1
|
Farah L, Borget I, Martelli N, Vallee A. Suitability of the Current Health Technology Assessment of Innovative Artificial Intelligence-Based Medical Devices: Scoping Literature Review. J Med Internet Res 2024; 26:e51514. [PMID: 38739911 PMCID: PMC11130781 DOI: 10.2196/51514] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 08/02/2023] [Revised: 12/17/2023] [Accepted: 12/28/2023] [Indexed: 05/16/2024] Open
Abstract
BACKGROUND Artificial intelligence (AI)-based medical devices have garnered attention due to their ability to revolutionize medicine. Their health technology assessment framework is lacking. OBJECTIVE This study aims to analyze the suitability of each health technology assessment (HTA) domain for the assessment of AI-based medical devices. METHODS We conducted a scoping literature review following the PRISMA (Preferred Reporting Items for Systematic Reviews and Meta-Analyses) methodology. We searched databases (PubMed, Embase, and Cochrane Library), gray literature, and HTA agency websites. RESULTS A total of 10.1% (78/775) of the references were included. Data quality and integration are vital aspects to consider when describing and assessing the technical characteristics of AI-based medical devices during an HTA process. When it comes to implementing specialized HTA for AI-based medical devices, several practical challenges and potential barriers could be highlighted and should be taken into account (AI technological evolution timeline, data requirements, complexity and transparency, clinical validation and safety requirements, regulatory and ethical considerations, and economic evaluation). CONCLUSIONS The adaptation of the HTA process through a methodological framework for AI-based medical devices enhances the comparability of results across different evaluations and jurisdictions. By defining the necessary expertise, the framework supports the development of a skilled workforce capable of conducting robust and reliable HTAs of AI-based medical devices. A comprehensive adapted HTA framework for AI-based medical devices can provide valuable insights into the effectiveness, cost-effectiveness, and societal impact of AI-based medical devices, guiding their responsible implementation and maximizing their benefits for patients and health care systems.
Collapse
Affiliation(s)
- Line Farah
- Innovation Center for Medical Devices Department, Foch Hospital, Suresnes, France
- Groupe de Recherche et d'accueil en Droit et Economie de la Santé Department, University Paris-Saclay, Orsay, France
| | - Isabelle Borget
- Groupe de Recherche et d'accueil en Droit et Economie de la Santé Department, University Paris-Saclay, Orsay, France
- Department of Biostatistics and Epidemiology, Gustave Roussy, University Paris-Saclay, Villejuif, France
- Oncostat U1018, Inserm, Équipe Labellisée Ligue Contre le Cancer, University Paris-Saclay, Villejuif, France
| | - Nicolas Martelli
- Groupe de Recherche et d'accueil en Droit et Economie de la Santé Department, University Paris-Saclay, Orsay, France
- Pharmacy Department, Georges Pompidou European Hospital, Paris, France
| | - Alexandre Vallee
- Department of Epidemiology and Public Health, Foch Hospital, Suresnes, France
| |
Collapse
|
2
|
Zhu P, Simon I, Kokalari I, Kohane DS, Rwei AY. Miniaturized therapeutic systems for ultrasound-modulated drug delivery to the central and peripheral nervous system. Adv Drug Deliv Rev 2024; 208:115275. [PMID: 38442747 PMCID: PMC11031353 DOI: 10.1016/j.addr.2024.115275] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Grants] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 12/12/2023] [Revised: 02/19/2024] [Accepted: 03/01/2024] [Indexed: 03/07/2024]
Abstract
Ultrasound is a promising technology to address challenges in drug delivery, including limited drug penetration across physiological barriers and ineffective targeting. Here we provide an overview of the significant advances made in recent years in overcoming technical and pharmacological barriers using ultrasound-assisted drug delivery to the central and peripheral nervous system. We commence by exploring the fundamental principles of ultrasound physics and its interaction with tissue. The mechanisms of ultrasonic-enhanced drug delivery are examined, as well as the relevant tissue barriers. We highlight drug transport through such tissue barriers utilizing insonation alone, in combination with ultrasound contrast agents (e.g., microbubbles), and through innovative particulate drug delivery systems. Furthermore, we review advances in systems and devices for providing therapeutic ultrasound, as their practicality and accessibility are crucial for clinical application.
Collapse
Affiliation(s)
- Pancheng Zhu
- Department of Chemical Engineering, Delft University of Technology, 2629 HZ, Delft, the Netherlands; State Key Laboratory of Mechanics and Control of Aerospace Structures, Nanjing University of Aeronautics & Astronautics, 210016, Nanjing, China; Department of Biomedical Engineering, The Hong Kong Polytechnic University, Hong Kong, China
| | - Ignasi Simon
- Department of Chemical Engineering, Delft University of Technology, 2629 HZ, Delft, the Netherlands
| | - Ida Kokalari
- Department of Chemical Engineering, Delft University of Technology, 2629 HZ, Delft, the Netherlands
| | - Daniel S Kohane
- Laboratory for Biomaterials and Drug Delivery, Department of Anesthesiology, Boston Children's Hospital, Harvard Medical School, Boston, MA 02115, USA.
| | - Alina Y Rwei
- Department of Chemical Engineering, Delft University of Technology, 2629 HZ, Delft, the Netherlands.
| |
Collapse
|
3
|
Torgersen LNS, Schulz SM, Lugo RG, Sütterlin S. Patient informed consent, ethical and legal considerations in the context of digital vulnerability with smart, cardiac implantable electronic devices. PLOS DIGITAL HEALTH 2024; 3:e0000507. [PMID: 38781144 PMCID: PMC11115322 DOI: 10.1371/journal.pdig.0000507] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 05/25/2024]
Abstract
Advancements in digitalisation with cardiac implantable electronic devices (CIEDs) allow patients opportunities for improved autonomy, quality of life, and a potential increase in life expectancy. However, with the digital and functional practicalities of CIEDs, there exists also cyber safety issues with transferring wireless information. If a digital network were to be hacked, a CIED patient could experience both the loss of sensitive data and the loss of functional control of the CIED due to an unwelcome party. Moreover, if a CIED patient were to become victim of a cyber attack, which resulted in a serious or lethal event, and if this information were to become public, the trust in healthcare would be impacted and legal consequences could result. A cyber attack therefore poses not only a direct threat to the patient's health but also the confidentiality, integrity, and availability of the CIED, and these cyber threats could be considered "patient-targeted threats." Informed consent is a key component of ethical care, legally concordant practice, and promoting patient-as-partner therapeutic relationships [1]. To date, there are no standardised guidelines for listing cybersecurity risks within the informed consent or for discussing them during the consent process. Providers are responsible for adhering to the ethical principles of autonomy, beneficence, non-maleficence, and justice, both in medical practice generally and the informed consent process specifically. At present, the decision to include cybersecurity risks is mainly left to the provider's discretion, who may also have limited cyber risk information. Without effective and in-depth communication about all possible cybersecurity risks during the consent process, CIED patients can be left unaware of the privacy and physical risks they possess by carrying such a device. Therefore, cyber risk factors should be covered within the patients' informed consent and reviewed on an ongoing basis as new risk information becomes available. By including cyber risk information in the informed consent process, patients are given the autonomy to make the best-informed decision.
Collapse
Affiliation(s)
- Leanne N. S. Torgersen
- Department of Behavioural Medicine and Principles of Human Biology for the Health Sciences, Trier University, Germany
| | - Stefan M. Schulz
- Department of Behavioural Medicine and Principles of Human Biology for the Health Sciences, Trier University, Germany
| | - Ricardo G. Lugo
- Estonian Maritime Academy, Tallinn University of Technology, Estonia
| | - Stefan Sütterlin
- Faculty of Computer Science, Albstadt-Sigmaringen University, Germany
| |
Collapse
|
4
|
de Zambotti M, Goldstein C, Cook J, Menghini L, Altini M, Cheng P, Robillard R. State of the science and recommendations for using wearable technology in sleep and circadian research. Sleep 2024; 47:zsad325. [PMID: 38149978 DOI: 10.1093/sleep/zsad325] [Citation(s) in RCA: 10] [Impact Index Per Article: 10.0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 07/17/2023] [Revised: 12/21/2023] [Indexed: 12/28/2023] Open
Abstract
Wearable sleep-tracking technology is of growing use in the sleep and circadian fields, including for applications across other disciplines, inclusive of a variety of disease states. Patients increasingly present sleep data derived from their wearable devices to their providers and the ever-increasing availability of commercial devices and new-generation research/clinical tools has led to the wide adoption of wearables in research, which has become even more relevant given the discontinuation of the Philips Respironics Actiwatch. Standards for evaluating the performance of wearable sleep-tracking devices have been introduced and the available evidence suggests that consumer-grade devices exceed the performance of traditional actigraphy in assessing sleep as defined by polysomnogram. However, clear limitations exist, for example, the misclassification of wakefulness during the sleep period, problems with sleep tracking outside of the main sleep bout or nighttime period, artifacts, and unclear translation of performance to individuals with certain characteristics or comorbidities. This is of particular relevance when person-specific factors (like skin color or obesity) negatively impact sensor performance with the potential downstream impact of augmenting already existing healthcare disparities. However, wearable sleep-tracking technology holds great promise for our field, given features distinct from traditional actigraphy such as measurement of autonomic parameters, estimation of circadian features, and the potential to integrate other self-reported, objective, and passively recorded health indicators. Scientists face numerous decision points and barriers when incorporating traditional actigraphy, consumer-grade multi-sensor devices, or contemporary research/clinical-grade sleep trackers into their research. Considerations include wearable device capabilities and performance, target population and goals of the study, wearable device outputs and availability of raw and aggregate data, and data extraction, processing, and analysis. Given the difficulties in the implementation and utilization of wearable sleep-tracking technology in real-world research and clinical settings, the following State of the Science review requested by the Sleep Research Society aims to address the following questions. What data can wearable sleep-tracking devices provide? How accurate are these data? What should be taken into account when incorporating wearable sleep-tracking devices into research? These outstanding questions and surrounding considerations motivated this work, outlining practical recommendations for using wearable technology in sleep and circadian research.
Collapse
Affiliation(s)
- Massimiliano de Zambotti
- Center for Health Sciences, SRI International, Menlo Park, CA, USA
- Lisa Health Inc., Oakland, CA, USA
| | - Cathy Goldstein
- Sleep Disorders Center, Department of Neurology, University of Michigan-Ann Arbor, Ann Arbor, MI, USA
| | - Jesse Cook
- Department of Psychology, University of Wisconsin-Madison, Madison, WI, USA
| | - Luca Menghini
- Department of Psychology and Cognitive Science, University of Trento, Trento, Italy
| | - Marco Altini
- Department of Human Movement Sciences, Vrije Universiteit Amsterdam, Amsterdam, The Netherlands
| | - Philip Cheng
- Sleep Disorders and Research Center, Henry Ford Health, Detroit, MI, USA
| | - Rebecca Robillard
- School of Psychology, University of Ottawa, Ottawa, ON, Canada
- Canadian Sleep Research Consortium, Canada
| |
Collapse
|
5
|
Bhatia A, Hanna J, Stuart T, Kasper KA, Clausen DM, Gutruf P. Wireless Battery-free and Fully Implantable Organ Interfaces. Chem Rev 2024; 124:2205-2280. [PMID: 38382030 DOI: 10.1021/acs.chemrev.3c00425] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [MESH Headings] [Grants] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 02/23/2024]
Abstract
Advances in soft materials, miniaturized electronics, sensors, stimulators, radios, and battery-free power supplies are resulting in a new generation of fully implantable organ interfaces that leverage volumetric reduction and soft mechanics by eliminating electrochemical power storage. This device class offers the ability to provide high-fidelity readouts of physiological processes, enables stimulation, and allows control over organs to realize new therapeutic and diagnostic paradigms. Driven by seamless integration with connected infrastructure, these devices enable personalized digital medicine. Key to advances are carefully designed material, electrophysical, electrochemical, and electromagnetic systems that form implantables with mechanical properties closely matched to the target organ to deliver functionality that supports high-fidelity sensors and stimulators. The elimination of electrochemical power supplies enables control over device operation, anywhere from acute, to lifetimes matching the target subject with physical dimensions that supports imperceptible operation. This review provides a comprehensive overview of the basic building blocks of battery-free organ interfaces and related topics such as implantation, delivery, sterilization, and user acceptance. State of the art examples categorized by organ system and an outlook of interconnection and advanced strategies for computation leveraging the consistent power influx to elevate functionality of this device class over current battery-powered strategies is highlighted.
