Skip to main content

Taxonomy of Cyber Security in Medical Science

  • Conference paper
  • First Online:
Emerging Technologies in Data Mining and Information Security

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 164))

Abstract

Recently, an incrementing number of cyber-attacks in the medical field have resulted in great losses. In the health care industry, since medical information plays an essential role in human health. To prevent from these types of cyber attacks, there are various steps are taken by Hospital Institute Management Systems (HIMS) regarding to its security which is also called cyber security as it is related to computer technology. In response, we have been discussing this misconduct and trying to increase the awareness of researchers, but it seems that there is a lack of research that presents guidelines for editors to help them protect themselves against these threats In this paper, we understand more about cyber security in medical field and a brief overview of cyber securities is presented along with building of cyber securities is explained for the better understanding. We then explain the details involved in each type of attack.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. C. Peng, M.M. Hossain, Cyber-physical security for ongoing smart grid initiatives: a survey. IET Cyber Phys. Syst. Theor. Appl. https://doi.org/10.1049/iet-cps.2019.0039 (2020)

  2. Security for industrial cyber-physical systems, in 2018 IEEE Industrial Cyber-Physical Systems (ICPS). https://doi.org/10.1109/icphys.2018.8390806 (2018)

  3. J. Chen, Q. Zhu, Security as a service for cloud-enabled internet of controlled things under advanced persistent threats: a contract design approach. IEEE Trans. Inf. Forensics Secur. 12(11), 2736–2750 (2017). https://doi.org/10.1109/tifs.2017.2718489

    Article  Google Scholar 

  4. F. Li, Y. Shi, A. Shinde, J. Ye, W. Song, Enhanced cyber-physical security in internet of things through energy auditing. IEEE Internet Things J. 6(3), 5224–5231 (2019). https://doi.org/10.1109/jiot.2019.2899492

    Article  Google Scholar 

  5. M. Span, L.O. Mailloux, R.F. Mills, W. Young, Conceptual systems security requirements analysis: aerial refueling case study. IEEE Access 6, 46668–46682 (2018). https://doi.org/10.1109/access.2018.2865736

    Article  Google Scholar 

  6. H. Orojloo, M.A. Azgomi, Modelling and evaluation of the security of cyber-physical systems using stochastic petri nets. IET Cyber Phys. Syst. Theor. Appl. 4(1), 50–57 (2019). https://doi.org/10.1049/iet-cps.2018.0008

    Article  Google Scholar 

  7. S. Kim, Y. Won, I.-H. Park, Y. Eun, K.-J. Park, Cyber-physical vulnerability analysis of communication-based train control. IEEE Internet Things J. 6(4), 6353–6362 (2019). https://doi.org/10.1109/jiot.2019.2919066

    Article  Google Scholar 

  8. Y. Zhang, Y. Xiang, X. Huang, A cross-layer key establishment model for wireless devices in cyber-physical systems, in Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security—CPSS 17. https://doi.org/10.1145/3055186.3055187 (2017)

  9. T. Varshney, N. Sharma, I. Kaushik, B. Bhushan, Architectural model of security threats and their countermeasures in IoT, in 2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS). https://doi.org/10.1109/icccis48478.2019.8974544 (2019)

  10. V. Venkataramanan, A. Hahn, A. Srivastava, CP-SAM: cyber-physical security assessment metric for monitoring microgrid resiliency. IEEE Trans. Smart Grid 11(2), 1055–1065 (2020). https://doi.org/10.1109/tsg.2019.2930241

    Article  Google Scholar 

  11. X. Li, K.W. Hedman, Enhancing power system cyber-security with systematic two-stage detection strategy. IEEE Trans. Power Syst. 35(2), 1549–1561 (2020). https://doi.org/10.1109/tpwrs.2019.2942333

    Article  Google Scholar 

  12. I. Kaushik, N. Sharma, N. Singh, Intrusion detection and security system for blackhole attack, in 2019 2nd International Conference on Signal Processing and Communication (ICSPC). https://doi.org/10.1109/icspc46172.2019.8976797 (2019)

  13. S. Mili, N. Nguyen, R. Chelouah, Transformation-based approach to security verification for cyber-physical systems. IEEE Syst. J. 13(4), 3989–4000 (2019). https://doi.org/10.1109/jsyst.2019.2923818

    Article  Google Scholar 

  14. A. Sharma, A. Singh, N. Sharma, I. Kaushik, B. Bhushan, Security countermeasures in web based application, in 2019 2nd International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT). https://doi.org/10.1109/icicict46008.2019.8993141 (2019)

  15. A. Ahmed, V.V.G. Krishnan, S.A. Foroutan, M. Touhiduzzaman, A. Srivastava, Y. Wu, S. Sindhu et al. Cyber physical security analytics for anomalies in transmission protection systems, in 2018 IEEE Industry Applications Society Annual Meeting (IAS). https://doi.org/10.1109/ias.2018.8544672 (2018)

