Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3549015.3554209acmotherconferencesArticle/Chapter ViewAbstractPublication PageseurousecConference Proceedingsconference-collections
research-article
Open access

Caring About IoT-Security – An Interview Study in the Healthcare Sector

Published: 29 September 2022 Publication History

Abstract

The number of medical IoT devices is increasing rapidly: CT scanners, ECG devices, insulin pumps and other devices, which previously operated independently, are being interconnected with other devices, now sharing patient data and/or uploading them to the cloud. Medical IoT devices can create privacy and security risks for patients, healthcare professionals, and the institutions that deploy them. Previous security research has focused on software vulnerabilities in IoT devices, and how they could be exploited. This study takes a broader security perspective, looking at security issues that arise in the life cycle of IoT devices deployed in healthcare environments. We performed in-depth online interviews lasting over 1 hour (12 hours in total) with n = 8 experts responsible for the security of medical IoT devices in hospitals. They had on average 20 years of industry experience (IT and/or security), and spoke from the experience of either in-hospital specialist, or as external consultants that advise multiple hospitals on IT security. Our findings suggest that medical IoT devices are a security time bomb: the inability to easily patch devices due to certification regulations, the requirements of manufacturers to enable remote maintenance, and the lack of qualified personnel and resources result in low levels of security, even compared to general IT systems in hospitals (which have been found to be vulnerable due to age and lack of security expertise). More encouragingly, most participants reported that awareness of hospital managers & manufacturers of these issues has improved, following new legislation on IT security in hospitals in Germany and the EU over the last two years. We conclude that the security and privacy risks of medical IoT devices is currently underestimated, and that a collaborative effort with manufacturers and primary users (medical staff) will be required to create effective processes for securing them.