Collapse
Affiliation(s)
- Aman Bhatia
- Department of Biomedical Engineering, The University of Arizona, Tucson, Arizona 85721, United States
| | - Jessica Hanna
- Department of Biomedical Engineering, The University of Arizona, Tucson, Arizona 85721, United States
| | - Tucker Stuart
- Department of Biomedical Engineering, The University of Arizona, Tucson, Arizona 85721, United States
| | - Kevin Albert Kasper
- Department of Biomedical Engineering, The University of Arizona, Tucson, Arizona 85721, United States
| | - David Marshall Clausen
- Department of Biomedical Engineering, The University of Arizona, Tucson, Arizona 85721, United States
| | - Philipp Gutruf
- Department of Biomedical Engineering, The University of Arizona, Tucson, Arizona 85721, United States
- Department of Electrical and Computer Engineering, The University of Arizona, Tucson, Arizona 85721, United States
- Bio5 Institute, The University of Arizona, Tucson, Arizona 85721, United States
- Neuroscience Graduate Interdisciplinary Program (GIDP), The University of Arizona, Tucson, Arizona 85721, United States
| |
Collapse
|
6
|
Salehi Shahraki A, Lauer H, Grobler M, Sakzad A, Rudolph C. Access Control, Key Management, and Trust for Emerging Wireless Body Area Networks. SENSORS (BASEL, SWITZERLAND) 2023; 23:9856. [PMID: 38139702 PMCID: PMC10747010 DOI: 10.3390/s23249856] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Received: 10/16/2023] [Revised: 11/22/2023] [Accepted: 12/05/2023] [Indexed: 12/24/2023]
Abstract
Wireless Body Area Networks (WBANs) are an emerging industrial technology for monitoring physiological data. These networks employ medical wearable and implanted biomedical sensors aimed at improving quality of life by providing body-oriented services through a variety of industrial sensing gadgets. The sensors collect vital data from the body and forward this information to other nodes for further services using short-range wireless communication technology. In this paper, we provide a multi-aspect review of recent advancements made in this field pertaining to cross-domain security, privacy, and trust issues. The aim is to present an overall review of WBAN research and projects based on applications, devices, and communication architecture. We examine current issues and challenges with WBAN communications and technologies, with the aim of providing insights for a future vision of remote healthcare systems. We specifically address the potential and shortcomings of various Wireless Body Area Network (WBAN) architectures and communication schemes that are proposed to maintain security, privacy, and trust within digital healthcare systems. Although current solutions and schemes aim to provide some level of security, several serious challenges remain that need to be understood and addressed. Our aim is to suggest future research directions for establishing best practices in protecting healthcare data. This includes monitoring, access control, key management, and trust management. The distinguishing feature of this survey is the combination of our review with a critical perspective on the future of WBANs.
Collapse
Affiliation(s)
- Ahmad Salehi Shahraki
- Department of Computer Science and Information Technology, La Trobe University, Melbourne 3086, Australia
| | - Hagen Lauer
- Department of Mathematics, Natural Sciences, and Computer Science, Technische Hochschule Mittelhessen, 35390 Gießen, Germany;
| | - Marthie Grobler
- Cybersecurity and Quantum Systems (CQS), CSIRO’s Data61, Melbourne 3168, Australia;
| | - Amin Sakzad
- Dep of Software Systems & Cybersecurity, Monash University, Melbourne 3800, Australia; (A.S.); (C.R.)
| | - Carsten Rudolph
- Dep of Software Systems & Cybersecurity, Monash University, Melbourne 3800, Australia; (A.S.); (C.R.)
| |
Collapse
|
7
|
Kaushal JB, Raut P, Kumar S. Organic Electronics in Biosensing: A Promising Frontier for Medical and Environmental Applications. BIOSENSORS 2023; 13:976. [PMID: 37998151 PMCID: PMC10669243 DOI: 10.3390/bios13110976] [Citation(s) in RCA: 1] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Received: 10/02/2023] [Revised: 10/30/2023] [Accepted: 11/02/2023] [Indexed: 11/25/2023]
Abstract
The promising field of organic electronics has ushered in a new era of biosensing technology, thus offering a promising frontier for applications in both medical diagnostics and environmental monitoring. This review paper provides a comprehensive overview of organic electronics' remarkable progress and potential in biosensing applications. It explores the multifaceted aspects of organic materials and devices, thereby highlighting their unique advantages, such as flexibility, biocompatibility, and low-cost fabrication. The paper delves into the diverse range of biosensors enabled by organic electronics, including electrochemical, optical, piezoelectric, and thermal sensors, thus showcasing their versatility in detecting biomolecules, pathogens, and environmental pollutants. Furthermore, integrating organic biosensors into wearable devices and the Internet of Things (IoT) ecosystem is discussed, wherein they offer real-time, remote, and personalized monitoring solutions. The review also addresses the current challenges and future prospects of organic biosensing, thus emphasizing the potential for breakthroughs in personalized medicine, environmental sustainability, and the advancement of human health and well-being.
Collapse
Affiliation(s)
- Jyoti Bala Kaushal
- Department of Biochemistry and Molecular Biology, University of Nebraska Medical Center, Omaha, NE 68198, USA; (J.B.K.); (P.R.)
| | - Pratima Raut
- Department of Biochemistry and Molecular Biology, University of Nebraska Medical Center, Omaha, NE 68198, USA; (J.B.K.); (P.R.)
| | - Sanjay Kumar
- Durham School of Architectural Engineering and Construction, Scott Campus, University of Nebraska-Lincoln, Omaha, NE 68182, USA
| |
Collapse
|
8
|
Yogev D, Goldberg T, Arami A, Tejman-Yarden S, Winkler TE, Maoz BM. Current state of the art and future directions for implantable sensors in medical technology: Clinical needs and engineering challenges. APL Bioeng 2023; 7:031506. [PMID: 37781727 PMCID: PMC10539032 DOI: 10.1063/5.0152290] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 03/29/2023] [Accepted: 08/28/2023] [Indexed: 10/03/2023] Open
Abstract
Implantable sensors have revolutionized the way we monitor biophysical and biochemical parameters by enabling real-time closed-loop intervention or therapy. These technologies align with the new era of healthcare known as healthcare 5.0, which encompasses smart disease control and detection, virtual care, intelligent health management, smart monitoring, and decision-making. This review explores the diverse biomedical applications of implantable temperature, mechanical, electrophysiological, optical, and electrochemical sensors. We delve into the engineering principles that serve as the foundation for their development. We also address the challenges faced by researchers and designers in bridging the gap between implantable sensor research and their clinical adoption by emphasizing the importance of careful consideration of clinical requirements and engineering challenges. We highlight the need for future research to explore issues such as long-term performance, biocompatibility, and power sources, as well as the potential for implantable sensors to transform healthcare across multiple disciplines. It is evident that implantable sensors have immense potential in the field of medical technology. However, the gap between research and clinical adoption remains wide, and there are still major obstacles to overcome before they can become a widely adopted part of medical practice.
Collapse
Affiliation(s)
| | | | | | | | | | - Ben M. Maoz
- Authors to whom correspondence should be addressed: and
| |
Collapse
|
9
|
Schulz S, Harzheim L, Hübner C, Lorke M, Jünger S, Woopen C. Patient-centered empirical research on ethically relevant psychosocial and cultural aspects of cochlear, glaucoma and cardiovascular implants - a scoping review. BMC Med Ethics 2023; 24:68. [PMID: 37641094 PMCID: PMC10464431 DOI: 10.1186/s12910-023-00945-6] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Grants] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 03/03/2023] [Accepted: 08/17/2023] [Indexed: 08/31/2023] Open
Abstract
BACKGROUND The significance of medical implants goes beyond technical functioning and reaches into everyday life, with consequences for individuals as well as society. Ethical aspects associated with the everyday use of implants are relevant for individuals' lifeworlds and need to be considered in implant care and in the course of technical developments. METHODS This scoping review aimed to provide a synthesis of the existing evidence regarding ethically relevant psychosocial and cultural aspects in cochlear, glaucoma and cardiovascular implants in patient-centered empirical research. Systematic literature searches were conducted in EBSCOhost, Philpapers, PsycNET, Pubmed, Web of Science and BELIT databases. Eligible studies were articles in German or English language published since 2000 dealing with ethically relevant aspects of cochlear, glaucoma and passive cardiovascular implants based on empirical findings from the perspective of (prospective) implant-wearers and their significant others. Following a descriptive-analytical approach, a data extraction form was developed and relevant data were extracted accordingly. We combined a basic numerical analysis of study characteristics with a thematically organized narrative synthesis of the data. RESULTS Sixty-nine studies were included in the present analysis. Fifty were in the field of cochlear implants, sixteen in the field of passive cardiovascular implants and three in the field of glaucoma implants. Implant-related aspects were mainly found in connection with autonomy, freedom, identity, participation and justice, whereas little to no data was found with regards to ethical principles of privacy, safety or sustainability. CONCLUSIONS Empirical research on ethical aspects of implant use in everyday life is highly relevant, but marked by ambiguity and unclarity in the operationalization of ethical terms and contextualization. A transparent orientation framework for the exploration and acknowledgment of ethical aspects in "lived experiences" may contribute to the improvement of individual care, healthcare programs and research quality in this area. Ethics-sensitive care requires creating awareness for cultural and identity-related issues, promoting health literacy to strengthen patient autonomy as well as adjusting healthcare programs accordingly. More consideration needs to be given to sustainability issues in implant development and care according to an approach of ethics-by-design.
Collapse
Affiliation(s)
- Sabine Schulz
- Cologne Center for Ethics, Rights, Economics, and Social Sciences of Health (CERES), University of Cologne and University Hospital of Cologne, Universitätsstraße 91, 50931, Cologne, Germany.
| | - Laura Harzheim
- Cologne Center for Ethics, Rights, Economics, and Social Sciences of Health (CERES), University of Cologne and University Hospital of Cologne, Universitätsstraße 91, 50931, Cologne, Germany
| | - Constanze Hübner
- Center for Life Ethics, University of Bonn, 53113, Bonn, Germany
| | - Mariya Lorke
- Faculty of Engineering and Mathematics, University of Applied Sciences and Arts (HSBI), 33619, Bielefeld, Germany
| | - Saskia Jünger
- Department of Community Health, University of Applied Health Sciences Bochum, Gesundheitscampus 6-8, 44801, Bochum, Germany
| | | |
Collapse
|
10
|
Chauvin M, Piot O, Boveda S, Fauchier L, Defaye P. Pacemakers and implantable cardiac defibrillators: Must we fear hackers? Cybersecurity of implantable electronic devices. Arch Cardiovasc Dis 2023; 116:51-53. [PMID: 36682985 DOI: 10.1016/j.acvd.2022.12.002] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Key Words] [Track Full Text] [Journal Information] [Submit a Manuscript] [Subscribe] [Scholar Register] [Received: 12/01/2022] [Revised: 12/19/2022] [Accepted: 12/21/2022] [Indexed: 01/12/2023]
Affiliation(s)
- Michel Chauvin
- Cardiology Department, Institut cardiovasculaire de Strasbourg, 67000 Strasbourg, France
| | - Olivier Piot
- Cardiology Department, centre cardiologique du Nord, 32-36, rue des Moulins Gémeaux, 93200 Saint-Denis, France.
| | - Serge Boveda
- Cardiology Department, clinique Pasteur, 31000 Toulouse, France
| | - Laurent Fauchier
- Cardiology Department, University Hospital of Tours and University François-Rabelais, 37044 Tours, France
| | - Pascal Defaye
- Cardiology Department, University Hospital of Grenoble-Alpes and Grenoble-Alpes University, CS 10217, 38043 Grenoble, France
| |
Collapse
|
11
|
Rosa BMG, Anastasova S, Yang GZ. NFC-Powered Implantable Device for On-Body Parameters Monitoring With Secure Data Exchange Link to a Medical Blockchain Type of Network. IEEE TRANSACTIONS ON CYBERNETICS 2023; 53:31-43. [PMID: 34197334 DOI: 10.1109/tcyb.2021.3088711] [Citation(s) in RCA: 3] [Impact Index Per Article: 3.0] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/13/2023]
Abstract
Implantable devices represent the future of remote medical monitoring and administration of both chemical and physical therapies to the patients. Although some of these devices are already in the market, the security mechanisms deployed inside them to withstand deliberate external influence are still decades away from the robust digital data security schemes employed in modern distributed networks these days. Medical data theft, spoofing, and disclosure pose serious threats that can ultimately lead to individual and social stigmas or even death. In this article, we present a small-form and batteryless implantable device with acquisition channels for biopotential (30-dB gain and 16-Hz bandwidth), arterial pulse oximetry, and temperature (0.12°C accuracy) recordings, suitable for cardiovascular, neuronal, and endocrine parameters assessment. The proposed device is powered by the near-field communication (NFC) interface with an external mobile phone, with a power consumption of 0.9 mW and achieving the full operation for distances close to 1 cm under the skin. In situ encryption of the acquired physiological signals is performed by a lightweight and short-term symmetric-key distribution scheme with data stream hopping, in order to ensure secure data transference over the air between the patient and trusted entities only, complemented by data storage, processing, and recovery through a medical blockchain type of network that involves the main stakeholders inside a medical community.
Collapse
|
12
|
Straw I, Ashworth C, Radford N. When brain devices go wrong: a patient with a malfunctioning deep brain stimulator (DBS) presents to the emergency department. BMJ Case Rep 2022; 15:e252305. [PMID: 36572446 PMCID: PMC9806045 DOI: 10.1136/bcr-2022-252305] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Accepted: 12/09/2022] [Indexed: 12/27/2022] Open
Abstract
A man in his 50s attended the emergency department with an acute deterioration in his Parkinson's symptoms, presenting with limb rigidity, widespread tremor, choreiform dyskinesia, dysarthria, intense sadness and a severe occipital headache. After excluding common differentials for sudden-onset parkinsonism (eg, infection, medication change), an error on the patient's deep brain stimulator was noted. The patient's symptoms only resolved once he was transferred to the specialist centre so that the programmer could reset the device settings. Due to COVID-19-related bed pressures on the ward, there was a delay in the patient receiving specialist attention-highlighting the need for non-specialist training in the emergency management of device errors.
