Skip to main content
. 2021 Oct 17;21(20):6886. doi: 10.3390/s21206886

Table 13.

Summary and classification of security attacks in smart healthcare systems.

Attack Target Actor Nature Origin Launch
Method
TCP/IP Layer Requirements
Threats
Node capture Nodes Active External Physical Network interface Confidentiality
Non-repudiation
Authentication
Privacy
False data
injection
Nodes Active Internal Physical Network
interface
Integrity
Sleep deprivation Nodes Active External Physical
Logical
Network interface Availability
Side-channel Nodes Passive
Active
External Side-channel Network interface Confidentiality
Availability
Firmware update Nodes Active External Logical Network interface Confidentiality
Non-repudiation
Authentication
Authorisation
Eavesdropping Communications Passive External Logical Network
interface
Network
Confidentiality
Privacy
Data tampering Communications Active Internal Physical Network
interface
Integrity
Replay Communications Active Internal Physical Network Integrity
Authentication
Authorisation
Spoofing Communications Active Internal
External
Physical Network
interface
Network
Transport
Application
Integrity
Man-in-the-middle Communications Active Internal
External
Logical Network
Transport
Confidentiality
Integrity
Authentication
Privacy
Flooding Communications Active Internal
External
Logical Network
Transport
Application
Availability
Jamming Communications Active External Physical Network
interface
Availability
Black hole Communications Active Internal Physical Network Availability
Malware HIS
Nodes
Active External Logical Application Confidentiality
Integrity
Availability
Non-repudiation
Authentication
Authorisation
Privacy
Data leakage HIS Passive External Logical Application Confidentiality
Privacy
Phishing Users Active External Logical Application Confidentiality
Authentication
Authorisation
Privacy