How Healthy Are the IoT Devices of Healthcare?

2022-08-23 09:15:43
关注

Illustration: © IoT For All

The Internet of Things (IoT) is becoming an integral component of everyday life – whether we know (and like) it or not. Most industries have adopted IoT technologies thanks to the many benefits they provide for enterprises and consumers. Healthcare is no exception, with nearly 80 percent of healthcare providers adopting IoT, according to Gartner. IoT in this industry, also known as the Internet of Medical Things (IoMT), often carries out vital tasks that are fundamental to a patient’s health and wellbeing. Any disruptions or breakdowns to a device’s operability can have noticeable and even fatal consequences; hence, IoMT vulnerabilities must be accounted for and managed. Moreover, the interconnectedness of Industry 4.0 means that even seemingly innocuous IoT devices – such as HVACs and smart cameras – pose a risk to the critical environment of healthcare delivery organizations (HDOs).

'Combining the high-stake healthcare environment with the high-risk nature of IoT devices means security is imperative.' -SepioClick To Tweet

IoT (and IoMTs) devices are vulnerable by nature. More than 50 percent of IoT and IoMT devices contain critical vulnerabilities, and these highly-accessible devices often lack necessary built-in security measures – a recipe for disaster. Additionally, IoT devices are sought after by malicious actors thanks to their access to and collection of data (with Protected Healthcare Information (PHI) having the most monetary value), as well as their connectivity. Combining the high-stake healthcare environment with the high-risk nature of IoT devices means security is imperative. Yet, despite widespread knowledge of the risks associated with IoT devices, security in this domain remains weak and rudimentary, and, in 2021, IoT security projects dropped by an alarming 16 percent.

Layer 2: Limited Visibility Means Weak Authentication

IoT security begins with device authentication to ensure network access is granted only to those with authorization. IoT devices are non-802.1x compliant, meaning this authentication protocol is unsuitable. Alternative authentication protocols exist, such as MACsec and MAB, both of which rely on a device’s MAC address for authentication, using Layer 2 data packets to identify this indicator. However, a MAC address database must be created and maintained; more importantly, MAC addresses easily get spoofed, and some devices don’t even have a MAC address, thus rendering MACsec and MAB weak authentication protocols. In turn, IoT devices might get erroneously authenticated or bypass authentication altogether, subsequently gaining network access and putting the entity at serious risk. Ultimately, the weak spot in these protocols is visibility; Layer 2 data is insufficient in identifying IoT devices, and one of the greatest concerns for HDOs is that they lack the visibility to properly authenticate IoT devices.

Layer 1 Device Security: Securing Starts with Seeing

Complete visibility and, in turn, reliable authentication of IoT devices requires Physical Layer (Layer 1 device security) data. Rather than relying on traffic monitoring, Layer 1 data signals, such as noise level, voltage, signal timing, current, and more, offer greater and deeper insights into device characteristics for accurate identification. Unlike a MAC address, Layer 1 indicators cannot get changed, nor can devices hide by operating passively or out-of-band. Further, such visibility enables the detection of abnormalities in device behavior, which could indicate device manipulation. With complete visibility into IoT devices, HDOs can be sure that device authentication is accurate and reliable and that subsequent authorization processes are, too. With enhanced device authentication and authorization, risks posed by IoT devices to the healthcare environment get minimized as unauthorized devices do not gain network access, and those which are authorized get properly managed and controlled.

Conclusion

The interconnectedness of IoT devices means just one exploited vulnerability can cause significant disruptions to healthcare operations – and when human lives are at stake, the risk is too high to take. The only way to secure IoT devices and minimize their threat to the healthcare environment is to control their network access, whether that means blocking a device or restricting and heavily monitoring its access. Such control begins with authentication and relies on complete visibility, which can only be achieved when going all the way down to Layer 1.