Collapse
Affiliation(s)
- Isabel Straw
- Institute of Health Informatics, University College London, London, UK
| | - Charlotte Ashworth
- Accident and Emergency Department, Homerton University Hospital, London, UK
| | - Nicola Radford
- Accident and Emergency Department, Homerton University Hospital, London, UK
| |
Collapse
|
13
|
Veletić M, Apu EH, Simić M, Bergsland J, Balasingham I, Contag CH, Ashammakhi N. Implants with Sensing Capabilities. Chem Rev 2022; 122:16329-16363. [PMID: 35981266 DOI: 10.1021/acs.chemrev.2c00005] [Citation(s) in RCA: 25] [Impact Index Per Article: 12.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/28/2022]
Abstract
Because of the aging human population and increased numbers of surgical procedures being performed, there is a growing number of biomedical devices being implanted each year. Although the benefits of implants are significant, there are risks to having foreign materials in the body that may lead to complications that may remain undetectable until a time at which the damage done becomes irreversible. To address this challenge, advances in implantable sensors may enable early detection of even minor changes in the implants or the surrounding tissues and provide early cues for intervention. Therefore, integrating sensors with implants will enable real-time monitoring and lead to improvements in implant function. Sensor integration has been mostly applied to cardiovascular, neural, and orthopedic implants, and advances in combined implant-sensor devices have been significant, yet there are needs still to be addressed. Sensor-integrating implants are still in their infancy; however, some have already made it to the clinic. With an interdisciplinary approach, these sensor-integrating devices will become more efficient, providing clear paths to clinical translation in the future.
Collapse
Affiliation(s)
- Mladen Veletić
- Department of Electronic Systems, Norwegian University of Science and Technology, 7491 Trondheim, Norway.,The Intervention Centre, Technology and Innovation Clinic, Oslo University Hospital, 0372 Oslo, Norway
| | - Ehsanul Hoque Apu
- Institute for Quantitative Health Science and Engineering (IQ) and Department of Biomedical Engineering (BME), Michigan State University, East Lansing, Michigan 48824, United States.,Division of Hematology and Oncology, Department of Internal Medicine, Michigan Medicine, University of Michigan, Ann Arbor, Michigan 48105, United States
| | - Mitar Simić
- Faculty of Electrical Engineering, University of Banja Luka, 78000 Banja Luka, Bosnia and Herzegovina
| | - Jacob Bergsland
- The Intervention Centre, Technology and Innovation Clinic, Oslo University Hospital, 0372 Oslo, Norway
| | - Ilangko Balasingham
- Department of Electronic Systems, Norwegian University of Science and Technology, 7491 Trondheim, Norway.,The Intervention Centre, Technology and Innovation Clinic, Oslo University Hospital, 0372 Oslo, Norway
| | - Christopher H Contag
- Institute for Quantitative Health Science and Engineering (IQ) and Department of Biomedical Engineering (BME), Michigan State University, East Lansing, Michigan 48824, United States
| | - Nureddin Ashammakhi
- Institute for Quantitative Health Science and Engineering (IQ) and Department of Biomedical Engineering (BME), Michigan State University, East Lansing, Michigan 48824, United States.,Department of Bioengineering, University of California, Los Angeles, California 90095, United States
| |
Collapse
|
14
|
Zala K, Thakkar HK, Jadeja R, Dholakia NH, Kotecha K, Jain DK, Shukla M. On the Design of Secured and Reliable Dynamic Access Control Scheme of Patient E-Healthcare Records in Cloud Environment. COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE 2022; 2022:3804553. [PMID: 36035822 PMCID: PMC9410930 DOI: 10.1155/2022/3804553] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 05/27/2022] [Revised: 07/21/2022] [Accepted: 07/26/2022] [Indexed: 11/20/2022]
Abstract
Traditional healthcare services have changed into modern ones in which doctors can diagnose patients from a distance. All stakeholders, including patients, ward boy, life insurance agents, physicians, and others, have easy access to patients' medical records due to cloud computing. The cloud's services are very cost-effective and scalable, and provide various mobile access options for a patient's electronic health records (EHRs). EHR privacy and security are critical concerns despite the many benefits of the cloud. Patient health information is extremely sensitive and important, and sending it over an unencrypted wireless media raises a number of security hazards. This study suggests an innovative and secure access system for cloud-based electronic healthcare services storing patient health records in a third-party cloud service provider. The research considers the remote healthcare requirements for maintaining patient information integrity, confidentiality, and security. There will be fewer attacks on e-healthcare records now that stakeholders will have a safe interface and data on the cloud will not be accessible to them. End-to-end encryption is ensured by using multiple keys generated by the key conclusion function (KCF), and access to cloud services is granted based on a person's identity and the relationship between the parties involved, which protects their personal information that is the methodology used in the proposed scheme. The proposed scheme is best suited for cloud-based e-healthcare services because of its simplicity and robustness. Using different Amazon EC2 hosting options, we examine how well our cloud-based web application service works when the number of requests linearly increases. The performance of our web application service that runs in the cloud is based on how many requests it can handle per second while keeping its response time constant. The proposed secure access scheme for cloud-based web applications was compared to the Ethereum blockchain platform, which uses internet of things (IoT) devices in terms of execution time, throughput, and latency.
Collapse
Affiliation(s)
- Kirtirajsinh Zala
- Department of Computer Engineering, Marwadi University, Rajkot 360006, Gujarat, India
| | - Hiren Kumar Thakkar
- Department of Computer Science and Engineering, School of Technology, Pandit Deendayal Energy University, Gandhinagar 382007, Gujarat, India
| | | | - Neel H. Dholakia
- Department of Computer Engineering, Marwadi University, Rajkot 360006, Gujarat, India
| | - Ketan Kotecha
- Symbiosis Centre for Applied Artificial Intelligence, Symbiosis International (Deemed) University, Pune, India
| | - Deepak Kumar Jain
- Key Laboratory of Intelligent Air-Ground Cooperative Control for Universities in Chongqing, College of Automation, Chongqing University of Posts and Telecommunications, Chongqing, China
| | - Madhu Shukla
- Department of Computer Engineering, Marwadi University, Rajkot 360006, Gujarat, India
| |
Collapse
|
15
|
Wasserman L, Wasserman Y. Hospital cybersecurity risks and gaps: Review (for the non-cyber professional). Front Digit Health 2022; 4:862221. [PMID: 36033634 PMCID: PMC9403058 DOI: 10.3389/fdgth.2022.862221] [Citation(s) in RCA: 12] [Impact Index Per Article: 6.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 01/25/2022] [Accepted: 07/07/2022] [Indexed: 11/13/2022] Open
Abstract
Background Healthcare is facing a growing threat of cyberattacks. Myriad data sources illustrate the same trends that healthcare is one of the industries with the highest risk of cyber infiltration and is seeing a surge in security incidents within just a few years. The circumstances thus begged the question: are US hospitals prepared for the risks that accompany clinical medicine in cyberspace? Objective The study aimed to identify the major topics and concerns present in today's hospital cybersecurity field, intended for non-cyber professionals working in hospital settings. Methods Via structured literature searches of the National Institutes of Health's PubMed and Tel Aviv University's DaTa databases, 35 journal articles were identified to form the core of the study. Databases were chosen for accessibility and academic rigor. Eighty-seven additional sources were examined to supplement the findings. Results The review revealed a basic landscape of hospital cybersecurity, including primary reasons hospitals are frequent targets, top attack methods, and consequences hospitals face following attacks. Cyber technologies common in healthcare and their risks were examined, including medical devices, telemedicine software, and electronic data. By infiltrating any of these components of clinical care, attackers can access mounds of information and manipulate, steal, ransom, or otherwise compromise the records, or can use the access to catapult themselves to deeper parts of a hospital's network. Issues that can increase healthcare cyber risks, like interoperability and constant accessibility, were also identified. Finally, strategies that hospitals tend to employ to combat these risks, including technical, financial, and regulatory, were explored and found to be weak. There exist serious vulnerabilities within hospitals' technologies that many hospitals presently fail to address. The COVID-19 pandemic was used to further illustrate this issue. Conclusions Comparison of the risks, strategies, and gaps revealed that many US hospitals are unprepared for cyberattacks. Efforts are largely misdirected, with external-often governmental-efforts negligible. Policy changes, e.g., training employees in cyber protocols, adding advanced technical protections, and collaborating with several experts, are necessary. Overall, hospitals must recognize that, in cyber incidents, the real victims are the patients. They are at risk physically and digitally when medical devices or treatments are compromised.
Collapse
|
16
|
PUFchain 2.0: Hardware-Assisted Robust Blockchain for Sustainable Simultaneous Device and Data Security in Smart Healthcare. SN COMPUTER SCIENCE 2022; 3:344. [PMID: 35755326 PMCID: PMC9207438 DOI: 10.1007/s42979-022-01238-2] [Citation(s) in RCA: 2] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 04/03/2022] [Accepted: 05/31/2022] [Indexed: 11/21/2022]
Abstract
This article presents the first-ever hardware-assisted blockchain for simultaneously handling device and data security in smart healthcare. This article presents the hardware security primitive physical unclonable functions (PUF) and blockchain technology together as PUFchain 2.0 with a two-level authentication mechanism. The proposed PUFchain 2.0 security primitive presents a scalable approach by allowing Internet of Medical Things (IoMT) devices to connect and obtain PUF keys from the edge server with an embedded PUF module instead of connecting a PUF module to each device. The PUF key, once assigned to a particular media access control (MAC) address by the miner, will be unique for that MAC address and cannot be assigned to other devices. PUFs are developed based on internal micro-manufacturing process variations during chip fabrication. This property of PUFs is integrated with blockchain by including the PUF key of the IoMT into blockchain for authentication. The robustness of the proposed Proof of PUF-Enabled authentication consensus mechanism in PUFchain 2.0 has been substantiated through test bed evaluation. Arbiter PUFs have been used for the experimental validation of PUFchain 2.0. From the obtained 200 PUF keys, 75% are reliable and the Hamming distance of the PUF module is 48%. Obtained database outputs along with other metrics have been presented for validating the potential of PUFchain 2.0 in smart healthcare.
Collapse
|
17
|
An Overview of Medical Electronic Hardware Security and Emerging Solutions. ELECTRONICS 2022. [DOI: 10.3390/electronics11040610] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 01/27/2023]
Abstract
Electronic healthcare technology is widespread around the world and creates massive potential to improve clinical outcomes and transform care delivery. However, there are increasing concerns with respect to the cyber vulnerabilities of medical tools, malicious medical errors, and security attacks on healthcare data and devices. Increased connectivity to existing computer networks has exposed the medical devices/systems and their communicating data to new cybersecurity vulnerabilities. Adversaries leverage the state-of-the-art technologies, in particular artificial intelligence and computer vision-based techniques, in order to launch stronger and more detrimental attacks on the medical targets. The medical domain is an attractive area for cybercrimes for two fundamental reasons: (a) it is rich resource of valuable and sensitive data; and (b) its protection and defensive mechanisms are weak and ineffective. The attacks aim to steal health information from the patients, manipulate the medical information and queries, maliciously change the medical diagnosis, decisions, and prescriptions, etc. A successful attack in the medical domain causes serious damage to the patient’s health and even death. Therefore, cybersecurity is critical to patient safety and every aspect of the medical domain, while it has not been studied sufficiently. To tackle this problem, new human- and computer-based countermeasures are researched and proposed for medical attacks using the most effective software and hardware technologies, such as artificial intelligence and computer vision. This review provides insights to the novel and existing solutions in the literature that mitigate cyber risks, errors, damage, and threats in the medical domain. We have performed a scoping review analyzing the four major elements in this area (in order from a medical perspective): (1) medical errors; (2) security weaknesses of medical devices at software- and hardware-level; (3) artificial intelligence and/or computer vision in medical applications; and (4) cyber attacks and defenses in the medical domain. Meanwhile, artificial intelligence and computer vision are key topics in this review and their usage in all these four elements are discussed. The review outcome delivers the solutions through building and evaluating the connections among these elements in order to serve as a beneficial guideline for medical electronic hardware security.
