secure&iot&use&in&digital&health&€¦ ·...

12
Secure IoT use in Digital Health Professor Awais Rashid (Director, Security Lancaster Research Centre)

Upload: others

Post on 26-Sep-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Secure&IoT&use&in&Digital&Health&€¦ · Secure&IoT&use&in&Digital&Health& Professor&Awais&Rashid& (Director,&Security&Lancaster&Research&Centre)&

Secure  IoT  use  in  Digital  Health  

Professor  Awais  Rashid  (Director,  Security  Lancaster  Research  Centre)  

Page 2: Secure&IoT&use&in&Digital&Health&€¦ · Secure&IoT&use&in&Digital&Health& Professor&Awais&Rashid& (Director,&Security&Lancaster&Research&Centre)&

Yes,  you  can!  

Page 3: Secure&IoT&use&in&Digital&Health&€¦ · Secure&IoT&use&in&Digital&Health& Professor&Awais&Rashid& (Director,&Security&Lancaster&Research&Centre)&

IoT  use  in  Digital  Health  

•  Implantable  Medical  Devices  

•  Body  Area  Networks  

•  Assisted  Living  

•  …  

Page 4: Secure&IoT&use&in&Digital&Health&€¦ · Secure&IoT&use&in&Digital&Health& Professor&Awais&Rashid& (Director,&Security&Lancaster&Research&Centre)&

Cyber  Security  Threats  in    Health  IoT  •  Telemetry  interface  

–  Eavesdropping  –  Jamming  –  Replay  aMacks  –  Forging  aMacks  

•  Malware  –  Altering  the  soOware  on  the  device  –  InjecQng  command  and  control  soOware  on  to  the  device  

•  Compromising  trust  –  Forcing  sensor/actuator  failure  through  denial  of  service  –  Remotely  acQvaQng  or  deacQvaQng  sensors  and  actuators  –  Malicious  data  injecQon  

Page 5: Secure&IoT&use&in&Digital&Health&€¦ · Secure&IoT&use&in&Digital&Health& Professor&Awais&Rashid& (Director,&Security&Lancaster&Research&Centre)&

Cyber  Security  Threats  in    Health  IoT  •  Data  ExfiltraQon  

–  Intellectual  Property  •  Resource  HarvesQng  

–  E.g.,  use  in  Botnets  

Page 6: Secure&IoT&use&in&Digital&Health&€¦ · Secure&IoT&use&in&Digital&Health& Professor&Awais&Rashid& (Director,&Security&Lancaster&Research&Centre)&

AMackers  are  not  always  external    Malicious  insiders  across  the  chain  –  from  manufacturers  and  suppliers  through  to  primary  and  second  care  professionals    The  problem  of  Contextual  Access  

Page 7: Secure&IoT&use&in&Digital&Health&€¦ · Secure&IoT&use&in&Digital&Health& Professor&Awais&Rashid& (Director,&Security&Lancaster&Research&Centre)&

We  have  been  here  before!  

•  Ease  of  use  and  interoperability  vs.  Security  

Security    Confiden'ality  Integrity  Availability  Non-­‐repudia'on  

Resilience    Safety  Reliability  Availability  

Page 8: Secure&IoT&use&in&Digital&Health&€¦ · Secure&IoT&use&in&Digital&Health& Professor&Awais&Rashid& (Director,&Security&Lancaster&Research&Centre)&

What  needs  to  be  done?  

•  Much  stronger  regulatory  environment  –  If  it  is  not  secure,  it  is  not  safe  –  Needs  to  be  coupled  with  effecQve  cyber  security  metrics  for  Health  IoT  and  clearly  traceable  means  to  measure  those  metrics  

–  BeMer  means  to  translate  from  technical  measures  to  high  level  security-­‐safety  goals  

•  Understanding  cyber  risk  across  the  chain  –  How  various  enQQes  across  the  chain  assess  and  respond  to  cyber  risk  

•  The  problem  of  boundaries  

Page 9: Secure&IoT&use&in&Digital&Health&€¦ · Secure&IoT&use&in&Digital&Health& Professor&Awais&Rashid& (Director,&Security&Lancaster&Research&Centre)&

What  needs  to  be  done?  

•  Technology  only  protects  technology  not  informaQon  flow.  –  What  is  the  informaQon  network,  how  does  informaQon  flow?  This  includes  people!  

–  New  security  models  for  protecQng  informaQon  flow  in  such  se]ngs.  

Page 10: Secure&IoT&use&in&Digital&Health&€¦ · Secure&IoT&use&in&Digital&Health& Professor&Awais&Rashid& (Director,&Security&Lancaster&Research&Centre)&

ParQal  Trust  

Security  and  Safety  

Intertwined  

Cross-­‐boundary  Security  

Secure  Health  IoT  By  Design  

Page 11: Secure&IoT&use&in&Digital&Health&€¦ · Secure&IoT&use&in&Digital&Health& Professor&Awais&Rashid& (Director,&Security&Lancaster&Research&Centre)&

A  useful  resource  

•  Michael  Rushanan,  Aviel  D.  Rubin,  Denis  Foo  Kune,  Colleen  M.  Swanson:  SoK:  Security  and  Privacy  in  Implantable  Medical  Devices  and  Body  Area  Networks.  IEEE  Symposium  on  Security  and  Privacy  2014:  524-­‐539.  

Page 12: Secure&IoT&use&in&Digital&Health&€¦ · Secure&IoT&use&in&Digital&Health& Professor&Awais&Rashid& (Director,&Security&Lancaster&Research&Centre)&

Argumentum Ad Ignorantiam      Absence  of  evidence  is  not  evidence  of  absence