Affiliation:
1. University of Louisiana at Lafayette, USA
Abstract
Technology has greatly increased the availability of medical procedures in remote locations that are difficult to access, such as battlefields. Teleoperated surgical robots can be used to perform surgeries on patients over the internet in remote locations. A surgeon can remotely operate the robot to perform a procedure in another room or in a different continent. However, security technology has not yet caught up to these cyber-physical devices. There exist potential cybersecurity attacks on these medical devices that could expose a patient to danger in contrast to traditional surgery. Hence, the security of the system is very important. A malicious actor can gain control of the device and potentially threaten the life of a patient. In this chapter, the authors conduct a survey of potential attack vectors a malicious actor could exploit to deny service to the device, gain control of the device, and steal patient data. Furthermore, after the vulnerability analysis, the authors provide mitigation techniques to limit the risk of these attack vectors.
Reference21 articles.
1. Alemzadeh, Chen, Lewis, Kalbarczyk, Raman, Leveson, & Iyer. (2015). Systems-theoretic safety assessment of robotic telesurgical systems. Academic Press.
2. Alemzadeh, H., Chen, D., Li, X., Kesavadas, T., Kalbarczyk, Z. T., & Iyer, R. K. (2016). Targeted attacks on teleoperated surgical robots: Dynamic model-based detection and mitigation. 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 395–406.
3. Chang, Raheem, Rha. (2018). Novel robotic systems and future directions. Indian Journal of Urology, 34, 110.
4. Coble, Wang, Chu, & Li. (2010). Secure software attestation for military telesurgical robot systems. MILCOM 2010 Military Communications Conference, 965–970.
5. Microfibrous metallic cloth for acoustic isolation of a MEMS gyroscope;Proceedings of Industrial and Commercial Applications of Smart Structures Technologies,2011