References

[1]
Nasser S Abouzakhar, Andrew Jones, and Olga Angelopoulou. 2017. Internet of things security: A review of risks and threats to healthcare sector. In 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). IEEE, Exeter, UK, 373–378.
[2]
Nur Azaliah Abu Bakar, Wan Makhtariah Wan Ramli, and Noor Hafizah Hassan. 2019. The internet of things in healthcare: an overview, challenges and model plan for security risks management process. Indonesian Journal of Electrical Engineering and Computer Science 15, 1(2019), 414.
[3]
Farhad Ahamed and Farnaz Farid. 2018. Applying internet of things and machine-learning for personalized healthcare: Issues and challenges. In 2018 International Conference on Machine Learning and Data Engineering (iCMLDE). IEEE, Sydney, NSW, Australia, 19–21.
[4]
Muhammad Mahtab Alam, Hassan Malik, Muhidul Islam Khan, Tamas Pardy, Alar Kuusik, and Yannick Le Moullec. 2018. A survey on the roles of communication technologies in IoT-based personalized healthcare applications. IEEE Access 6(2018), 36611–36631.
[5]
Suvini P Amaraweera and Malka N Halgamuge. 2019. Internet of things in the healthcare sector: overview of security and privacy issues. Security, privacy and trust in the IoT environment 1 (2019), 153–179.
[6]
Danielle GT Arts, Nicolette F De Keizer, and Gert-Jan Scheffer. 2002. Defining and improving data quality in medical registries: a literature review, case study, and generic framework. Journal of the American Medical Informatics Association 9, 6(2002), 600–611.
[7]
Maria Bada, Angela M Sasse, and Jason RC Nurse. 2019. Cyber security awareness campaigns: Why do they fail to change behaviour?
[8]
Rosaline S Barbour. 2001. Checklists for improving rigour in qualitative research: a case of the tail wagging the dog?Bmj 322, 7294 (2001), 1115–1117.
[9]
Adam Beautement, M. Angela Sasse, and Mike Wonham. 2008. The compliance budget: Managing security behaviour in organisations. In Proceedings of the 2008 Workshop on New Security Paradigms, Angelos Keromytis, Anil Somayaji, Christian W. Probst, and Matt Bishop (Eds.). Association for Computing Machinery, New York, 47.
[10]
Bundesnetzagentur. 2017. Bundesnetzagentur zieht Kinderpuppe „Cayla“ aus dem Verkehr. Bundesnetzagentur. https://www.bundesnetzagentur.de/SharedDocs/Pressemitteilungen/DE/2017/14012017_cayla.html
[11]
Carmen Camara, Pedro Peris-Lopez, and Juan E Tapiador. 2015. Security and privacy issues in implantable medical devices: A comprehensive survey. Journal of biomedical informatics 55 (2015), 272–289.
[12]
Felipe Caro and Ramin Sadr. 2019. The Internet of Things (IoT) in retail: Bridging supply and demand. Business Horizons 62, 1 (2019), 47–54.
[13]
National Cyber Security Centre. 2021. Huawei Cyber Security Evaluation Centre (HCSEC) Oversight Board Annual Report 2021. National Cyber Security Centre. https://www.gov.uk/government/publications/huawei-cyber-security-evaluation-centre-hcsec-oversight-board-annual-report-2021
[14]
Lorrie Faith Cranor and Simson Garfinkel. 2004. Guest Editors’ Introduction: Secure or Usable?IEEE security & privacy 2, 5 (2004), 16–18.
[15]
KR Darshan and KR Anandakumar. 2015. A comprehensive review on usage of Internet of Things (IoT) in healthcare system. In 2015 International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT). IEEE, Mandya, India, 132–136.
[16]
Roberta De Michele and Marco Furini. 2019. Iot healthcare: Benefits, issues and challenges. In Proceedings of the 5th EAI International Conference on smart objects and technologies for social good. ACM, New York, NY, USA, 160–164.
[17]
Deutscher Bundestag. 2020. Gesetz über Medizinprodukte (German): MPG.
[18]
Deutscher Bundestag. 2021. Verordnung zur Bestimmung Kritischer Infrastrukturen nach dem BSI-Gesetz: BSI-KritisV (German).
[19]
Deutscher Bundestag. 2022. Gesetz für ein Zukunftsprogramm Krankenhäuser: KHZG (German).
[20]
Cynthia Dwork. 2006. Differential Privacy. In Automata, Languages and Programming, Michele Bugliesi, Bart Preneel, Vladimiro Sassone, and Ingo Wegener (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 1–12.
[21]
Bahar Farahani, Farshad Firouzi, Victor Chang, Mustafa Badaroglu, Nicholas Constant, and Kunal Mankodiya. 2018. Towards fog-driven IoT eHealth: Promises and challenges of IoT in medicine and healthcare. Future Generation Computer Systems 78 (2018), 659–676.
[22]
Muhammad Shoaib Farooq, Shamyla Riaz, Adnan Abid, Tariq Umer, and Yousaf Bin Zikria. 2020. Role of IoT technology in agriculture: A systematic literature review. Electronics 9, 2 (2020), 319.
