Survey: Cybersecurity Vulnerabilities, Attacks and Solutions in the Medical Domain
Affiliation
Univ Arizona, Dept Elect & Comp EngnIssue Date
2019Keywords
Computer securityMedical services
Biomedical imaging
Medical devices
Computer architecture
Privacy
Dataflow
medical field
cyber-attacks
architectures
cybersecurity
threats
vulnerabilities
Metadata
Show full item recordCitation
A. Razaque et al., "Survey: Cybersecurity Vulnerabilities, Attacks and Solutions in the Medical Domain," in IEEE Access, vol. 7, pp. 168774-168797, 2019, doi: 10.1109/ACCESS.2019.2950849.Journal
IEEE ACCESSRights
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see http://creativecommons.org/licenses/by/4.0/. Copyright is held by the author(s) or the publisher. If your intended use exceeds the permitted uses specified by the license, contact the publisher for more information.Collection Information
This item from the UA Faculty Publications collection is made available by the University of Arizona with support from the University of Arizona Libraries. If you have questions, please contact us at repository@u.library.arizona.edu.Abstract
Recently, an increasing number of cyber-attacks in the medical field has resulted in great losses in the health care industry, since medical information plays an essential role in human health. To introduce a comprehensive survey about possible cyber-attacks and solutions for these attacks, our paper first presents a brief overview of the necessary background of the dataflow in the medical domain and then identifies the vulnerabilities in each stage of the dataflow. Then, according to the weaknesses identified in the medical system, a classification of cyber-attacks is presented. Additionally, the paper presents research on previous work that focuses on solving these cyber-attacks and identifies the strengths and limitations of the solutions for each attack. More importantly, for data storage assurance, our paper discusses several cybersecurity architectures for the medical domain from the existing literature. The countermeasures from previous papers and architectures that are still weak in terms of resource depletion, attack reduction, applicability, etc. are addressed. Finally, the paper discusses and recommends solutions for future work to decrease cyber-attacks in the medical field so that human health can be guaranteed.Note
Open access journalISSN
2169-3536Version
Final published versionae974a485f413a2113503eed53cd6c53
10.1109/ACCESS.2019.2950849
Scopus Count
Collections
Except where otherwise noted, this item's license is described as This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see http://creativecommons.org/licenses/by/4.0/. Copyright is held by the author(s) or the publisher. If your intended use exceeds the permitted uses specified by the license, contact the publisher for more information.