scholarly journals Attack Graph Modeling for Implantable Pacemaker

Biosensors ◽  
2020 ◽  
Vol 10 (2) ◽  
pp. 14 ◽  
Author(s):  
Mariam Ibrahim ◽  
Ahmad Alsheikh ◽  
Aseel Matar

Remote health monitoring systems are used to audit implantable medical devices or patients’ health in a non-clinical setting. These systems are prone to cyberattacks exploiting their critical vulnerabilities. Thus, threatening patients’ health and confidentiality. In this paper, a pacemaker automatic remote monitoring system (PARMS) is modeled using architecture analysis and design language (AADL), formally characterized, and checked using the JKind model checker tool. The generated attack graph is visualized using the Graphviz tool, and classifies security breaches through the violation of the security features of significance. The developed attack graph showed the essentiality of setting up appropriate security measures in PARMS.

Author(s):  
Isiaka Ajewale Alimi

The development in different communication systems as well as multimedia applications and services leads to high rate of Internet usage. However, transmission of information over such networks can be compromised and security breaches such as virus, denial of service, unauthorized access, and theft of proprietary information which may have devastating impact on the system may occur if adequate security measures are not employed. Consequently, building viable, effective, and safe network is one of the main technical challenges of information transmission in campus networks. Furthermore, it has been observed that, network threats and attacks exist from the lower layers of network traffic to the application layer; therefore, this paper proposes an effective multi-layer firewall system for augmenting the functionalities of other network security technologies due to the fact that, irrespective of the type of access control being employed, attacks are still bound to occur. The effectiveness of the proposed network architecture is demonstrated using Cisco Packet Tracer. The simulation results show that, implementation of the proposed topology is viable and offers reasonable degree of security at different network layers.


2021 ◽  
Vol 2 (3) ◽  
pp. 1-44
Author(s):  
Akm Iqtidar Newaz ◽  
Amit Kumar Sikder ◽  
Mohammad Ashiqur Rahman ◽  
A. Selcuk Uluagac

Recent advancements in computing systems and wireless communications have made healthcare systems more efficient than before. Modern healthcare devices can monitor and manage different health conditions of patients automatically without any manual intervention from medical professionals. Additionally, the use of implantable medical devices, body area networks, and Internet of Things technologies in healthcare systems improve the overall patient monitoring and treatment process. However, these systems are complex in software and hardware, and optimizing between security, privacy, and treatment is crucial for healthcare systems because any security or privacy violation can lead to severe effects on patients’ treatments and overall health conditions. Indeed, the healthcare domain is increasingly facing security challenges and threats due to numerous design flaws and the lack of proper security measures in healthcare devices and applications. In this article, we explore various security and privacy threats to healthcare systems and discuss the consequences of these threats. We present a detailed survey of different potential attacks and discuss their impacts. Furthermore, we review the existing security measures proposed for healthcare systems and discuss their limitations. Finally, we conclude the article with future research directions toward securing healthcare systems against common vulnerabilities.


2013 ◽  
Vol 391 ◽  
pp. 347-351
Author(s):  
Yu Li Jun ◽  
Shao Ying Liu ◽  
Hui Wang ◽  
Shu Qin

Effective temperature control plays a key role in remote monitoring of wood drying. This paper analysis and design a fuzzy PID control strategy under the monitoring and control system by establishing the mathematical model of wood drying system. It can realize the remote communication by using RS485 and achieve the actual operation of the monitoring system control. By experimental data and the experimental curve, the temperature of the system has good tracking effect which can be verified. It can achieve effective remote monitoring.


2022 ◽  
pp. 214-234
Author(s):  
Heru Susanto ◽  
Nurul Mardhiah ◽  
Alifya Kayla Shafa Susanto

In recent years, the number of financial technology players and users have increased at a significant rate due to the rapid technological advancement in financial technology. While smart devices are providing more useful features to users, they have also made it possible for cyber threats to migrate from desktops to smart devices. Thus, it is important for smart device users to be aware that their device could be exposed to cyber threats and that users could protect their devices by employing data-centric cyber security measures. This study reveals how financial technology business model responded to the breach phenomenon by employing data-centric protection approaches. The result is very interesting. Data-centric security is very needed as it is capable of protecting data as a whole. It provides a gapless protection, meaning to say, the data are encrypted and classified wherever it moves. With persistent protection and cross-platform operability, data-centric security will eliminate gaps and keep data protected.


2010 ◽  
Vol 11 (2) ◽  
Author(s):  
Lukas Feiler

AbstractThe ePrivacyDirective and the FrameworkDirective as amended by the EU Telecoms Package introduce, for the first time, obligations for providers of public communications networks and for providers of publicly available electronic communications services to notify certain personal data security breaches and certain network security breaches to subscribers, individuals concerned, and/or the competent national (regulatory) authority. This paper analyzes the conditions under which different types of security breaches will have to be notified and to whom this notification will have to be addressed. The paper will conclude with a riskbased assessment of these new security breach notification requirements, examining to what extent they not only allow users to take corrective security measures and regulators to make informed policy choices, but also to what extent the new policies address the fundamental problem of the misalignment of risk and risk mitigation capability.


2013 ◽  
Vol 331 ◽  
pp. 622-625
Author(s):  
Gao Zheng Li ◽  
Cheng Liu ◽  
Guo Hong Cao ◽  
Nan Yu

In order to understand all data of landslides as much as possible, such as the time, place, scale and destructive power, a kind of Remote monitoring system of Landslides based on SCM was designed. The main function is for the purpose of dynamic monitoring of landslide timely and effectively. The main work include hardware design, software design and circuit debugging of the system. In the system, hardware design mainly consists of the analysis and design of landslides data acquisition module and data processing and control system module circuit; Software design is to refer to the compilations of various system modular program; Circuit debugging refers to the process of debugging the program running in the system to ensure that the department of the system can work normally.


2017 ◽  
Vol 25 (3) ◽  
pp. 425-433 ◽  
Author(s):  
Lorraine S. Evangelista ◽  
Hassan Ghasemzadeh ◽  
Jung-Ah Lee ◽  
Ramin Fallahzadeh ◽  
Majid Sarrafzadeh ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document