[23]
Jim Finkle. 2016. J&J warns diabetic patients: Insulin pump vulnerable to hacking. Reuters. Published October 4 (2016), 1.
[24]
Farshad Firouzi, Bahar Farahani, Mohamed Ibrahim, and Krishnendu Chakrabarty. 2018. Keynote Paper: From EDA to IoT eHealth: Promises, Challenges, and Solutions. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 37, 12 (2018), 2965–2978.
[25]
Ivan Flechais, M Angela Sasse, and Stephen MV Hailes. 2003. Bringing security home: a process for developing secure and usable systems. In Proceedings of the 2003 workshop on New security paradigms. ACM, New York, NY, USA, 49–57.
[26]
Marco Gutfleisch, Jan H Klemmer, Niklas Busch, Yasemin Acar, M Angela Sasse, and Sascha Fahl. 2022. How does usable security (not) end up in software products? results from a qualitative interview study. In 43rd IEEE Symposium on Security and Privacy, IEEE S&P. IEEE, San Francisco, CA, USA, 22–26.
[27]
Xiali Hei, Xiaojiang Du, Shan Lin, Insup Lee, and Oleg Sokolsky. 2014. Patient infusion pattern based access control schemes for wireless insulin pump system. IEEE Transactions on Parallel and Distributed Systems 26, 11 (2014), 3108–3121.
[28]
Sebastian Hermes, Tobias Riasanow, Eric K. Clemons, Markus Böhm, and Helmut Krcmar. 2020. The digital transformation of the healthcare industry: exploring the rise of emerging platform ecosystems and their influence on the role of patients. Business Research 13, 3 (2020), 1033–1069.
[29]
Chi Yan Hui, Brian McKinstry, Olivia Fulton, Mark Buchner, and Hilary Pinnock. 2021. Patients’ and Clinicians’ Perceived Trust in Internet-of-Things Systems to Support Asthma Self-management: Qualitative Interview Study. JMIR mHealth and uHealth 9, 7 (2021), e24127.
[30]
SM Riazul Islam, Daehan Kwak, MD Humaun Kabir, Mahmud Hossain, and Kyung-Sup Kwak. 2015. The internet of things for health care: a comprehensive survey. IEEE access 3(2015), 678–708.
[31]
Fariha Tasmin Jaigirdar, Carsten Rudolph, and Chris Bain. 2019. Can I trust the data I see? A Physician’s concern on medical data in IoT health architectures. In Proceedings of the Australasian computer science week multiconference. ACM, New York, NY, USA, 1–10.
[32]
Gulraiz J Joyia, Rao M Liaqat, Aftab Farooq, and Saad Rehman. 2017. Internet of medical things (IoMT): Applications, benefits and future challenges in healthcare domain.J. Commun. 12, 4 (2017), 240–247.
[33]
Auguste Kerckhoffs. 1883. La cryptographie militaire, ou, Des chiffres usités en temps de guerre: avec un nouveau procédé de déchiffrement applicable aux systèmes à double clef. Librairie militaire de L. Baudoin, London, UK.
[34]
Sung-Ho Kim and Kyungyong Chung. 2015. Emergency situation monitoring service using context motion tracking of chronic disease patients. Cluster Computing 18, 2 (2015), 747–759.
[35]
Iacovos Kirlappos and M Angela Sasse. 2014. What usable security really means: Trusting and engaging users. In International Conference on Human Aspects of Information Security, Privacy, and Trust. Springer, ACM, New York, NY, USA, 69–78.
[36]
Ross Koppel, Sean Smith, Jim Blythe, and Vijay Kothari. 2015. Workarounds to computer access in healthcare organizations: you want my password or a dead patient?In Driving Quality in Informatics: Fulfilling the Promise. IOS Press, Dartmouth, PA, USA, 215–220.
[37]
Udo Kuckartz. 2012. Qualitative inhaltsanalyse. Beltz Juventa, Weinheim, Germany.
[38]
Priyan Malarvizhi Kumar, S Lokesh, R Varatharajan, Gokulnath Chandra Babu, and P Parthasarathy. 2018. Cloud and IoT based disease prediction and diagnosis system for healthcare using Fuzzy neural classifier. Future Generation Computer Systems 86 (2018), 527–534.
[39]
Alexandra R Lang, Jennifer L Martin, Sarah Sharples, and John A Crowe. 2013. The effect of design on the usability and real world effectiveness of medical devices: a case study with adolescent users. Applied ergonomics 44, 5 (2013), 799–810.
[40]
Áine MacDermott, Phillip Kendrick, Ibrahim Idowu, Mal Ashall, and Qi Shi. 2019. Securing things in the healthcare internet of things. In 2019 Global IoT Summit (GIoTS). IEEE, Aarhus, Denmark, 1–6.
[41]
Taha Mansouri, Mohammad Reza Sadeghi Moghadam, Fatemeh Monshizadeh, and Ahad Zareravasan. 2021. IoT data quality issues and potential solutions: a literature review.
[42]