Collapse
|
18
|
Davis R, Singh A, Jackson MJ, Coelho RT, Prakash D, Charalambous CP, Ahmed W, da Silva LRR, Lawrence AA. A comprehensive review on metallic implant biomaterials and their subtractive manufacturing. THE INTERNATIONAL JOURNAL, ADVANCED MANUFACTURING TECHNOLOGY 2022; 120:1473-1530. [PMID: 35228769 PMCID: PMC8865884 DOI: 10.1007/s00170-022-08770-8] [Citation(s) in RCA: 48] [Impact Index Per Article: 24.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 07/25/2021] [Accepted: 01/17/2022] [Indexed: 05/08/2023]
Abstract
There is a tremendous increase in the demand for converting biomaterials into high-quality industrially manufactured human body parts, also known as medical implants. Drug delivery systems, bone plates, screws, cranial, and dental devices are the popular examples of these implants - the potential alternatives for human life survival. However, the processing techniques of an engineered implant largely determine its preciseness, surface characteristics, and interactive ability with the adjacent tissue(s) in a particular biological environment. Moreover, the high cost-effective manufacturing of an implant under tight tolerances remains a challenge. In this regard, several subtractive or additive manufacturing techniques are employed to manufacture patient-specific implants, depending primarily on the required biocompatibility, bioactivity, surface integrity, and fatigue strength. The present paper reviews numerous non-degradable and degradable metallic implant biomaterials such as stainless steel (SS), titanium (Ti)-based, cobalt (Co)-based, nickel-titanium (NiTi), and magnesium (Mg)-based alloys, followed by their processing via traditional turning, drilling, and milling including the high-speed multi-axis CNC machining, and non-traditional abrasive water jet machining (AWJM), laser beam machining (LBM), ultrasonic machining (USM), and electric discharge machining (EDM) types of subtractive manufacturing techniques. However, the review further funnels down its primary focus on Mg, NiTi, and Ti-based alloys on the basis of the increasing trend of their implant applications in the last decade due to some of their outstanding properties. In the recent years, the incorporation of cryogenic coolant-assisted traditional subtraction of biomaterials has gained researchers' attention due to its sustainability, environment-friendly nature, performance, and superior biocompatible and functional outcomes fitting for medical applications. However, some of the latest studies reported that the medical implant manufacturing requirements could be more remarkably met using the non-traditional subtractive manufacturing approaches. Altogether, cryogenic machining among the traditional routes and EDM among the non-traditional means along with their variants, were identified as some of the most effective subtractive manufacturing techniques for achieving the dimensionally accurate and biocompatible metallic medical implants with significantly modified surfaces.
Collapse
Affiliation(s)
- Rahul Davis
- Department of Mechanical Engineering, National Institute of Technology Patna, Patna, 800005 India
- Department of Mechanical Engineering, Vaugh Institute of Agricultural Engineering and Technology, Sam Higginbottom University of Agriculture, Technology and Sciences, Prayagraj, 211007 India
| | - Abhishek Singh
- Department of Mechanical Engineering, National Institute of Technology Patna, Patna, 800005 India
| | - Mark James Jackson
- School of Integrated Studies, College of Technology and Aviation, Kansas State University, Salina, KS 67401 USA
| | | | - Divya Prakash
- Department of Mechanical Engineering, Vaugh Institute of Agricultural Engineering and Technology, Sam Higginbottom University of Agriculture, Technology and Sciences, Prayagraj, 211007 India
| | | | - Waqar Ahmed
- School of Mathematics and Physics, College of Science, University of Lincoln, Brayford Pool, Lincoln, LN6 7TS UK
| | - Leonardo Rosa Ribeiro da Silva
- School of Mechanical Engineering, Federal University of Uberlandia, Av. João Naves de Ávila, Uberlândia, MG 38400-902 Brazil
| | - Abner Ankit Lawrence
- Department of Mechanical Engineering, Vaugh Institute of Agricultural Engineering and Technology, Sam Higginbottom University of Agriculture, Technology and Sciences, Prayagraj, 211007 India
| |
Collapse
|
19
|
Edrees H, Song W, Syrowatka A, Simona A, Amato MG, Bates DW. Intelligent Telehealth in Pharmacovigilance: A Future Perspective. Drug Saf 2022; 45:449-458. [PMID: 35579810 PMCID: PMC9112241 DOI: 10.1007/s40264-022-01172-5] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Accepted: 03/02/2022] [Indexed: 01/28/2023]
Abstract
Pharmacovigilance improves patient safety by detecting and preventing adverse drug events. However, challenges exist that limit adverse drug event detection, resulting in many adverse drug events being underreported or inaccurately reported. One challenge includes having access to large data sets from various sources including electronic health records and wearable medical devices. Artificial intelligence, including machine learning methods, such as natural language processing and deep learning, can detect and extract information about adverse drug events, thus automating the pharmacovigilance process and improving the surveillance of known and documented adverse drug events. In addition, with the increased demand for telehealth services, for managing both acute and chronic diseases, artificial intelligence methods can play a role in detecting and preventing adverse drug events. In this review, we discuss two use cases of how artificial intelligence methods may be useful to improve the quality of pharmacovigilance and the role of artificial intelligence in telehealth practices.
Collapse
Affiliation(s)
- Heba Edrees
- Division of General Internal Medicine, Brigham and Women’s Hospital, Boston, MA USA ,Department of Pharmacy Practice, MCPHS University, Boston, MA USA ,Harvard Medical School, 1620 Tremont St., 3rd Floor, Boston, MA 02120 USA
| | - Wenyu Song
- Division of General Internal Medicine, Brigham and Women’s Hospital, Boston, MA USA ,Harvard Medical School, 1620 Tremont St., 3rd Floor, Boston, MA 02120 USA
| | - Ania Syrowatka
- Division of General Internal Medicine, Brigham and Women’s Hospital, Boston, MA USA ,Harvard Medical School, 1620 Tremont St., 3rd Floor, Boston, MA 02120 USA
| | - Aurélien Simona
- Division of General Internal Medicine, Brigham and Women’s Hospital, Boston, MA USA ,Harvard Medical School, 1620 Tremont St., 3rd Floor, Boston, MA 02120 USA
| | - Mary G. Amato
- Division of General Internal Medicine, Brigham and Women’s Hospital, Boston, MA USA
| | - David W. Bates
- Division of General Internal Medicine, Brigham and Women’s Hospital, Boston, MA USA ,Harvard Medical School, 1620 Tremont St., 3rd Floor, Boston, MA 02120 USA ,Department of Health Policy and Management, Harvard School of Public Health, Boston, MA USA
| |
Collapse
|
20
|
Duguma DG, You I, Gebremariam YE, Kim J. Can Formal Security Verification Really Be Optional? Scrutinizing the Security of IMD Authentication Protocols. SENSORS 2021; 21:s21248383. [PMID: 34960473 PMCID: PMC8704301 DOI: 10.3390/s21248383] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 10/22/2021] [Revised: 11/20/2021] [Accepted: 12/13/2021] [Indexed: 11/16/2022]
Abstract
The need for continuous monitoring of physiological information of critical organs of the human body, combined with the ever-growing field of electronics and sensor technologies and the vast opportunities brought by 5G connectivity, have made implantable medical devices (IMDs) the most necessitated devices in the health arena. IMDs are very sensitive since they are implanted in the human body, and the patients depend on them for the proper functioning of their vital organs. Simultaneously, they are intrinsically vulnerable to several attacks mainly due to their resource limitations and the wireless channel utilized for data transmission. Hence, failing to secure them would put the patient's life in jeopardy and damage the reputations of the manufacturers. To date, various researchers have proposed different countermeasures to keep the confidentiality, integrity, and availability of IMD systems with privacy and safety specifications. Despite the appreciated efforts made by the research community, there are issues with these proposed solutions. Principally, there are at least three critical problems. (1) Inadequate essential capabilities (such as emergency authentication, key update mechanism, anonymity, and adaptability); (2) heavy computational and communication overheads; and (3) lack of rigorous formal security verification. Motivated by this, we have thoroughly analyzed the current IMD authentication protocols by utilizing two formal approaches: the Burrows-Abadi-Needham logic (BAN logic) and the Automated Validation of Internet Security Protocols and Applications (AVISPA). In addition, we compared these schemes against their security strengths, computational overheads, latency, and other vital features, such as emergency authentications, key update mechanisms, and adaptabilities.
Collapse
Affiliation(s)
- Daniel Gerbi Duguma
- Department of Information Security Engineering, Soonchunhyang University, Asan-si 31538, Choongchungnam-do, Korea;
| | - Ilsun You
- Department of ICT Environmental Health System, Soonchunhyang University, Asan-si 31538, Choongchungnam-do, Korea;
- Correspondence: (I.Y.); (J.K.)
| | - Yonas Engida Gebremariam
- Department of ICT Environmental Health System, Soonchunhyang University, Asan-si 31538, Choongchungnam-do, Korea;
| | - Jiyoon Kim
- Department of Information Security Engineering, Soonchunhyang University, Asan-si 31538, Choongchungnam-do, Korea;
- Correspondence: (I.Y.); (J.K.)
| |
Collapse
|
21
|
Gordon H, Lyp T, Kimbro C, Tehranipoor S. A novel IoT sensor authentication using HaLo extraction method and memory chip variability. DISCOVER INTERNET OF THINGS 2021. [PMCID: PMC8527440 DOI: 10.1007/s43926-021-00019-2] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Indexed: 11/25/2022]
Abstract
AbstractSince the inception of encrypted messages thousands of years ago, mathematicians and scientists have continued to improve encryption algorithms in order to create more secure means of communication. These improvements came by means of more complex encryption algorithms that have stronger security features such as larger keys and trusted third parties. While many new processors can handle these more complex encryption algorithms, IoT devices on the edge often struggle to keep up with resource intensive encryption standards. In order to meet this demand for lightweight, secure encryption on the edge, this paper proposes a novel solution, called the High and Low (HaLo) method, that generates Physical Unclonable Function (PUF) signatures based on process variations within flash memory. These PUF signatures can be used to uniquely identify and authenticate remote sensors, and help ensure that messages being sent from remote sensors are encrypted adequately without requiring computationally expensive methods. The HaLo method consumes 20x less power than conventional authentication schemes commonly used with IoT devices, it has an average latency of only 39ms for 512 bit signature generation, and the average error rate is below 0.06%. Due to its low latency, low error rate, and high power efficiency, the HaLo method can progress the field of IoT encryption standards by accurately and efficiently authenticating remote sensors without sacrificing encryption integrity.
Collapse
Affiliation(s)
- Holden Gordon
- Santa Clara University, 500 El Camino Real, Santa Clara, CA 95053 USA
| | - Thomas Lyp
- Santa Clara University, 500 El Camino Real, Santa Clara, CA 95053 USA
| | - Calvin Kimbro
- Santa Clara University, 500 El Camino Real, Santa Clara, CA 95053 USA
| | - Sara Tehranipoor
- Santa Clara University, 500 El Camino Real, Santa Clara, CA 95053 USA
| |
Collapse
|
22
|
Cardio-ML: Detection of malicious clinical programmings aimed at cardiac implantable electronic devices based on machine learning and a missing values resemblance framework. Artif Intell Med 2021; 122:102200. [PMID: 34823834 DOI: 10.1016/j.artmed.2021.102200] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 03/09/2021] [Revised: 10/18/2021] [Accepted: 10/22/2021] [Indexed: 11/22/2022]
Abstract
Patients with life-threatening arrhythmias are often treated with cardiac implantable electronic devices (CIEDs), such as pacemakers and implantable cardioverter defibrillators (ICDs). Recent advancements in CIEDs have enabled advanced functionality and connectivity that make such devices (particularly ICDs) vulnerable to cyber-attacks. One of the most dangerous attacks on CIED ecosystems is a data manipulation attack from a compromised programmer device that sends malicious clinical programmings to the CIED. Such attacks can affect the CIED functioning and impact patient's survival and quality of life. In this paper, we propose Cardio-ML - an automated system for the detection of malicious clinical programmings that is based on machine learning algorithms and a novel missing values resemblance framework. Our system is designed to detect new variants of existing attacks and, more importantly, new unknown (zero-day) attacks, aimed at ICDs. We collected 1651 legitimate clinical programmings from 514 patients, over a four-year period, from programmer devices at two medical centers. Our collection also includes 28 core malicious functionalities created by cardiac electrophysiology experts that were later used to create different variants of malicious programmings. Cardio-ML was evaluated extensively in three comprehensive experiments and showed high detection capabilities in most attack scenarios. We achieved perfect classification results for detecting newly created variants of existing core malicious functionalities, with an AUC of 100%; for completely new unknown (zero-day) malicious clinical programmings, an AUC of 80% was obtained, which is 14% better than the state-of-the-art method. We were able to further improve our detection results by identifying the best combination of legitimate and zero-day malicious programmings in the dataset, achieving an AUC of 87%. CIED clinical programmings have many parameters without values for a large number of samples (programmings). To cope with the extreme amount of missing values in our dataset, we developed a novel missing values-based resemblance framework and evaluated it using three dataset-creation approaches: a standard expert-driven approach, our novel data-driven approach, and a combined approach incorporating both approaches. The results showed that our novel framework handles missing values in the data better than the expert-driven approach which yields an empty dataset. In particular, the combined approach showed a 40% improvement in data utilization compared to the data-driven approach.
