Cyber Physical Security Solutions for Pervasive Health Monitoring Systems

Author(s):  
Krishna K. Venkatasubramanian ◽  
Sidharth Nabar ◽  
Sandeep K. S. Gupta ◽  
Radha Poovendran

With a rapidly aging population, the healthcare community will soon face severe medical personnel shortage and rising costs. Pervasive Health Monitoring Systems (PHMS) can help alleviate this situation. PHMS provides continuous real-time monitoring of a person’s health using a (usually wireless) network of medical and ambient sensors/devices on the host (patients), called Body Area Networks (BANs). The sensitive nature of health information collected by PHMS mandates that patient’s privacy be protected by securing the medical data from any unauthorized access. The authors’ approach for addressing these issues focuses on a key observation that PHMS are cyber-physical systems (CPS). Cyber-physical systems are networked, computational platforms, deeply embedded in specific physical processes for monitoring and actuation purposes. In this work, they therefore present a novel perspective on securing PHMS, called Cyber Physical Security (CYPSec) solutions. CYPSec solutions are environmentally-coupled security solutions, which operate by combining traditional security primitives along with environmental features. Its use results in not only secure operation of a system but also the emergence of additional “allied” properties which enhance its overall capabilities. The principal focus of this chapter is the development of a new security approach for PHMS called CYPsec that leverages their cyber-physical nature. The authors illustrate the design issues and principals of CYPSec through two specific examples of this generic approach: (a) Physiological Signal based key Agreement (PSKA) is designed to enable automated key agreement between sensors in the BAN based on physiological signals from the body; and (b) Criticality Aware Access Control (CAAC) which has the ability to provide controlled opening of the system for emergency management. Further, they also discuss aspects such as altered threat-model, increased complexity, non-determinism, and mixed critical systems, that must be addressed to make CYPSec a reality.

2012 ◽  
pp. 447-465 ◽  
Author(s):  
Krishna K. Venkatasubramanian ◽  
Sidharth Nabar ◽  
Sandeep K. S. Gupta ◽  
Radha Poovendran

With a rapidly aging population, the healthcare community will soon face severe medical personnel shortage and rising costs. Pervasive Health Monitoring Systems (PHMS) can help alleviate this situation. PHMS provides continuous real-time monitoring of a person’s health using a (usually wireless) network of medical and ambient sensors/devices on the host (patients), called Body Area Networks (BANs). The sensitive nature of health information collected by PHMS mandates that patient’s privacy be protected by securing the medical data from any unauthorized access. The authors’ approach for addressing these issues focuses on a key observation that PHMS are cyber-physical systems (CPS). Cyber-physical systems are networked, computational platforms, deeply embedded in specific physical processes for monitoring and actuation purposes. In this work, they therefore present a novel perspective on securing PHMS, called Cyber Physical Security (CYPSec) solutions. CYPSec solutions are environmentally-coupled security solutions, which operate by combining traditional security primitives along with environmental features. Its use results in not only secure operation of a system but also the emergence of additional “allied” properties which enhance its overall capabilities. The principal focus of this chapter is the development of a new security approach for PHMS called CYPsec that leverages their cyber-physical nature. The authors illustrate the design issues and principals of CYPSec through two specific examples of this generic approach: (a) Physiological Signal based key Agreement (PSKA) is designed to enable automated key agreement between sensors in the BAN based on physiological signals from the body; and (b) Criticality Aware Access Control (CAAC) which has the ability to provide controlled opening of the system for emergency management. Further, they also discuss aspects such as altered threat-model, increased complexity, non-determinism, and mixed critical systems, that must be addressed to make CYPSec a reality.


2009 ◽  
pp. 129-142 ◽  
Author(s):  
Janani Sriram ◽  
Minho Shin ◽  
David Kotz ◽  
Anand Rajan ◽  
Manoj Sastry ◽  
...  

Author(s):  
Tengfei Li ◽  
Jing Liu ◽  
Haiying Sun ◽  
Xiang Chen ◽  
Lipeng Zhang ◽  
...  

AbstractIn the past few years, significant progress has been made on spatio-temporal cyber-physical systems in achieving spatio-temporal properties on several long-standing tasks. With the broader specification of spatio-temporal properties on various applications, the concerns over their spatio-temporal logics have been raised in public, especially after the widely reported safety-critical systems involving self-driving cars, intelligent transportation system, image processing. In this paper, we present a spatio-temporal specification language, STSL PC, by combining Signal Temporal Logic (STL) with a spatial logic S4 u, to characterize spatio-temporal dynamic behaviors of cyber-physical systems. This language is highly expressive: it allows the description of quantitative signals, by expressing spatio-temporal traces over real valued signals in dense time, and Boolean signals, by constraining values of spatial objects across threshold predicates. STSL PC combines the power of temporal modalities and spatial operators, and enjoys important properties such as finite model property. We provide a Hilbert-style axiomatization for the proposed STSL PC and prove the soundness and completeness by the spatio-temporal extension of maximal consistent set and canonical model. Further, we demonstrate the decidability of STSL PC and analyze the complexity of STSL PC. Besides, we generalize STSL to the evolution of spatial objects over time, called STSL OC, and provide the proof of its axiomatization system and decidability.


Sign in / Sign up

Export Citation Format

Share Document