Argyro Mavrogiorgou, Athanasios Kiourtis, Konstantinos Perakis, Stamatios Pitsios, and Dimosthenis Kyriazis. 2019. IoT in healthcare: Achieving interoperability of high-quality data acquired by IoT medical devices. Sensors 19, 9 (2019), 1978.
[43]
Nora McDonald, Sarita Schoenebeck, and Andrea Forte. 2019. Reliability and inter-rater reliability in qualitative research: Norms and guidelines for CSCW and HCI practice. Proceedings of the ACM on Human-Computer Interaction 3, CSCW(2019), 1–23.
[44]
Tom McVey. 2022. Ransomware recap: Learning from 2021.
[45]
Francesca Meneghello, Matteo Calore, Daniel Zucchetto, Michele Polese, and Andrea Zanella. 2019. IoT: Internet of threats? A survey of practical security vulnerabilities in real IoT devices. IEEE Internet of Things Journal 6, 5 (2019), 8182–8201.
[46]
Emna Mezghani, Ernesto Exposito, Khalil Drira, Marcos Da Silveira, and Cédric Pruski. 2015. A semantic big data platform for integrating heterogeneous wearable data in healthcare. Journal of medical systems 39, 12 (2015), 1–8.
[47]
Philipp Morgner, Christoph Mai, Nicole Koschate-Fischer, Felix Freiling, and Zinaida Benenson. 2020. Security Update Labels: Establishing Economic Incentives for Security Patching of IoT Consumer Products. In 2020 IEEE Symposium on Security and Privacy (SP). IEEE, San Francisco, CA, USA, 429–446.
[48]
Farha Nausheen and Sayyada Hajera Begum. 2018. Healthcare IoT: benefits, vulnerabilities and solutions. In 2018 2nd International Conference on Inventive Systems and Control (ICISC). IEEE, Coimbatore, India, 517–522.
[49]
Rahul Krishnan Pathinarupothi, P Durga, and Ekanath Srihari Rangan. 2018. IoT-based smart edge for global health: Remote monitoring with severity detection and alerts transmission. IEEE Internet of Things Journal 6, 2 (2018), 2449–2462.
[50]
Sarah Pearman, Shikun Aerin Zhang, Lujo Bauer, Nicolas Christin, and Lorrie Faith Cranor. 2019. Why people (don’t) use password managers effectively. In Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019). USENIX Association, Santa Clara, CA, USA, 319–338.
[51]
Karen Rose, Scott Eldridge, and Lyman Chapin. 2015. The internet of things: An overview. The internet society (ISOC) 80 (2015), 1–50.
[52]
Alexander Rudolph. 2022. What is Log4j and Why Did the Government of Canada Turn Everything Off?
[53]
Johannes Sametinger, Jerzy Rozenblit, Roman Lysecky, and Peter Ott. 2015. Security challenges for medical devices. Communications of the ACM 58, 4 (2015), 74–82.
[54]
M Angela Sasse and Ivan Flechais. 2005. Usable security: Why do we need it? How do we get it?In Security and Usability: Designing secure systems that people can use. O’Reilly, Sebastopol,CA, US.
[55]
M. Angela Sasse, Jonas Hielscher, and Marco Gutfleisch. 2022. Human-Centred Security: Unfug Informationssicherheits-Sensibilisierung (German). kma - Klinik Management aktuell 27, 04 (2022), 44–46.
[56]
Sureshkumar Selvaraj and Suresh Sundaravaradhan. 2020. Challenges and opportunities in IoT healthcare systems: a systematic review. SN Applied Sciences 2, 1 (2020), 139.
[57]
Noman Shahid and Sandhya Aneja. 2017. Internet of Things: Vision, application areas and research challenges. In 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC). IEEE, Palladam, India, 583–587.
[58]
Diane M Strong, Yang W Lee, and Richard Y Wang. 1997. Data quality in context. Commun. ACM 40, 5 (1997), 103–110.
[59]
Dina Truxius, Müller Emanuel, Nikolai Krupp, Julian Suleder, Oliver Matula, and Dennis Kniel. 2020. BSI-Projekt 392: Manipulation von Medizinprodukten (ManiMed): Cyber-Sicherheitsbetrachtung vernetzter Medizinprodukte.
[60]
Steffen Wendzel, Luca Caviglione, Wojciech Mazurczyk, Aleksandra Mileva, Jana Dittmann, Christian Krätzer, Kevin Lamshöft, Claus Vielhauer, Laura Hartmann, Jörg Keller, and Tom Neubert. 2021. A Revised Taxonomy of Steganography Embedding Patterns. In The 16th International Conference on Availability, Reliability and Security. ACM, New York, NY, USA, 1–12.
[61]
Ka-Ping Yee. 2004. Aligning security and usability. IEEE Security & Privacy 2, 5 (2004), 48–55.
[62]
Fotios Zantalis, Grigorios Koulouras, Sotiris Karabetsos, and Dionisis Kandris. 2019. A review of machine learning and IoT in smart transportation. Future Internet 11, 4 (2019), 94.
[63]
Guanglou Zheng, Guanghe Zhang, Wencheng Yang, Craig Valli, Rajan Shankaran, and Mehmet A Orgun. 2017. From WannaCry to WannaDie: Security trade-offs and design for implantable medical devices. In 2017 17th International Symposium on Communications and Information Technologies (ISCIT). IEEE, Cairns, QLD, Australia, 1–5.