Collapse
|
23
|
Zafar S, Nazir M, Sabah A, Jurcut AD. Securing Bio-Cyber Interface for the Internet of Bio-Nano Things using Particle Swarm Optimization and Artificial Neural Networks based parameter profiling. Comput Biol Med 2021; 136:104707. [PMID: 34375900 DOI: 10.1016/j.compbiomed.2021.104707] [Citation(s) in RCA: 8] [Impact Index Per Article: 2.7] [Reference Citation Analysis] [Abstract] [Key Words] [Journal Information] [Subscribe] [Scholar Register] [Received: 05/11/2021] [Revised: 07/08/2021] [Accepted: 07/24/2021] [Indexed: 11/15/2022]
Abstract
Internet of bio-nano things (IoBNT) is a novel communication paradigm where tiny, biocompatible and non-intrusive devices collect and sense biological signals from the environment and send them to data centers for processing through the internet. The concept of the IoBNT has stemmed from the combination of synthetic biology and nanotechnology tools which enable the fabrication of biological computing devices called Bio-nano things. Bio-nano things are nanoscale (1-100 nm) devices that are ideal for in vivo applications, where non-intrusive devices can reach hard-to-access areas of the human body (such as deep inside the tissue) to collect biological information. Bio-nano things work collaboratively in the form of a network called nanonetwork. The interconnection of the biological world and the cyber world of the Internet is made possible by a powerful hybrid device called Bio Cyber Interface. Bio Cyber Interface translates biochemical signals from in-body nanonetworks into electromagnetic signals and vice versa. Bio Cyber Interface can be designed using several technologies. In this paper, we have selected bio field-effect transistor (BioFET) technology, due to its characteristics of being fast, low-cost, and simple The main concern in this work is the security of IoBNT, which must be the preliminary requirement, especially for healthcare applications of IoBNT. Once the human body is accessible through the Internet, there is always a chance that it will be done with malicious intent. To address the issue of security in IoBNT, we propose a framework that utilizes Particle Swarm Optimization (PSO) algorithm to optimize Artificial Neural Networks (ANN) and to detect anomalous activities in the IoBNT transmission. Our proposed PSO-based ANN model was tested for the simulated dataset of BioFET based Bio Cyber Interface communication features. The results show an improved accuracy of 98.9% when compared with Adam based optimization function.
Collapse
Affiliation(s)
- Sidra Zafar
- Department of Computer Science, Lahore College for Women University, Lahore, 54000, Punjab, Pakistan.
| | - Mohsin Nazir
- Department of Computer Science, Lahore College for Women University, Lahore, 54000, Punjab, Pakistan.
| | - Aneeqa Sabah
- Department of Physics, Lahore College for Women University, Lahore, 54000, Punjab, Pakistan.
| | - Anca Delia Jurcut
- School of Computer Science, University College Dublin, Dublin, Dublin 4, Ireland.
| |
Collapse
|
24
|
Masud M, Gaba GS, Choudhary K, Alroobaea R, Hossain MS. A robust and lightweight secure access scheme for cloud based E-healthcare services. PEER-TO-PEER NETWORKING AND APPLICATIONS 2021; 14:3043-3057. [PMID: 33968292 PMCID: PMC8090928 DOI: 10.1007/s12083-021-01162-x] [Citation(s) in RCA: 9] [Impact Index Per Article: 3.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 08/31/2020] [Accepted: 04/08/2021] [Indexed: 06/12/2023]
Abstract
Traditional healthcare services have transitioned into modern healthcare services where doctors remotely diagnose the patients. Cloud computing plays a significant role in this change by providing easy access to patients' medical records to all stakeholders, such as doctors, nurses, patients, life insurance agents, etc. Cloud services are scalable, cost-effective, and offer a broad range of mobile access to patients' electronic health record (EHR). Despite the cloud's enormous benefits like real-time data access, patients' EHR security and privacy are major concerns. Since the information about patients' health is highly sensitive and crucial, sharing it over the unsecured wireless medium brings many security challenges such as eavesdropping, modifications, etc. Considering the security needs of remote healthcare, this paper proposes a robust and lightweight, secure access scheme for cloud-based E-healthcare services. The proposed scheme addresses the potential threats to E-healthcare by providing a secure interface to stakeholders and prohibiting unauthorized users from accessing information stored in the cloud. The scheme makes use of multiple keys formed through the key derivation function (KDF) to ensure end-to-end ciphering of information for preventing misuse. The rights to access the cloud services are provided based on the identity and the association between stakeholders, thus ensuring privacy. Due to its simplicity and robustness, the proposed scheme is the best fit for protecting data security and privacy in cloud-based E-healthcare services.
Collapse
Affiliation(s)
- Mehedi Masud
- Department of Computer Science, College of Computers and Information Technology, Taif University, Taif, 21944 Saudi Arabia
| | - Gurjot Singh Gaba
- School of Electronics and Electrical Engineering, Lovely Professional University, Punjab, 144411 India
| | - Karanjeet Choudhary
- School of Electronics and Electrical Engineering, Lovely Professional University, Punjab, 144411 India
| | - Roobaea Alroobaea
- Department of Computer Science, College of Computers and Information Technology, Taif University, Taif, 21944 Saudi Arabia
| | - M. Shamim Hossain
- Research Chair of Pervasive and Mobile Computing, and Department of Software Engineering, College of Computer and Information Sciences, King Saud University, Riyadh, 11543 Saudi Arabia
| |
Collapse
|
25
|
Rahimpour S, Kiyani M, Hodges SE, Turner DA. Deep brain stimulation and electromagnetic interference. Clin Neurol Neurosurg 2021; 203:106577. [PMID: 33662743 DOI: 10.1016/j.clineuro.2021.106577] [Citation(s) in RCA: 16] [Impact Index Per Article: 5.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 11/14/2020] [Revised: 02/19/2021] [Accepted: 02/23/2021] [Indexed: 01/08/2023]
Abstract
Deep brain stimulation (DBS) has evolved into an approved and efficacious treatment for movement, obsessive-compulsive, and epilepsy disorders that are refractory to medical therapy, with current investigation into other disease conditions. However, there are unintentional and intentional sources of external electromagnetic interference (EMI) that can lead to either malfunctioning or damaged DBS devices, as well as injury to human tissue. Comprehensive studies and guidelines on such topics in the medical literature are scarce. Herein, we review the principles behind EMI, as well as the various potential sources of interference, both unintentional (e.g. stray EMI fields) and intentional (e.g. MRI scans, "brainjacking"). Additionally, we employ the Manufacturer and User Device Facility Experience (MAUDE) database to assess real-world instances of EMI (e.g., airport body scanners, magnetic resonance imaging (MRI), and electrosurgery) affecting DBS devices commonly implanted in the United States (US).
Collapse
Affiliation(s)
- Shervin Rahimpour
- Department of Neurosurgery, Duke University Medical Center, Durham, NC, USA.
| | - Musa Kiyani
- Department of Neurosurgery, Duke University Medical Center, Durham, NC, USA
| | - Sarah E Hodges
- Department of Neurosurgery, Duke University Medical Center, Durham, NC, USA
| | - Dennis A Turner
- Department of Neurosurgery, Duke University Medical Center, Durham, NC, USA; Departments of Neurobiology and Biomedical Engineering, Duke University, Durham, NC USA
| |
Collapse
|
26
|
Leti Acciaro A, Montanari S, Venturelli M, Starnoni M, Adani R. Retrospective study in clinical governance and financing system impacts of the COVID-19 pandemic in the hand surgery and microsurgery HUB center. Musculoskelet Surg 2021; 106:291-296. [PMID: 33528801 PMCID: PMC7851813 DOI: 10.1007/s12306-021-00700-3] [Citation(s) in RCA: 10] [Impact Index Per Article: 3.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 08/14/2020] [Accepted: 01/22/2021] [Indexed: 12/16/2022]
Abstract
Introduction The authors presented a retrospective study in the surgical activity of the HUB center for Hand Surgery and Microsurgery in Emilia-Romagna comparing the data between March and April 2020, in the peak of Covid pandemic, with the same period in 2019. Materials and methods During the two months period of March–April 2020 versus 2019 the authors analyzed the surgical procedures performed in elective and emergency surgery with hospitalization and Day or Outpatient surgery regime. Surgical treatments with no hospitalization were planned in the Day-Surgery Service. The financing system impacts were analyzed according to the Diagnosis Related Groups (DRG), the costs accounting method mostly used in European countries. Results An overall reduction of 68.5% was recorded in surgical procedures, with a more relevant reduction of 92.3% in elective surgery and a significantly less relevant reduction of 37.2% in urgent one. Replantation did not present a reduction in number of cases, while cutting lesions of tendons at the hand and fingers increased such as the bone and ligament injuries during domestic accidents. The negative impact in the financial system recorded a reduction of 32.5%. Discussion The epidemiology of hand trauma looks not only at the artisanal and industrial injuries, but also mostly at the accidents in daily life activities. The data of the study evidenced the significantly increase in the injuries occurring in the domestic environment. Elective surgery was canceled. The 86% of surgical procedures performed were urgent ones and the 72.8% of these were possible in Day and Outpatient surgery with significantly reduction in hospitalization. All procedures followed a rigid process for patient and healthcare workers with regard for personal protection and safety. Telemedicine was arranged in emergencies, and economic damage was analyzed also in the following rebound effect during summer period. Conclusions The significantly less reduction recorded in urgent surgery vs the more relevant reduction in elective one showed how the hand injuries remained a major issue also during the lockdown. The data highlighted the relevant role of the organizational aspects of the surgical procedures and planning in hand trauma. Despite the financial impact of the elective surgery, the presence of a functional and skill Emergency Service and Day-Surgery Service resulted fundamental in the efficacy and efficiency of the patient management and in containment of economic damage. The telemedicine was significantly limited by liability and risk management issues.
Collapse
Affiliation(s)
- A Leti Acciaro
- Department of Hand Surgery and Microsurgery, Azienda Ospedaliero Universitaria Modena, Largo del Pozzo, 71, 41125, Modena, Italy.
| | - S Montanari
- Department of Hand Surgery and Microsurgery, Azienda Ospedaliero Universitaria Modena, Largo del Pozzo, 71, 41125, Modena, Italy
| | - M Venturelli
- Department of Hand Surgery and Microsurgery, Azienda Ospedaliero Universitaria Modena, Largo del Pozzo, 71, 41125, Modena, Italy
| | - M Starnoni
- Department of Plastic Surgery, Azienda Ospedaliero Universitaria Modena, Largo del Pozzo, 71, 41125, Modena, Italy
| | - R Adani
- Department of Hand Surgery and Microsurgery, Azienda Ospedaliero Universitaria Modena, Largo del Pozzo, 71, 41125, Modena, Italy
| |
Collapse
|
27
|
Wang L, Alexander CA. Cyber security during the COVID-19 pandemic. AIMS ELECTRONICS AND ELECTRICAL ENGINEERING 2021. [DOI: 10.3934/electreng.2021008] [Citation(s) in RCA: 6] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 12/16/2022] Open
|
28
|
Li T, Jiang W, Han J, Niu D, Liu H, Lu B. Enhancements of Loading Capacity and Moving Ability by Microstructures for Wireless Soft Robot Boats. LANGMUIR : THE ACS JOURNAL OF SURFACES AND COLLOIDS 2020; 36:14728-14736. [PMID: 33225710 DOI: 10.1021/acs.langmuir.0c02685] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/11/2023]
Abstract
Because of its promising applications in various fields such as in vivo drug treatment, in-pipe inspection, and so forth, there is an increasing interest on wireless soft robot boats taking advantages of their shape adaptability. The loading capacity and mobility, however, are always fundamental challenges to restrict their applications. In this study, a graphene-based soft robot boat, which could be programmable-driven by a remote near-infrared light, is proposed. Different microstructures underneath the boat are carefully designed and employed to improve both the loading capacity and the moving ability. It reveals that, compared to that without microstructures, the soft robot boat with square pillar arrays (120-160 μm of period, duty cycle, and aspect ratio at active Wenzel/Cassie transition point) could enhance the loading capacity by 12.75% and the moving velocity by 16.70%. For the robot boat with grating structures, a strong driving anisotropy is revealed, with an enhancement of 2.24% for the loading capacity and 34.65% for the driving response along the grating lines. A boat prototype with a self-weight of 6.05 g is finally developed and can achieve continuous navigation in a closed narrow space for in situ monitoring, which may find applications in the inspection of other narrow terrains (e.g., blood vessels).