  16. P. Sinha, A.K. Rai, B. Bhushan, Information security threats and attacks with conceivable counteraction, in 2019 2nd International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT). https://doi.org/10.1109/icicict46008.2019.8993384 (2019)

  17. A. Ahmed, V.V.G. Krishnan, S.A. Foroutan, M. Touhiduzzaman, C. Rublein, A. Srivastava, S. Suresh et al., Cyber physical security analytics for anomalies in transmission protection systems. IEEE Trans. Ind. Appl. 55(6), 6313–6323 (2019). https://doi.org/10.1109/tia.2019.292850

    Article  Google Scholar 

  18. S. Soni, B. Bhushan, Use of machine learning algorithms for designing efficient cyber security solutions, in 2019 2nd International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT). https://doi.org/10.1109/icicict46008.2019.8993253 (2019)

  19. Comparative analysis of 3-D password using various techniques. Int. J. Emerg. Technol. Innov. Res. 6(6), 711–718. ISSN 2349-5162, www.jetir.org (2019)

  20. B. Bhushan, G. Sahoo, Requirements, protocols, and security challenges in wireless sensor networks: an industrial perspective. in Handbook of Computer Networks and Cyber Security, pp. 683–713. https://doi.org/10.1007/978-3-030-22277-2_27 (2020)

  21. A. Carelli, A. Vallero, S.D. Carlo, Performance monitor counters: interplay between safety and security in complex cyber-physical systems. IEEE Trans. Device Mater. Reliab. 19(1), 73–83 (2019). https://doi.org/10.1109/tdmr.2019.2898882

    Article  Google Scholar 

  22. B. Bhushan, G. Sahoo, Recent advances in attacks, technical challenges, vulnerabilities and their countermeasures in wireless sensor networks. Wirel. Pers. Commun. 98(2), 2037–2077 (2017). https://doi.org/10.1007/s11277-017-4962-0

    Article  Google Scholar 

  23. M. Evans, Y. He, C. Luo, I. Yevseyeva, H. Janicke, E. Zamani, L.A. Maglaras, Real-time information security incident management: a case study using the IS-CHEC technique. IEEE Access 7, 142147–142175 (2019). https://doi.org/10.1109/access.2019.2944615

    Article  Google Scholar 

  24. Aditya Khamparia, Babita Pandey, A novel method of case representation and retrieval in CBR for e-learning. Edu. Inform. Technol. 22(1), 337–354 (2015). https://doi.org/10.1007/s10639-015-9447-8

    Article  Google Scholar 

  25. A. Nourian, S. Madnick, A systems theoretic approach to the security threats in cyber physical systems applied to Stuxnet. IEEE Trans. Dependable Sec. Comput. 15(1), 2–13 (2018). https://doi.org/10.1109/tdsc.2015.2509994

    Article  Google Scholar 

  26. P. Sinha, V.K. Jha, A.K. Rai, B. Bhushan, Security vulnerabilities, attacks and countermeasures in wireless sensor networks at various layers of OSI reference model: a survey, in 2017 International Conference on Signal Processing and Communication (ICSPC). https://doi.org/10.1109/cspc.2017.8305855 (2017)

  27. Y. Cui, F. Bai, Y. Liu, Y. Liu, A measurement source authentication methodology for power system cyber security enhancement. IEEE Trans. Smart Grid 9(4), 3914–3916 (2018). https://doi.org/10.1109/tsg.2018.2826444

    Article  Google Scholar 

  28. Y. Liu, A. Liu, X. Liu, M. Ma, A trust-based active detection for cyber-physical security in industrial environments. IEEE Trans. Ind. Inf. 15(12), 6593–6603 (2019). https://doi.org/10.1109/tii.2019.2931394

    Article  Google Scholar 

  29. A. Singh, A. Sharma, N. Sharma, I. Kaushik, B. Bhushan, Taxonomy of attacks on web based applications, in 2019 2nd International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT). https://doi.org/10.1109/icicict46008.2019.8993264 (2019)

  30. A.K.. Luhach, A. Khamparia, R. Sihag, R. Kumar, Honey bee optimization based sink mobility aware heterogeneous protocol for wireless sensor network. Scalable Comput. Prac. Exp. 20(4), 591–598 (2020)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Harshit Yadav .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Bhardwaj, J., Gautam, S., Yadav, H., Tyagi, N., Abidin, S. (2021). Taxonomy of Cyber Security in Medical Science. In: Tavares, J.M.R.S., Chakrabarti, S., Bhattacharya, A., Ghatak, S. (eds) Emerging Technologies in Data Mining and Information Security. Lecture Notes in Networks and Systems, vol 164. Springer, Singapore. https://doi.org/10.1007/978-981-15-9774-9_36

Download citation

Publish with us

Policies and ethics