Cited By

View all
  • (2024)Who Left the Door Open? Investigating the Causes of Exposed IoT Devices in an Academic Network2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00117(2291-2309)Online publication date: 19-May-2024
  • (2023)Lacking the tools and support to fix frictionProceedings of the Nineteenth USENIX Conference on Usable Privacy and Security10.5555/3632186.3632194(131-150)Online publication date: 7-Aug-2023

Index Terms

  1. Caring About IoT-Security – An Interview Study in the Healthcare Sector
            Index terms have been assigned to the content through auto-classification.

            Recommendations

            Comments

            Please enable JavaScript to view thecomments powered by Disqus.

            Information & Contributors

            Information

            Published In

            cover image ACM Other conferences
            EuroUSEC '22: Proceedings of the 2022 European Symposium on Usable Security
            September 2022
            232 pages
            ISBN:9781450397001
            DOI:10.1145/3549015
            This work is licensed under a Creative Commons Attribution International 4.0 License.

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            Published: 29 September 2022

            Check for updates

            Author Tags

            1. Healthcare IT Security
            2. Human-Centred Security
            3. Interview Study
            4. IoT Security

            Qualifiers

            • Research-article
            • Research
            • Refereed limited

            Funding Sources

            Conference

            EuroUSEC 2022
            EuroUSEC 2022: 2022 European Symposium on Usable Security
            September 29 - 30, 2022
            Karlsruhe, Germany

            Contributors

            Other Metrics

            Bibliometrics & Citations

            Bibliometrics

            Article Metrics

            • Downloads (Last 12 months)392
            • Downloads (Last 6 weeks)66
            Reflects downloads up to 16 Nov 2024

            Other Metrics

            Citations

            Cited By

            View all
            • (2024)Who Left the Door Open? Investigating the Causes of Exposed IoT Devices in an Academic Network2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00117(2291-2309)Online publication date: 19-May-2024
            • (2023)Lacking the tools and support to fix frictionProceedings of the Nineteenth USENIX Conference on Usable Privacy and Security10.5555/3632186.3632194(131-150)Online publication date: 7-Aug-2023

            View Options

            View options

            PDF

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader

            HTML Format

            View this article in HTML Format.

            HTML Format

            Login options

            Media

            Figures

            Other

            Tables

            Share

            Share

            Share this Publication link

            Share on social media