The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2020
DOI: 10.3390/bios10020014
|View full text |Cite
|
Sign up to set email alerts
|

Attack Graph Modeling for Implantable Pacemaker

Abstract: Remote health monitoring systems are used to audit implantable medical devices or patients’ health in a non-clinical setting. These systems are prone to cyberattacks exploiting their critical vulnerabilities. Thus, threatening patients’ health and confidentiality. In this paper, a pacemaker automatic remote monitoring system (PARMS) is modeled using architecture analysis and design language (AADL), formally characterized, and checked using the JKind model checker tool. The generated attack graph is visualized … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
10
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 14 publications
(10 citation statements)
references
References 28 publications
0
10
0
Order By: Relevance
“…Shen et al (2020) designed remote monitoring and auditing cloud platform. Ibrahim et al (2020) provided IoT devices security control methods for remote health monitoring and auditing. Also, Aydarov et al (2019) presented the results of the development and implementation of the remote monitoring system for audit and quality assessment of car‐service industry.…”
Section: Methodsmentioning
confidence: 99%
“…Shen et al (2020) designed remote monitoring and auditing cloud platform. Ibrahim et al (2020) provided IoT devices security control methods for remote health monitoring and auditing. Also, Aydarov et al (2019) presented the results of the development and implementation of the remote monitoring system for audit and quality assessment of car‐service industry.…”
Section: Methodsmentioning
confidence: 99%
“…Approaches based on graphs represent a common solution in security assessment research (see, e.g., [6], [12], [23]- [40]). Many papers customize these approaches to the specific technologies, such as smart grids [6], medical devices [29], smart infrastructures [30], web technologies [31], cloud environments [40].…”
Section: B Graph-based Approachesmentioning
confidence: 99%
“…However, no thorough study has addressed IoT vulnerabilities and their evaluation using attack graphs. Although some papers capture both attack graphs and IoT [3], [34], they either do not cover certain topics, such as the parameters of the IoT network used to develop the attack graph [8], [17], [35], [48], [52], [54], [57], [68], [69] and the methods and tools used for visualizing the model, framework, or application [6], [16], [27], [30], [37], [39], [40], [62], or are no longer fully relevant due to the rapidly evolving domain. This survey paper is needed because IoT systems are becoming increasingly complex and pervasive in our daily lives, making it crucial to ensure their security.…”
Section: Introductionmentioning
confidence: 99%