Collapse
Affiliation(s)
- Tian Li
- State Key Laboratory for Manufacturing Systems Engineering, Xi'an Jiaotong University, Xi'an 710049, China
| | - Weitao Jiang
- State Key Laboratory for Manufacturing Systems Engineering, Xi'an Jiaotong University, Xi'an 710049, China
| | - Jie Han
- State Key Laboratory for Manufacturing Systems Engineering, Xi'an Jiaotong University, Xi'an 710049, China
| | - Dong Niu
- State Key Laboratory for Manufacturing Systems Engineering, Xi'an Jiaotong University, Xi'an 710049, China
| | - Hongzhong Liu
- State Key Laboratory for Manufacturing Systems Engineering, Xi'an Jiaotong University, Xi'an 710049, China
| | - Bingheng Lu
- State Key Laboratory for Manufacturing Systems Engineering, Xi'an Jiaotong University, Xi'an 710049, China
| |
Collapse
|
29
|
Otoom M, Otoum N, Alzubaidi MA, Etoom Y, Banihani R. An IoT-based framework for early identification and monitoring of COVID-19 cases. Biomed Signal Process Control 2020; 62:102149. [PMID: 32834831 PMCID: PMC7428786 DOI: 10.1016/j.bspc.2020.102149] [Citation(s) in RCA: 76] [Impact Index Per Article: 19.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 04/18/2020] [Revised: 07/22/2020] [Accepted: 08/07/2020] [Indexed: 12/28/2022]
Abstract
The world has been facing the challenge of COVID-19 since the end of 2019. It is expected that the world will need to battle the COVID-19 pandemic with precautious measures, until an effective vaccine is developed. This paper proposes a real-time COVID-19 detection and monitoring system. The proposed system would employ an Internet of Things (IoTs) framework to collect real-time symptom data from users to early identify suspected coronaviruses cases, to monitor the treatment response of those who have already recovered from the virus, and to understand the nature of the virus by collecting and analyzing relevant data. The framework consists of five main components: Symptom Data Collection and Uploading (using wearable sensors), Quarantine/Isolation Center, Data Analysis Center (that uses machine learning algorithms), Health Physicians, and Cloud Infrastructure. To quickly identify potential coronaviruses cases from this real-time symptom data, this work proposes eight machine learning algorithms, namely Support Vector Machine (SVM), Neural Network, Naïve Bayes, K-Nearest Neighbor (K-NN), Decision Table, Decision Stump, OneR, and ZeroR. An experiment was conducted to test these eight algorithms on a real COVID-19 symptom dataset, after selecting the relevant symptoms. The results show that five of these eight algorithms achieved an accuracy of more than 90 %. Based on these results we believe that real-time symptom data would allow these five algorithms to provide effective and accurate identification of potential cases of COVID-19, and the framework would then document the treatment response for each patient who has contracted the virus.
Collapse
Affiliation(s)
- Mwaffaq Otoom
- Computer Engineering Department, Yarmouk University, Irbid, Jordan
| | - Nesreen Otoum
- Software Engineering Department, University of Petra, Amman, Jordan
| | | | - Yousef Etoom
- Department of Pediatrics, Faculty of Medicine, University of Toronto, Toronto, Ontario, Canada
- Department of Pediatrics and Division of Pediatric Emergency Medicine, The Hospital for Sick Children, Sick Kids Research Institute, Toronto, Ontario, Canada
- Department of Pediatrics, St Joseph's Health Centre, Toronto, Ontario, Canada
| | - Rudaina Banihani
- Department of Pediatrics, Faculty of Medicine, University of Toronto, Toronto, Ontario, Canada
- Department of Newborn and Developmental Pediatrics, Sunnybrook Health Science Centre, Toronto, Ontario, Canada
| |
Collapse
|
30
|
De Santis G, Palladino T, Leti Acciaro A, Starnoni M. The Telematic solutions in plastic surgery during COVID-19 pandemic. ACTA BIO-MEDICA : ATENEI PARMENSIS 2020; 91:ahead of print. [PMID: 32921744 PMCID: PMC7716977 DOI: 10.23750/abm.v91i3.10291] [Citation(s) in RCA: 7] [Impact Index Per Article: 1.8] [Reference Citation Analysis] [Abstract] [Download PDF] [Subscribe] [Scholar Register] [Received: 07/20/2020] [Accepted: 07/21/2020] [Indexed: 11/23/2022]
Abstract
During the COVID-19 pandemic, surgical elective procedures were stopped in our plastic surgery unit. Limitations for consultations and for follow-up of previous surgical procedures were imposed in order to minimize the risk of contagion in waiting rooms and outpatient clinics. We have identified telemedicine as an alternative way to follow patients during the lockdown. Nevertheless, we have experienced different difficulties. We have not had the possibility to use a secure teleconferencing software. In our unit we had not technological devices. Surgeons in our department were not able to use remote video technology for patient management. Guidelines for an appropriate selection of patients which could be served via telemedicine had to be created. Telemedicine must be regulated by healthcare organizations for legal, ethical, medico-legal and risk management aspects. Even if we have experienced an important need to use telematic solutions during the COVID-19 lockdown, liability and risk management issues has greatly limited this possibility in our unit. The need of telemedicine in the time of COVID-19 pandemic has encouraged us to implement future virtual encounters in order to reduce unnecessary in-person visits by taking into consideration all legal, ethical and medico-legal aspects.
Collapse
Affiliation(s)
| | | | | | - Marta Starnoni
- Division of Plastic Surgery, Modena University Hospital.
| |
Collapse
|
31
|
Gardašević G, Katzis K, Bajić D, Berbakov L. Emerging Wireless Sensor Networks and Internet of Things Technologies-Foundations of Smart Healthcare. SENSORS (BASEL, SWITZERLAND) 2020; 20:E3619. [PMID: 32605071 PMCID: PMC7374296 DOI: 10.3390/s20133619] [Citation(s) in RCA: 17] [Impact Index Per Article: 4.3] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 05/15/2020] [Revised: 06/19/2020] [Accepted: 06/23/2020] [Indexed: 12/16/2022]
Abstract
Future smart healthcare systems - often referred to as Internet of Medical Things (IoMT) - will combine a plethora of wireless devices and applications that use wireless communication technologies to enable the exchange of healthcare data. Smart healthcare requires sufficient bandwidth, reliable and secure communication links, energy-efficient operations, and Quality of Service (QoS) support. The integration of Internet of Things (IoT) solutions into healthcare systems can significantly increase intelligence, flexibility, and interoperability. This work provides an extensive survey on emerging IoT communication standards and technologies suitable for smart healthcare applications. A particular emphasis has been given to low-power wireless technologies as a key enabler for energy-efficient IoT-based healthcare systems. Major challenges in privacy and security are also discussed. A particular attention is devoted to crowdsourcing/crowdsensing, envisaged as tools for the rapid collection of massive quantities of medical data. Finally, open research challenges and future perspectives of IoMT are presented.
Collapse
Affiliation(s)
- Gordana Gardašević
- Faculty of Electrical Engineering, University of Banja Luka, 78000 Banja Luka, Bosnia and Herzegovina;
| | - Konstantinos Katzis
- Department of Computer Science and Engineering, European University Cyprus, 2404 Nicosia, Cyprus;
| | - Dragana Bajić
- Faculty of Technical Science, University of Novi Sad, 21000 Novi Sad, Serbia;
| | - Lazar Berbakov
- Institute Mihajlo Pupin, University of Belgrade, 11060 Belgrade, Serbia
| |
Collapse
|
32
|
Kim DW, Choi JY, Han KH. Risk management-based security evaluation model for telemedicine systems. BMC Med Inform Decis Mak 2020; 20:106. [PMID: 32522216 PMCID: PMC7286211 DOI: 10.1186/s12911-020-01145-7] [Citation(s) in RCA: 21] [Impact Index Per Article: 5.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 02/13/2020] [Accepted: 06/03/2020] [Indexed: 12/15/2022] Open
Abstract
Background Infectious diseases that can cause epidemics, such as COVID-19, SARS-CoV, and MERS-CoV, constitute a major social issue, with healthcare providers fearing secondary, tertiary, and even quaternary infections. To alleviate this problem, telemedicine is increasingly being viewed as an effective means through which patients can be diagnosed and medications prescribed by doctors via untact Thus, concomitant with developments in information and communication technology (ICT), medical institutions have actively analyzed and applied ICT to medical systems to provide optimal medical services. However, with the convergence of these diverse technologies, various risks and security threats have emerged. To protect patients and improve telemedicine quality for patient safety, it is necessary to analyze these risks and security threats comprehensively and institute appropriate countermeasures. Methods The security threats likely to be encountered in each of seven telemedicine service areas were analyzed, and related data were collected directly through on-site surveys by a medical institution. Subsequently, an attack tree, the most popular reliability and risk modeling approach for systematically characterizing the potential risks of telemedicine systems, was examined and utilized with the attack occurrence probability and attack success probability as variables to provide a comprehensive risk assessment method. Results In this study, the most popular modelling method, an attack tree, was applied to the telemedicine environment, and the security concerns for telemedicine systems were found to be very large. Risk management and evaluation methods suitable for the telemedicine environment were identified, and their benefits and potential limitations were assessed. Conclusion This research should be beneficial to security experts who wish to investigate the impacts of cybersecurity threats on remote healthcare and researchers who wish to identify new modeling opportunities to apply security risk modeling techniques.
Collapse
Affiliation(s)
- Dong-Won Kim
- Information Security Department, Korea University, Seoul, Republic of Korea
| | - Jin-Young Choi
- Information Security Department, Korea University, Seoul, Republic of Korea
| | - Keun-Hee Han
- Information Security Department, Korea University, Seoul, Republic of Korea.
| |
Collapse
|
33
|
Pistono M, Bellafqira R, Coatrieux G. Secure Processing of Stream Cipher Encrypted Data Issued from IOT: Application to a Connected Knee Prosthesis. ANNUAL INTERNATIONAL CONFERENCE OF THE IEEE ENGINEERING IN MEDICINE AND BIOLOGY SOCIETY. IEEE ENGINEERING IN MEDICINE AND BIOLOGY SOCIETY. ANNUAL INTERNATIONAL CONFERENCE 2020; 2019:6494-6497. [PMID: 31947329 DOI: 10.1109/embc.2019.8857055] [Citation(s) in RCA: 3] [Impact Index Per Article: 0.8] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/08/2022]
Abstract
In this paper, we propose a secure protocol that allows processing encrypted data emitted by a medical IOT device. Its originality stands on a new fast algorithm which makes possible the conversion of Combined Linear Congruential Generator (CLCG) encrypted data into data homomorphically encrypted with the Damgard-Jurik (D-J) cryptosystem. By doing so, an honest-but-curious third party, like a smartphone, can process data issued from the IOT devices (e.g. raising a health alert) without endangering data privacy while CLCG can be integrated in an IOT of low computation capabilities. Moreover, in order to reduce communication and computation complexities compared to existing solutions and to achieve a real time solution, we further propose a secure packed version of CLCG in the D-J domain. With it a medical IOT can encrypt several pieces of data at once while allowing a third party to independently convert and process them in their D-J homomorphic encrypted form. We theoretically and experimentally demonstrate the performance of our solution in the case of a connected knee prosthesis, the data of which are processed for patient monitoring.
Collapse
|
34
|
Cyber Attacks on Healthcare Devices Using Unmanned Aerial Vehicles. J Med Syst 2019; 44:29. [PMID: 31838588 DOI: 10.1007/s10916-019-1489-9] [Citation(s) in RCA: 13] [Impact Index Per Article: 2.6] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 08/25/2018] [Accepted: 10/17/2019] [Indexed: 12/20/2022]
Abstract
The growing use of wireless technology in healthcare systems and devices makes these systems particularly open to cyber-based attacks, including denial of service and information theft via sniffing (eaves-dropping) and phishing attacks. Evolving technology enables wireless healthcare systems to communicate over longer ranges, which opens them up to greater numbers of possible threats. Unmanned aerial vehicles (UAV) or drones present a new and evolving attack surface for compromising wireless healthcare systems. An enumeration of the types of wireless attacks capable via drones are presented, including two new types of cyber threats: a stepping stone attack and a cloud-enabled attack. A real UAV is developed to test and demonstrate the vulnerabilities of healthcare systems to this new threat vector. The UAV successfully attacked a simulated smart hospital environment and also a small collection of wearable healthcare sensors. Compromise of wearable or implanted medical devices can lead to increased morbidity and mortality.
Collapse
|
35
|
Awan MF, Bose P, Khaleghi A, Kansanen K, Balasingham I. Evaluation of Secrecy Capacity for Next-Generation Leadless Cardiac Pacemakers. IEEE Trans Biomed Eng 2019; 67:2297-2308. [PMID: 31831404 DOI: 10.1109/tbme.2019.2958748] [Citation(s) in RCA: 4] [Impact Index Per Article: 0.8] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/11/2022]
Abstract
Secure communication can be considered as an integral part of the next generation implantable medical devices. With the advent of Physical Layer Security (PLS) methods, confidential messages can be transmitted without the use of encryption keys. For analyzing the effectiveness of PLS for next-generation leadless cardiac pacemakers, we provide secrecy analysis using a performance metric of secrecy capacity. Secrecy capacity defines the secure transmission rate between legitimate nodes without leakage of information to an eavesdropper and depends on respective channel attenuations. The legitimate and eavesdropper channel attenuations are evaluated by 3D numerical electromagnetic simulations using a detailed human model. We do not assume eavesdropper to be located in specific directions or positions and considers it to be located anywhere around the body. We evaluate the secrecy capacity by defining a spherical grid for eavesdropper positions around the body with a radius of 1 m. The secrecy capacity of the entire space is evaluated by extrapolating the grid to different radial distances using free space path loss model. Moreover, by fixing application based secure communication rate, the entire space is divided into secure and in-secure volumes. The in-secure volume consists of all the eavesdropper positions from which the pacemaker can be eavesdropped. We also evaluated the angle from which the maximum leakage of information takes place and referred it as "Eve's sweet spot angle." Data for channel attenuations from phantom and in-vivo experiments is also utilized to validate and observe the differences between simulations and experiments. This article will help in design of the communication module of implanted leadless cardiac pacemakers with enhanced security on the physical layer.
