Abstract

Point of Care (PoC) devices and systems can be categorized into three broad classes (CAT 1, CAT 2, and CAT 3) based on the context of operation and usage. In this paper, the categories are defined to address certain usage models of the PoC device. PoC devices that are used for PoC testing and diagnostic applications are defined CAT 1 devices; PoC devices that are used for patient monitoring are defined as CAT 2 devices (PoCM); PoC devices that are used for as interfacing with other devices are defined as CAT 3 devices (PoCI). The PoCI devices provide an interface gateway for collecting and aggregating data from other medical devices. In all categories, data security is an important aspect. This paper presents a security framework concept, which is applicable for all of the classes of PoC operation. It outlines the concepts and security framework for preventing security challenges in unauthorized access to data, unintended data flow, and data tampering during communication between system entities, the user, and the PoC system. The security framework includes secure layering of basic PoC system architecture, protection of PoC devices in the context of application and network. Developing the security framework is taken into account of a thread model of the PoC system. A proposal for a low-level protocol is discussed. This protocol is independent of communications technologies, and it is elaborated in relation to providing security. An algorithm that can be used to overcome the threat challenges has been shown using the elements in the protocol. The paper further discusses the vulnerability scanning process for the PoC system interconnected network. The paper also presents a four-step process of authentication and authorization framework for providing the security for the PoC system. Finally, the paper concludes with the machine to machine (M2M) security viewpoint and discusses the key stakeholders within an actual deployment of the PoC system and its security challenges.

Highlights

  • With the exponential rise in clinical devices such as Point of Care (PoC) systems [1], clinical network security has become a major issue for biomedical teams and health care organizations [2]

  • PoC devices that are used for PoC testing and diagnostic applications are defined CAT 1 devices; PoC devices that are used for patient monitoring are defined as CAT 2 devices (PoCM); PoC devices that are used for as interfacing with other devices are defined as CAT 3 devices (PoCI)

  • Port 80 is for the application based on Hyper Text Transfer Protocol (HTTP) and use of port 443 for the applications based on the Secure-HTTP (HTTPS)

Read more

Summary

Introduction

With the exponential rise in clinical devices such as PoC systems [1], clinical network security has become a major issue for biomedical teams and health care organizations [2]. Smartphones use medical applications based both on the web as well as device specific applications. A proposal for secure communication protocol for the healthcare IoT has been discussed [7]. It is important to have a security framework independent of communication technologies and medical applications with flexible enough to use universally. In the 2nd case, the G-Node together with the associated infrastructure assures security In both instances, a layered model requires a partition strategy that protects all components in the network (PoCT devices, network equipment, secure gateway and secure clouds). A layered model requires a partition strategy that protects all components in the network (PoCT devices, network equipment, secure gateway and secure clouds) This layering approach provides physical security for the end to end system. The layering approach needs to be architected dependent upon the PoC device deployment

Security Layering
Definition of Asset in PoC
Web-Based PoC Access
Cross-Site Scripting
SQL Injection
XML Injection
Client-Side Attacks
Malware Attacks
Cookies and Attachments
Security Framework
The Protocol Used between the G-Node and the P-Node
M2M Security in PoCT
Trust Relationships between POC System Entities
Security Compromising Scenarios
Core Security Requirements for POC M2M
Bootstrapping Requirements for POCT Device Deployments
Findings
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call