Table 13.
Summary and classification of security attacks in smart healthcare systems.
| Attack | Target Actor | Nature | Origin | Launch Method |
TCP/IP Layer | Requirements Threats |
|---|---|---|---|---|---|---|
| Node capture | Nodes | Active | External | Physical | Network interface | Confidentiality Non-repudiation Authentication Privacy |
| False data injection |
Nodes | Active | Internal | Physical | Network interface |
Integrity |
| Sleep deprivation | Nodes | Active | External | Physical Logical |
Network interface | Availability |
| Side-channel | Nodes | Passive Active |
External | Side-channel | Network interface | Confidentiality Availability |
| Firmware update | Nodes | Active | External | Logical | Network interface | Confidentiality Non-repudiation Authentication Authorisation |
| Eavesdropping | Communications | Passive | External | Logical | Network interface Network |
Confidentiality Privacy |
| Data tampering | Communications | Active | Internal | Physical | Network interface |
Integrity |
| Replay | Communications | Active | Internal | Physical | Network | Integrity Authentication Authorisation |
| Spoofing | Communications | Active | Internal External |
Physical | Network interface Network Transport Application |
Integrity |
| Man-in-the-middle | Communications | Active | Internal External |
Logical | Network Transport |
Confidentiality Integrity Authentication Privacy |
| Flooding | Communications | Active | Internal External |
Logical | Network Transport Application |
Availability |
| Jamming | Communications | Active | External | Physical | Network interface |
Availability |
| Black hole | Communications | Active | Internal | Physical | Network | Availability |
| Malware | HIS Nodes |
Active | External | Logical | Application | Confidentiality Integrity Availability Non-repudiation Authentication Authorisation Privacy |
| Data leakage | HIS | Passive | External | Logical | Application | Confidentiality Privacy |
| Phishing | Users | Active | External | Logical | Application | Confidentiality Authentication Authorisation Privacy |