Collapse
|
36
|
Barbone AS, Meftah M, Markiewicz K, Dellimore K. Beyond wearables and implantables: a scoping review of insertable medical devices. Biomed Phys Eng Express 2019. [DOI: 10.1088/2057-1976/ab4b32] [Citation(s) in RCA: 6] [Impact Index Per Article: 1.2] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/11/2022]
|
37
|
Hoare D, Bussooa A, Neale S, Mirzai N, Mercer J. The Future of Cardiovascular Stents: Bioresorbable and Integrated Biosensor Technology. ADVANCED SCIENCE (WEINHEIM, BADEN-WURTTEMBERG, GERMANY) 2019; 6:1900856. [PMID: 31637160 PMCID: PMC6794628 DOI: 10.1002/advs.201900856] [Citation(s) in RCA: 38] [Impact Index Per Article: 7.6] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 04/18/2019] [Revised: 07/26/2019] [Indexed: 05/15/2023]
Abstract
Cardiovascular disease is the greatest cause of death worldwide. Atherosclerosis is the underlying pathology responsible for two thirds of these deaths. It is the age-dependent process of "furring of the arteries." In many scenarios the disease is caused by poor diet, high blood pressure, and genetic risk factors, and is exacerbated by obesity, diabetes, and sedentary lifestyle. Current pharmacological anti-atherosclerotic modalities still fail to control the disease and improvements in clinical interventions are urgently required. Blocked atherosclerotic arteries are routinely treated in hospitals with an expandable metal stent. However, stented vessels are often silently re-blocked by developing "in-stent restenosis," a wound response, in which the vessel's lumen renarrows by excess proliferation of vascular smooth muscle cells, termed hyperplasia. Herein, the current stent technology and the future of biosensing devices to overcome in-stent restenosis are reviewed. Second, with advances in nanofabrication, new sensing methods and how researchers are investigating ways to integrate biosensors within stents are highlighted. The future of implantable medical devices in the context of the emerging "Internet of Things" and how this will significantly influence future biosensor technology for future generations are also discussed.
Collapse
Affiliation(s)
- Daniel Hoare
- BHF Cardiovascular Research CentreUniversity of GlasgowG12 8TAGlasgowScotland
| | - Anubhav Bussooa
- BHF Cardiovascular Research CentreUniversity of GlasgowG12 8TAGlasgowScotland
| | - Steven Neale
- James Watt South BuildingSchool of EngineeringUniversity of GlasgowG12 8QQGlasgowScotland
| | - Nosrat Mirzai
- Bioelectronics UnitCollege of Medical, Veterinary & Life Sciences (MVLS)University of GlasgowG12 8QQGlasgowScotland
| | - John Mercer
- BHF Cardiovascular Research CentreUniversity of GlasgowG12 8TAGlasgowScotland
| |
Collapse
|
38
|
Kintzlinger M, Nissim N. Keep an eye on your personal belongings! The security of personal medical devices and their ecosystems. J Biomed Inform 2019; 95:103233. [PMID: 31201966 DOI: 10.1016/j.jbi.2019.103233] [Citation(s) in RCA: 8] [Impact Index Per Article: 1.6] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 10/14/2018] [Revised: 04/12/2019] [Accepted: 06/11/2019] [Indexed: 12/27/2022]
Abstract
Today, personal medical devices (PMDs) play an increasingly important role in healthcare ecosystems as patient life support equipment. As a result of technological advances, PMDs now encompass many components and functionalities that open the door to a variety of cyber-attacks. In this paper we present a taxonomy of ten widely-used PMDs based on the five diseases they were designed to treat. We also provide a comprehensive survey that covers 17 possible attacks aimed at PMDs, as well as the attacks' building blocks. For each PMD type, we create an ecosystem and data and attack flow diagram, which comprehensively describes the roles and interactions of the players associated with the PMD and presents the most vulnerable vectors and components within the PMDs' ecosystems; such knowledge can increase security awareness among PMD users and their healthcare providers. We also present the basic, yet important, building blocks that constitute the steps by which each of the attacks presented is carried out. Doing so allowed us to establish the foundations for the future development of a novel risk analysis methodology for medical devices. For each attack we mapped the building blocks required to carry out the attack and found that 50% of the attacks rely upon the ability to remotely connect to the PMD, while 61% of them rely on the physical proximity of the attacker to the PMD. Finally, by surveying 21 existing security mechanisms and mapping their coverage for the attacks, we identify the gaps between PMDs' security mechanisms and the possible attacks. We show that current security mechanisms generally fail to provide protection from all of the attacks against PMDs and suggest the development of a comprehensive framework to secure PMDs and protect the patients that rely upon them.
Collapse
Affiliation(s)
- Matan Kintzlinger
- Malware Lab, Cyber Security Research Center, Ben-Gurion University of the Negev, Beer-Sheva, Israel; Department of Software and Information Systems Engineering, Ben-Gurion University of the Negev, Beer-Sheva, Israel
| | - Nir Nissim
- Malware Lab, Cyber Security Research Center, Ben-Gurion University of the Negev, Beer-Sheva, Israel; Department of Industrial Engineering and Management, Ben-Gurion University of the Negev, Beer-Sheva, Israel; Department of Neurobiology, Stanford University, Stanford, CA 94305, USA.
| |
Collapse
|
39
|
Camara C, Subramaniyam NP, Warwick K, Parkkonen L, Aziz T, Pereda E. Non-Linear Dynamical Analysis of Resting Tremor for Demand-Driven Deep Brain Stimulation. SENSORS (BASEL, SWITZERLAND) 2019; 19:E2507. [PMID: 31159311 PMCID: PMC6603524 DOI: 10.3390/s19112507] [Citation(s) in RCA: 6] [Impact Index Per Article: 1.2] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 04/15/2019] [Revised: 05/21/2019] [Accepted: 05/24/2019] [Indexed: 11/26/2022]
Abstract
Parkinson's Disease (PD) is currently the second most common neurodegenerative disease. One of the most characteristic symptoms of PD is resting tremor. Local Field Potentials (LFPs) have been widely studied to investigate deviations from the typical patterns of healthy brain activity. However, the inherent dynamics of the Sub-Thalamic Nucleus (STN) LFPs and their spatiotemporal dynamics have not been well characterized. In this work, we study the non-linear dynamical behaviour of STN-LFPs of Parkinsonian patients using ε -recurrence networks. RNs are a non-linear analysis tool that encodes the geometric information of the underlying system, which can be characterised (for example, using graph theoretical measures) to extract information on the geometric properties of the attractor. Results show that the activity of the STN becomes more non-linear during the tremor episodes and that ε -recurrence network analysis is a suitable method to distinguish the transitions between movement conditions, anticipating the onset of the tremor, with the potential for application in a demand-driven deep brain stimulation system.
Collapse
Affiliation(s)
- Carmen Camara
- Department of Computer Science, Carlos III University of Madrid, 28903 Madrid, Spain.
- Centre for Biomedical Technology, Technical University of Madrid, 28040 Madrid, Spain.
- Department of Neuroscience and Biomedical Engineering, School of Science, Aalto University, FI-00076 Helsinki, Finland.
| | - Narayan P Subramaniyam
- Department of Neuroscience and Biomedical Engineering, School of Science, Aalto University, FI-00076 Helsinki, Finland.
| | - Kevin Warwick
- Vice Chancellors Office, Coventry University, Coventry CV1 5FB, UK.
| | - Lauri Parkkonen
- Department of Neuroscience and Biomedical Engineering, School of Science, Aalto University, FI-00076 Helsinki, Finland.
| | - Tipu Aziz
- Nuffield Department of Clinical Neuroscience, University of Oxford, Oxford OX1 2JD, UK.
| | - Ernesto Pereda
- Centre for Biomedical Technology, Technical University of Madrid, 28040 Madrid, Spain.
- Department of Industrial Engineering, Laboratory of Electrical Engineering and Bioengineering, Universidad de La Laguna, 38200 Tenerife, Spain.
| |
Collapse
|
40
|
Loi M, Christen M, Kleine N, Weber K. Cybersecurity in health – disentangling value tensions. JOURNAL OF INFORMATION COMMUNICATION & ETHICS IN SOCIETY 2019. [DOI: 10.1108/jices-12-2018-0095] [Citation(s) in RCA: 8] [Impact Index Per Article: 1.6] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
Abstract
Purpose
Cybersecurity in healthcare has become an urgent matter in recent years due to various malicious attacks on hospitals and other parts of the healthcare infrastructure. The purpose of this paper is to provide an outline of how core values of the health systems, such as the principles of biomedical ethics, are in a supportive or conflicting relation to cybersecurity.
Design/methodology/approach
This paper claims that it is possible to map the desiderata relevant to cybersecurity onto the four principles of medical ethics, i.e. beneficence, non-maleficence, autonomy and justice, and explore value conflicts in that way.
Findings
With respect to the question of how these principles should be balanced, there are reasons to think that the priority of autonomy relative to beneficence and non-maleficence in contemporary medical ethics could be extended to value conflicts in health-related cybersecurity.
Research limitations/implications
However, the tension between autonomy and justice, which relates to the desideratum of usability of information and communication technology systems, cannot be ignored even if one assumes that respect for autonomy should take priority over other moral concerns.
Originality/value
In terms of value conflicts, most discussions in healthcare deal with the conflict of balancing efficiency and privacy given the sensible nature of health information. In this paper, the authors provide a broader and more detailed outline.
Collapse
|
41
|
Abstract
INTRODUCTION Cardiac implantable electronic devices (CIEDs) integrate numerous automatic and monitor functions. Nowadays, most CIEDs are connected to the Internet (via Wi-Fi, Bluetooth or smartphone) to ensure remote monitoring of technical and clinical data: despite the importance of such a monitoring, especially from a clinical point of view, concerns have been raised about information (IT) security in terms of both privacy and security for CIEDs' carriers. AREAS COVERED This review will provide an outline of remote monitoring of CIEDs, main IT security issues that have affected them so far, main cybervulnerabilities and possible solutions. EXPERT OPINION Although there is no evidence that cyber-attacks have been carried out against any CIED so far, they may occur in the future. Cyber-attacks are usually aimed at stealing sensitive information or granting access to the IT systems to which CIEDs are connected; the possibility of an active reprogramming of CIEDs by cyber-attacks is extremely low. Political, regulatory, scientific, and clinical integration is essential to provide not only effective IT solutions for CIEDs and their carriers, but also for the development of educational programs; it should also promote cooperation between stakeholders in order to reduce the risk of CIEDs' cybervulnerability and increase patient safety.
Collapse
Affiliation(s)
- Cristian Martignani
- a Department of Experimental, Diagnostic and Specialty Medicine , S. Orsola Hospital , Bologna , Italy
| |
Collapse
|
42
|
Camara C, Martín H, Peris-Lopez P, Aldalaien M. Design and Analysis of a True Random Number Generator Based on GSR Signals for Body Sensor Networks. SENSORS (BASEL, SWITZERLAND) 2019; 19:E2033. [PMID: 31052275 PMCID: PMC6540050 DOI: 10.3390/s19092033] [Citation(s) in RCA: 9] [Impact Index Per Article: 1.8] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 03/24/2019] [Revised: 04/21/2019] [Accepted: 04/23/2019] [Indexed: 11/17/2022]
Abstract
Today, medical equipment or general-purpose devices such as smart-watches or smart-textiles can acquire a person's vital signs. Regardless of the type of device and its purpose, they are all equipped with one or more sensors and often have wireless connectivity. Due to the transmission of sensitive data through the insecure radio channel and the need to ensure exclusive access to authorised entities, security mechanisms and cryptographic primitives must be incorporated onboard these devices. Random number generators are one such necessary cryptographic primitive. Motivated by this, we propose a True Random Number Generator (TRNG) that makes use of the GSR signal measured by a sensor on the body. After an exhaustive analysis of both the entropy source and the randomness of the output, we can conclude that the output generated by the proposed TRNG behaves as that produced by a random variable. Besides, and in comparison with the previous proposals, the performance offered is much higher than that of the earlier works.
Collapse
Affiliation(s)
- Carmen Camara
- Department of Computer Science, University Carlos III of Madrid, 28911 Leganes, Spain.
| | - Honorio Martín
- Department of Electronic Technology, University Carlos III of Madrid, 28911 Leganes, Spain.
| | - Pedro Peris-Lopez
- Department of Computer Science, University Carlos III of Madrid, 28911 Leganes, Spain.
| | - Muawya Aldalaien
- Higher Colleges of Technology, Abu Dhabi Women's College, Abu Dhabi 41012, United Arab Emirates.
| |
Collapse
|
43
|
Abstract
Visualising complex data facilitates a more comprehensive stage for conveying knowledge. Within the medical data domain, there is an increasing requirement for valuable and accurate information. Patients need to be confident that their data is being stored safely and securely. As such, it is now becoming necessary to visualise data patterns and trends in real-time to identify erratic and anomalous network access behaviours. In this paper, an investigation into modelling data flow within healthcare infrastructures is presented; where a dataset from a Liverpool-based (UK) hospital is employed for the case study. Specifically, a visualisation of transmission control protocol (TCP) socket connections is put forward, as an investigation into the data complexity and user interaction events within healthcare networks. In addition, a filtering algorithm is proposed for noise reduction in the TCP dataset. Positive results from using this algorithm are apparent on visual inspection, where noise is reduced by up to 89.84%.
