devices Using Unmanned Air Vehicles and Machine Learning
    Junior, Evilasio C.
    Costa, Wanderson L.
    Portela, Arid L. C.
    Rocha, Leonardo S.
    Domes, Rafael L.
    Andrade, Rossana M. C.
    JOURNAL OF INTERNET SERVICES AND APPLICATIONS, 2022, 13 (01) : 11 - 20
  • [28] Unmanned aerial vehicles
    Braatz, Richard D.
    IEEE Control Systems, 2012, 32 (05) : 8 - 9
  • [29] Unmanned aerial vehicles
    Aerospace Engineering (Warrendale, Pennsylvania), 1994, 14 (03):
  • [30] Implementation analysis of reliable unmanned aerial vehicles models for security against cyber-crimes: Attacks, tracebacks, forensics and solutions
    Alsulami, Hemaid
    COMPUTERS & ELECTRICAL ENGINEERING, 2022, 100