Tweet

Share

Share

Email

  • Healthcare
  • Industry 4.0
  • Medical Devices
  • Network and Protocols
  • Security

  • Healthcare
  • Industry 4.0
  • Medical Devices
  • Network and Protocols
  • Security

参考译文
医疗IoT设备有多健康?
图示:© IoT For All 物联网(IoT)正日益成为我们日常生活的重要组成部分——无论我们是否意识到(并喜欢)它。由于物联网技术为企业和消费者提供了许多好处,大多数行业都已采用该技术。医疗保健行业也不例外,据Gartner数据显示,近80%的医疗服务提供商已采用物联网技术。在该行业,物联网也被称为医疗物联网(IoMT),通常承担对患者健康和福祉至关重要的任务。任何设备运行的中断或故障都可能产生明显甚至致命的后果;因此,必须识别并管理IoMT的漏洞。此外,工业4.0的互联性意味着,即使是看似无害的物联网设备——如暖通空调系统(HVAC)和智能摄像头——也会对医疗机构(HDO)这一关键环境构成威胁。 “将高风险的医疗环境与高风险的物联网设备结合在一起,意味着安全是至关重要的。” — Sepio 物联网(以及IoMT)设备本质上是脆弱的。超过50%的物联网和IoMT设备包含关键性漏洞,而这些极易被访问的设备往往缺乏必要的内置安全措施——这正是酿成灾难的隐患。此外,由于物联网设备具备数据访问和收集功能(其中受保护的医疗信息PHI具有最高的经济价值)以及它们的互联性,因此也成为恶意攻击者的热门目标。将高风险的医疗环境与物联网设备的高风险特性结合在一起,意味着安全是至关重要的。然而,尽管人们普遍了解与物联网设备相关的风险,该领域的安全措施仍显得薄弱且基础。2021年,物联网安全项目更是骤降了令人担忧的16%。 ### 第二层:有限的可见性意味着身份验证薄弱 物联网安全始于设备身份验证,以确保只有授权用户才能访问网络。物联网设备不符合802.1x协议,这意味着该身份验证协议并不适用。替代方案包括MACsec和MAB,这两种协议都依赖于设备的MAC地址进行身份验证,使用第二层(Layer 2)数据包来识别该标识。然而,必须创建并维护一个MAC地址数据库;更重要的是,MAC地址很容易被伪造,而且一些设备甚至没有MAC地址,因此MACsec和MAB成为不安全的身份验证协议。这样一来,物联网设备可能会被错误地验证,或者完全绕过验证流程,从而获得网络访问权,使整个系统面临严重风险。从根本上说,这些协议的薄弱点在于可见性;第二层数据不足以识别物联网设备,而医疗机构最担心的问题之一就是他们缺乏对物联网设备进行准确身份验证的可见性。 ### 第一层设备安全:从“可见”开始保障安全 要获得物联网设备的完全可见性,并因此确保可靠的身份验证,必须依靠物理层(第一层,Layer 1设备安全)数据。与依赖流量监控不同,第一层数据信号(如噪声水平、电压、信号时序、电流等)为设备特征的精确识别提供了更大且更深入的洞察。与MAC地址不同,第一层特征无法被更改,也无法通过设备处于被动或带外操作来隐藏。此外,这种可见性可以检测到设备行为的异常,从而识别设备是否被操控。借助对物联网设备的完全可见性,医疗机构可以确保设备的身份验证是准确可靠的,并且后续的授权过程也是如此。通过增强的设备身份验证和授权机制,可以最大限度地降低物联网设备对医疗环境所带来的风险,因为未授权设备无法访问网络,而已授权设备则会被有效管理和控制。 ### 结论 物联网设备的互联性意味着,只要一个漏洞被利用,就可能对医疗运营造成严重破坏——当人类生命受到威胁时,这种风险是无法承受的。唯一确保物联网设备安全并最小化其对医疗环境威胁的方法,就是控制它们的网络访问权限,无论这意味着阻止设备访问,还是对其访问进行限制并严密监控。这种控制始于身份验证,并依赖于完全可见性,而只有深入到第一层(Layer 1)才能实现这一点。 推特 分享 邮件 健康护理 工业4.0 医疗设备 网络与协议 安全 健康护理 工业4.0 医疗设备 网络与协议 安全
您觉得本篇内容如何
评分

评论

您需要登录才可以回复|注册

提交评论

广告
提取码
复制提取码
点击跳转至百度网盘