Page 183 - ITU KALEIDOSCOPE, ATLANTA 2019
P. 183

CYBER-SAFETY IN HEALTHCARE IOT



                                                                   1
                                                      Duncan Sparrell

                                               1 sFractal Consulting, United States


                              ABSTRACT                        from  ancillary  to  safety  critical.  IAmTheCavalry.org  was
                                                              founded to focus on the intersection of computer security and
           Healthcare is becoming more connected. Risks to patient and   public safety. “IoT is where bits and bytes meet flesh and
           public safety are increasing due to cybersecurity attacks. To   blood” [12].
           best thwart cyberattacks, the Internet of health things (IoHT)
           must  respond  at  machine  speed.  Cybersecurity  standards        2.  THREATS
           being developed today will enable future IoHT systems to
           automatically  adapt  to  cybersecurity  threats  in  real  time,   Over 90% of healthcare institutions have been attacked [13].
           based on a quantitative analysis of reasonable mitigations   The impact of failed security is increasing as well. At the
           performing  triage  to  economically  optimize  the  overall   RSA Conference USA in 2018, hackers “killed” (simulated)
           healthcare outcome. This paper will discuss cybersecurity   patients without the doctors even being aware the operating
           threats,  risk,  health  impact,  and  how  future  IoHT   room (OR) had been hacked [14]. Marathons affect patient
           cybersecurity systems will adapt to threats in real time.   care due to the ambulance delays (due to rerouting around
                                                              the marathon) resulting in a statistically significant increase
             Keywords – Cyber-safety, healthcare, Internet of things  in the 30-day mortality rates [15]. If people died due to a 4.5
                                                              minute average increase in the length of the ambulance ride,
                         1.  INTRODUCTION                     then it seems logical that people died in the massive hospital
                                                              ransomware-caused outage in the UK [16] as well as other
           If  “software  is  eating  the  world”[1],  then  the  Internet  of   hospital  attacks  such  as  Hollywood  Presbyterian  where
           things  (IoT)  is  blanketing  the  world.  International   ambulances were rerouted to other hospitals in LA traffic [17]
           Telecommunication Union (ITU), Recommendation ITU-T   or similar events in other hospitals [18-22].
           Y.2060 defines an IoT device as a “piece of equipment with
           the  mandatory  capabilities  of  communication  and  the  Attackers  make  use  of  automation,  resulting  in  attacks
           optional capabilities of sensing, actuation, data capture, data  occurring  at  the  speed  of  light;  yet  defense  occurs  at  the
           storage  and  data  processing.”  [2].  This  paper  defines  the  speed of lawyers. Obviously, lawyers need to be involved.
           Internet of health things (IoHT) as all  ITU-T Y.2060 IoT  Lawyers should be consulted a priori so they are not needed
           devices used in healthcare and ambient assisted living [3].  to  be  consulted  during  the  attack.  To  do  this  requires
           This definition is broader than implantable medical devices  anticipating the possible attacks and responses. “Think evilly
           and  includes:  care,  diagnostic,  ambient-assisted  and  but act ethically” [23].
           administrative devices, since they all could potentially affect
           patient  health  if  exploited.  “While  advanced  devices  can  IoHT designers must take into account attacks that will be
           offer safer, more convenient and timely health care delivery,  part  of  a  well-funded,  well-staffed  campaign  to  achieve  a
           a medical device connected to a communications network  particular mission. The mission may be against the owner of
           could  have  cybersecurity  vulnerabilities  that  could  be  the IoHT (e.g. the healthcare provider), the IoHT may be an
           exploited resulting in patient harm.” said Amy Abernethy,  attack vector against another entity (e.g. the healthcare client
           M.D.,  Ph.D.,  the  United  States  (US)  Food  and  Drug  either  as  an  individual,  or  as  group  such  as  military
           Administration (FDA) principal deputy commissioner [4].  personnel).

           IoHT  is  the  merging  of  the  information  technology  (IT)   Looking at real-world non-cyber failures and disasters gives
           world with the operational technology (OT) world to bring   great insights into what an attacker could do. As an example,
           about  increased  innovation,  efficiency  and  quality  of   there were 8 failures that led to the Deepwater Horizon / BP
           healthcare [5-11].                                 oil spill in the Gulf of Mexico [24]. Seven of the 8 problems
                                                              were  with  actuators,  sensors  or  decision  algorithms,  all
           As  IoT  pervades  the  healthcare  industry,  cybersecurity  in   failures that could also be caused by a cyberattack. Even the
                                                               th
           IoHT must evolve both to recognize new threats but also to   8  cause, faulty cement, could be caused by a supply chain
           recognize  different  consequences  i.e.  impact  on  patient   attack. The analysis does not have to be of mega-disasters. A
           health. This paper will discuss trends that when combined   similar  analysis  could  be  done  of  the  typical  failures  in
           will  make  IoHT  safer  and  demonstrate  the  important  role   almost  any  manufacturing  process,  or  to  any  medical
           cybersecurity standards will play as cybersecurity evolves   simulation.  This  points  out  the  need  for  domain-specific





           978-92-61-28401-5/CFP1968P-ART @ ITU 2019      – 163 –                                    Kaleidoscope
   178   179   180   181   182   183   184   185   186   187   188