SEC-C-U: The Security of Intensive Care Unit Medical Devices and Their Ecosystems

An intensive care unit (ICU) is dedicated to caring for patients whose medical condition places them at high risk of mortality or serious morbidity. ICU medical devices (ICUMDs) are used to closely monitor, stabilize, and treat ICU patients who are often unconscious and rely almost solely on ICUMDs....

Full description

Bibliographic Details
Main Authors: Carmel Eliash, Isaac Lazar, Nir Nissim
Format: Article
Language:English
Published: IEEE 2020-01-01
Series:IEEE Access
Subjects:
ICU
Online Access:https://ieeexplore.ieee.org/document/9051823/
id doaj-54a234a3608344b48f470d364d9f2ff8
record_format Article
spelling doaj-54a234a3608344b48f470d364d9f2ff82021-03-30T01:35:58ZengIEEEIEEE Access2169-35362020-01-018641936422410.1109/ACCESS.2020.29847269051823SEC-C-U: The Security of Intensive Care Unit Medical Devices and Their EcosystemsCarmel Eliash0https://orcid.org/0000-0001-5107-1130Isaac Lazar1https://orcid.org/0000-0001-9450-5226Nir Nissim2https://orcid.org/0000-0003-0652-8861Malware Lab, Cyber Security Research Center, Ben-Gurion University of the Negev, Beer-Sheva, IsraelDivision of Pediatrics, Pediatric Intensive Care Unit, Soroka University Medical Center, Beer-Sheva, IsraelMalware Lab, Cyber Security Research Center, Ben-Gurion University of the Negev, Beer-Sheva, IsraelAn intensive care unit (ICU) is dedicated to caring for patients whose medical condition places them at high risk of mortality or serious morbidity. ICU medical devices (ICUMDs) are used to closely monitor, stabilize, and treat ICU patients who are often unconscious and rely almost solely on ICUMDs. ICUMDs have become more autonomous, with a range of components, connectivity to external devices, and functionalities, opening the door to cyber-attacks. We present a taxonomy based on the functionality of 19 widely used ICUMDs, providing an explanation of each device's medical role, properties, interactions, and how they impact each other's security. We provide an extensive survey of 16 possible attacks aimed at ICUMDs and assess each device's vulnerability. We also create an ecosystem graph describing the roles and interactions of the players of each ICU sub-department. For each device type we produce a unique attack flow diagram that presents the most vulnerable vectors and components within the ecosystem. Finally, we survey relevant security mechanisms and map their coverage for the attacks, identifying existing gaps. We show that current security mechanisms generally fail to provide protection, covering just 12.5-56.3% of the attacks against ICUMDs, leaving the devices and the patients vulnerable.https://ieeexplore.ieee.org/document/9051823/ICUmedical devicecyber-attackmalwaredetectionsecurity
collection DOAJ
language English
format Article
sources DOAJ
author Carmel Eliash
Isaac Lazar
Nir Nissim
spellingShingle Carmel Eliash
Isaac Lazar
Nir Nissim
SEC-C-U: The Security of Intensive Care Unit Medical Devices and Their Ecosystems
IEEE Access
ICU
medical device
cyber-attack
malware
detection
security
author_facet Carmel Eliash
Isaac Lazar
Nir Nissim
author_sort Carmel Eliash
title SEC-C-U: The Security of Intensive Care Unit Medical Devices and Their Ecosystems
title_short SEC-C-U: The Security of Intensive Care Unit Medical Devices and Their Ecosystems
title_full SEC-C-U: The Security of Intensive Care Unit Medical Devices and Their Ecosystems
title_fullStr SEC-C-U: The Security of Intensive Care Unit Medical Devices and Their Ecosystems
title_full_unstemmed SEC-C-U: The Security of Intensive Care Unit Medical Devices and Their Ecosystems
title_sort sec-c-u: the security of intensive care unit medical devices and their ecosystems
publisher IEEE
series IEEE Access
issn 2169-3536
publishDate 2020-01-01
description An intensive care unit (ICU) is dedicated to caring for patients whose medical condition places them at high risk of mortality or serious morbidity. ICU medical devices (ICUMDs) are used to closely monitor, stabilize, and treat ICU patients who are often unconscious and rely almost solely on ICUMDs. ICUMDs have become more autonomous, with a range of components, connectivity to external devices, and functionalities, opening the door to cyber-attacks. We present a taxonomy based on the functionality of 19 widely used ICUMDs, providing an explanation of each device's medical role, properties, interactions, and how they impact each other's security. We provide an extensive survey of 16 possible attacks aimed at ICUMDs and assess each device's vulnerability. We also create an ecosystem graph describing the roles and interactions of the players of each ICU sub-department. For each device type we produce a unique attack flow diagram that presents the most vulnerable vectors and components within the ecosystem. Finally, we survey relevant security mechanisms and map their coverage for the attacks, identifying existing gaps. We show that current security mechanisms generally fail to provide protection, covering just 12.5-56.3% of the attacks against ICUMDs, leaving the devices and the patients vulnerable.
topic ICU
medical device
cyber-attack
malware
detection
security
url https://ieeexplore.ieee.org/document/9051823/
work_keys_str_mv AT carmeleliash seccuthesecurityofintensivecareunitmedicaldevicesandtheirecosystems
AT isaaclazar seccuthesecurityofintensivecareunitmedicaldevicesandtheirecosystems
AT nirnissim seccuthesecurityofintensivecareunitmedicaldevicesandtheirecosystems
_version_ 1724186780584902656