Collapse
|
44
|
Mardini MT, Iraqi Y, Agoulmine N. A Survey of Healthcare Monitoring Systems for Chronically Ill Patients and Elderly. J Med Syst 2019; 43:50. [PMID: 30680464 DOI: 10.1007/s10916-019-1165-0] [Citation(s) in RCA: 12] [Impact Index Per Article: 2.4] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 12/05/2017] [Accepted: 01/09/2019] [Indexed: 10/27/2022]
Abstract
The demand of healthcare systems for chronically ill patients and elderly has increased in the last few years. This demand is derived by the necessity to allow patients and elderly to be independent in their homes without the help of their relatives or caregivers. The prosperity of the information technology plays an essential role in healthcare by providing continuous monitoring and alerting mechanisms. In this paper, we survey the most recent applications in healthcare monitoring. We organize the applications into categories and present their common architecture. Moreover, we explain the standards used and challenges faced in this field. Finally, we make a comparison between the presented applications and discuss the possible future research paths.
Collapse
Affiliation(s)
- Mamoun T Mardini
- Department of Aging and Geriatric Research, College of Medicine, University of Florida, Gainesville, FL, USA.
| | - Youssef Iraqi
- Department of Electrical and Computer Engineering, Khalifa University, Abu Dhabi, United Arab Emirates
| | - Nazim Agoulmine
- University of Évry Val d'Essonne, Paris Saclay University, Évry, France
| |
Collapse
|
45
|
Awan MF, Perez-Simbor S, Garcia-Pardo C, Kansanen K, Cardona N. Experimental Phantom-Based Security Analysis for Next-Generation Leadless Cardiac Pacemakers. SENSORS 2018; 18:s18124327. [PMID: 30544594 PMCID: PMC6308590 DOI: 10.3390/s18124327] [Citation(s) in RCA: 6] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 10/31/2018] [Revised: 11/28/2018] [Accepted: 12/05/2018] [Indexed: 11/16/2022]
Abstract
With technological advancement, implanted medical devices can treat a wide range of chronic diseases such as cardiac arrhythmia, deafness, diabetes, etc. Cardiac pacemakers are used to maintain normal heart rhythms. The next generation of these pacemakers is expected to be completely wireless, providing new security threats. Thus, it is critical to secure pacemaker transmissions between legitimate nodes from a third party or an eavesdropper. This work estimates the eavesdropping risk and explores the potential of securing transmissions between leadless capsules inside the heart and the subcutaneous implant under the skin against external eavesdroppers by using physical-layer security methods. In this work, we perform phantom experiments to replicate the dielectric properties of the human heart, blood, and fat for channel modeling between in-body-to-in-body devices and from in-body-to-off-body scenario. These scenarios reflect the channel between legitimate nodes and that between a legitimate node and an eavesdropper. In our case, a legitimate node is a leadless cardiac pacemaker implanted in the right ventricle of a human heart transmitting to a legitimate receiver, which is a subcutaneous implant beneath the collar bone under the skin. In addition, a third party outside the body is trying to eavesdrop the communication. The measurements are performed for ultrawide band (UWB) and industrial, scientific, and medical (ISM) frequency bands. By using these channel models, we analyzed the risk of using the concept of outage probability and determine the eavesdropping range in the case of using UWB and ISM frequency bands. Furthermore, the probability of positive secrecy capacity is also determined, along with outage probability of a secrecy rate, which are the fundamental parameters in depicting the physical-layer security methods. Here, we show that path loss follows a log-normal distribution. In addition, for the ISM frequency band, the probability of successful eavesdropping for a data rate of 600 kbps (Electromyogram (EMG)) is about 97.68% at an eavesdropper distance of 1.3 m and approaches 28.13% at an eavesdropper distance of 4.2 m, whereas for UWB frequency band the eavesdropping risk approaches 0.2847% at an eavesdropper distance of 0.22 m. Furthermore, the probability of positive secrecy capacity is about 44.88% at eavesdropper distance of 0.12 m and approaches approximately 97% at an eavesdropper distance of 0.4 m for ISM frequency band, whereas for UWB, the same statistics are 96.84% at 0.12 m and 100% at 0.4 m. Moreover, the outage probability of secrecy capacity is also determined by using a fixed secrecy rate.
Collapse
Affiliation(s)
- Muhammad Faheem Awan
- Department of Electronic Systems, Norwegian University of Science and Technology, NTNU, NO-7491 Trondheim, Norway.
| | | | | | - Kimmo Kansanen
- Department of Electronic Systems, Norwegian University of Science and Technology, NTNU, NO-7491 Trondheim, Norway.
| | - Narcis Cardona
- iTEAM, Universitat Politècnica de València, 46022 Valencia, Spain.
| |
Collapse
|
46
|
Camara C, Peris-Lopez P, Martín H, Aldalaien M. ECG-RNG: A Random Number Generator Based on ECG Signals and Suitable for Securing Wireless Sensor Networks. SENSORS (BASEL, SWITZERLAND) 2018; 18:E2747. [PMID: 30134589 PMCID: PMC6164852 DOI: 10.3390/s18092747] [Citation(s) in RCA: 12] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 07/02/2018] [Revised: 08/14/2018] [Accepted: 08/17/2018] [Indexed: 11/29/2022]
Abstract
Wireless Sensor Networks (WSNs) are a promising technology with applications in many areas such as environment monitoring, agriculture, the military field or health-care, to name but a few. Unfortunately, the wireless connectivity of the sensors opens doors to many security threats, and therefore, cryptographic solutions must be included on-board these devices and preferably in their design phase. In this vein, Random Number Generators (RNGs) play a critical role in security solutions such as authentication protocols or key-generation algorithms. In this article is proposed an avant-garde proposal based on the cardiac signal generator we carry with us (our heart), which can be recorded with medical or even low-cost sensors with wireless connectivity. In particular, for the extraction of random bits, a multi-level decomposition has been performed by wavelet analysis. The proposal has been tested with one of the largest and most publicly available datasets of electrocardiogram signals (202 subjects and 24 h of recording time). Regarding the assessment, the proposed True Random Number Generator (TRNG) has been tested with the most demanding batteries of statistical tests (ENT, DIEHARDERand NIST), and this has been completed with a bias, distinctiveness and performance analysis. From the analysis conducted, it can be concluded that the output stream of our proposed TRNG behaves as a random variable and is suitable for securing WSNs.
Collapse
Affiliation(s)
- Carmen Camara
- Department of Computer Science, University Carlos III of Madrid, 28911 Leganés, Spain.
| | - Pedro Peris-Lopez
- Department of Computer Science, University Carlos III of Madrid, 28911 Leganés, Spain.
| | - Honorio Martín
- Department of Electronic Technology, University Carlos III of Madrid, 28911 Leganés, Spain.
| | - Mu'awya Aldalaien
- Higher Colleges of Technology, Abu Dhabi Women's College, Abu Dhabi 41012, United Arab Emirates.
| |
Collapse
|
47
|
Pycroft L, Aziz TZ. Security of implantable medical devices with wireless connections: The dangers of cyber-attacks. Expert Rev Med Devices 2018; 15:403-406. [PMID: 29860880 DOI: 10.1080/17434440.2018.1483235] [Citation(s) in RCA: 27] [Impact Index Per Article: 4.5] [Reference Citation Analysis] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/14/2022]
Affiliation(s)
- Laurie Pycroft
- a Oxford Functional Neurosurgery , University of Oxford, John Radcliffe Hospital , Oxford , UK
| | - Tipu Z Aziz
- a Oxford Functional Neurosurgery , University of Oxford, John Radcliffe Hospital , Oxford , UK
| |
Collapse
|
48
|
Quintal A, Messier V, Rabasa-Lhoret R, Racine E. A critical review and analysis of ethical issues associated with the artificial pancreas. DIABETES & METABOLISM 2018; 45:1-10. [PMID: 29753624 DOI: 10.1016/j.diabet.2018.04.003] [Citation(s) in RCA: 12] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 12/04/2017] [Revised: 04/13/2018] [Accepted: 04/18/2018] [Indexed: 12/13/2022]
Abstract
The artificial pancreas combines a hormone infusion pump with a continuous glucose monitoring device, supported by a dosing algorithm currently installed on the pump. It allows for dynamic infusions of insulin (and possibly other hormones such as glucagon) tailored to patient needs. For patients with type 1 diabetes the artificial pancreas has been shown to prevent more effectively hypoglycaemic events and hyperglycaemia than insulin pump therapy and has the potential to simplify care. However, the potential ethical issues associated with the upcoming integration of the artificial pancreas into clinical practice have not yet been discussed. Our objective was to identify and articulate ethical issues associated with artificial pancreas use for patients, healthcare professionals, industry and policymakers. We performed a literature review to identify clinical, psychosocial and technical issues raised by the artificial pancreas and subsequently analysed them through a common bioethics framework. We identified five sensitive domains of ethical issues. Patient confidentiality and safety can be jeopardized by the artificial pancreas' vulnerability to security breaches or unauthorized data sharing. Public and private coverage of the artificial pancreas could be cost-effective and warranted. Patient selection criteria need to ensure equitable access and sensitivity to patient-reported outcomes. Patient coaching and support by healthcare professionals or industry representatives could help foster realistic expectations in patients. Finally, the artificial pancreas increases the visibility of diabetes and could generate issues related to personal identity and patient agency. The timely consideration of these issues will optimize the technological development and clinical uptake of the artificial pancreas.
Collapse
Affiliation(s)
- A Quintal
- Unité de recherche en neuroéthique, Institut de recherches cliniques de Montréal (IRCM), 110, avenue des Pins Ouest, QC H2W 1R7 Montréal, Canada; Département de médecine sociale et préventive, École de santé publique, Université de Montréal, C.P. 6128, succursale Centre-ville, QC H3C 3J7 Montréal, Canada
| | - V Messier
- Unité de recherche sur les maladies métaboliques, Institut de recherches cliniques de Montréal (IRCM), 110, avenue des Pins Ouest, QC H2W 1R7 Montréal, Canada
| | - R Rabasa-Lhoret
- Unité de recherche sur les maladies métaboliques, Institut de recherches cliniques de Montréal (IRCM), 110, avenue des Pins Ouest, QC H2W 1R7 Montréal, Canada; Département de nutrition, Faculté de médecine, Université de Montréal, 2405, chemin de la Côte-Sainte-Catherine, QC H3T 1A8 Montréal, Canada; Montreal Diabetes Research Centre and Endocrinology Division, centre hospitalier de l'Université de Montréal, QC H2X 3J4 Montréal, Canada
| | - E Racine
- Unité de recherche en neuroéthique, Institut de recherches cliniques de Montréal (IRCM), 110, avenue des Pins Ouest, QC H2W 1R7 Montréal, Canada; Département de médecine sociale et préventive, École de santé publique, Université de Montréal, C.P. 6128, succursale Centre-ville, QC H3C 3J7 Montréal, Canada; Department of Neurology and Neurosurgery, McGill University, 3801 University Street, QC H3A 2B4 Montréal, Canada; Experimental Medicine and Biomedical Ethics Unit, McGill University, 1110, avenue des Pins Ouest, QC H3A 1A3 Montréal, Canada; Département de médecine, Université de Montréal, C.P. 6128, succursale Centre-ville, QC H3C 3J7 Montréal, Canada.
| |
Collapse
|
49
|
Wazid M, Das AK, Kumar N, Conti M, Vasilakos AV, Wazid M, Das AK, Kumar N, Conti M, Vasilakos AV. A Novel Authentication and Key Agreement Scheme for Implantable Medical Devices Deployment. IEEE J Biomed Health Inform 2017; 22:1299-1309. [PMID: 28682267 DOI: 10.1109/jbhi.2017.2721545] [Citation(s) in RCA: 94] [Impact Index Per Article: 13.4] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/10/2022]
Abstract
Implantable medical devices (IMDs) are man-made devices, which can be implanted in the human body to improve the functioning of various organs. The IMDs monitor and treat physiological condition of the human being (for example, monitoring of blood glucose level by insulin pump). The advancement of information and communication technology enhances the communication capabilities of IMDs. In healthcare applications, after mutual authentication, a user (for example, doctor) can access the health data from the IMDs implanted in a patient's body. However, in this kind of communication environment, there are always security and privacy issues, such as leakage of health data and malfunctioning of IMDs by an unauthorized access. To mitigate these issues, in this paper, we propose a new secure remote user authentication scheme for IMDs communication environment to overcome security and privacy issues in existing schemes. We provide the formal security verification using the widely accepted Automated Validation of Internet Security Protocols and Applications tool. We also provide the informal security analysis of the proposed scheme. The formal security verification and informal security analysis prove that the proposed scheme is secure against known attacks. The practical demonstration of the proposed scheme is performed using the broadly accepted NS2 simulation tool. The computation and communication costs of the proposed scheme are also comparable with the existing schemes. Moreover, the scheme provides additional functionality features, such as anonymity, untraceability, and dynamic implantable medical device addition.
Collapse
|
50
|
Ellouze N, Rekhis S, Boudriga N, Allouche M. Cardiac Implantable Medical Devices forensics: Postmortem analysis of lethal attacks scenarios. DIGIT INVEST 2017. [DOI: 10.1016/j.diin.2016.12.001] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.1] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/20/2022]
|