Threat Modeling for Mobile Health SystemsThreat Modeling for Mobile Health Systems Prof. Dr. Norbert Pohlmann - Cyber-Sicherheitsexperten
Threat Modeling for Mobile Health Systems Pohlmann
M. Cagnazzo, M. Hertlein, T. Holz, N. Pohlmann:
Mobile Health (mHealth) is on the rise and it islikely to reduce costs and improve the quality of healthcare.It tightly intersects with the Internet of Things (IoT) andcomes with special challenges in terms of interoperabilityand security. This paper focuses on security challenges andoffers a mitigation solution especially with a focus on au-thentication and encryption for resource constrained devices.It identifies assets in a prototyped mHealth ecosystem andclassifies threats with the STRIDE methodology. Furthermorethe paper identifies associated risk levels using DREAD andoutlines possible mitigation strategies to provide a reasonabletrustworthy environment.
Advances in mobile health (mHealth), respectively IoT-Health, are likely to reduce costs and improve the quality ofhealthcare. Especially with the paradigm shift from inpatientcare towards ambulant and home care, mobile and ubiquitoustechnologies are an inevitable step. The shift is due toincreasing cost pressure, ageing society and shortage ofskilled professionals. Mobile health applications can in-crease access to healthcare, encourage self-management andmaintain treatment. Internet of Things (IoT) devices are usedwithin healthcare systems and form mHealth environments.Wearables with various sensors, for example gyroscopic-,heart rate- or bioimpedance sensors are often deployed inthe Body Area Network (BAN) of the patient. These devicescome with a lot of challenges in terms of interoperability andsecurity which need to be considered and treated seriously.ENISAidentifies ”asset and configuration managementas a relevant technical measure” to prevent attacks . Fur-thermore, this paper addresses a key recommendation from because it conducts risk and vulnerability assessmentfor a mHealth architecture which is deployed in a clinicalcontext. This paper discusses most recent related work inchapter II. Afterwards it introduces current developmentsand background knowledge for mHealth in chapter III-A andthreat modeling in chapter III-B. After this we model thethreats and define assets in chapter IV. We use a STRIDE-based approach to model threats. To assess the associatedrisks for specific threats we use the DREAD model . Atthe end of the paper possible mitigation strategies are dis-cussed in chapter V and conclusions are drawn in chapter VI.