Teleoperated Surgical Robot Security: Challenges and Solutions

Teleoperated Surgical Robot Security: Challenges and Solutions

Md Abdullah Al Momin, Md Nazmul Islam
Copyright: © 2022 |Pages: 18
ISBN13: 9781799873235|ISBN10: 1799873234|ISBN13 Softcover: 9781799873242|EISBN13: 9781799873259
DOI: 10.4018/978-1-7998-7323-5.ch009
Cite Chapter Cite Chapter

MLA

Al Momin, Md Abdullah, and Md Nazmul Islam. "Teleoperated Surgical Robot Security: Challenges and Solutions." Security, Data Analytics, and Energy-Aware Solutions in the IoT, edited by Xiali Hei, IGI Global, 2022, pp. 143-160. https://doi.org/10.4018/978-1-7998-7323-5.ch009

APA

Al Momin, M. A. & Islam, M. N. (2022). Teleoperated Surgical Robot Security: Challenges and Solutions. In X. Hei (Ed.), Security, Data Analytics, and Energy-Aware Solutions in the IoT (pp. 143-160). IGI Global. https://doi.org/10.4018/978-1-7998-7323-5.ch009

Chicago

Al Momin, Md Abdullah, and Md Nazmul Islam. "Teleoperated Surgical Robot Security: Challenges and Solutions." In Security, Data Analytics, and Energy-Aware Solutions in the IoT, edited by Xiali Hei, 143-160. Hershey, PA: IGI Global, 2022. https://doi.org/10.4018/978-1-7998-7323-5.ch009

Export Reference

Mendeley
Favorite

Abstract

Technology has greatly increased the availability of medical procedures in remote locations that are difficult to access, such as battlefields. Teleoperated surgical robots can be used to perform surgeries on patients over the internet in remote locations. A surgeon can remotely operate the robot to perform a procedure in another room or in a different continent. However, security technology has not yet caught up to these cyber-physical devices. There exist potential cybersecurity attacks on these medical devices that could expose a patient to danger in contrast to traditional surgery. Hence, the security of the system is very important. A malicious actor can gain control of the device and potentially threaten the life of a patient. In this chapter, the authors conduct a survey of potential attack vectors a malicious actor could exploit to deny service to the device, gain control of the device, and steal patient data. Furthermore, after the vulnerability analysis, the authors provide mitigation techniques to limit the risk of these attack vectors.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.