A Smart Cybersecurity Scheme for MIoT Systems: Simulation and Evaluation
DOI:
https://doi.org/10.21015/vtse.v13i1.1965Abstract
Cybersecurity is essential to safeguarding intellectual property, patient information, and other sensitive data from unauthorised access by cybercriminals. As healthcare technology advances, integrating the Medical Internet of Things (MIoT) into smart diagnostic laboratories has become instrumental in enhancing diagnostic accuracy and efficiency in patient care. However, this integration also introduces significant cybersecurity and privacy risks, given the high confidentiality of patient information stored and processed by MIoT systems. Ensuring the security of these systems is critical to maintaining trust and safety in digital health platforms. To address these cybersecurity challenges, this study proposes a smart cybersecurity scheme for MIoT systems. Using the Emulated Virtual Environment for Network Graphing (EVE-NG), we simulate potential cyberattacks targeting diagnostic laboratory software to evaluate the system’s resilience and identify risk levels. This simulation-based approach enables cybersecurity professionals to develop, test, and improve defensive mechanisms in a controlled virtual environment. The proposed cybersecurity scheme is assessed for its effectiveness in mitigating cyber threats within MIoT systems, providing insights into safeguarding sensitive health data, and ensuring reliable diagnostic processes.
References
Razaque, A., & Ghani, F. (2023). Risk Assessment Framework for Cybersecurity in IoT-Based Medical Applications. International Journal of Cyber Security and Digital Forensics, 12(1), 15-29.
Zhang, Y., & Lee, K. (2022). Evaluating Threat Mitigation Techniques for Medical IoT Systems: A Comprehensive Review. Journal of Health Informatics Research, 10(3), 55-73.
Wilson, H., & Dawson, M. (2023). Cybersecurity Vulnerabilities in Diagnostic Laboratories: An MIoT Perspective. Journal of Medical Internet of Things, 9(2), 100-118.
Zhou, L., Chen, J., & Xu, W. (2022). Securing Patient Data in IoT-Based Diagnostic Software: Emerging Trends and Challenges. Computers in Biology and Medicine, 140, 105053.
Gomez, P., & Anand, A. (2023). Simulation-Based Approaches for MIoT Cybersecurity: The Role of EVE-NG in Risk Assessment. Cybersecurity in Healthcare, 7(4), 211-228.
Li, S., Zhao, R., & Hu, B. (2022). Simulation Tools in Cybersecurity for Medical IoT: Comparative Analysis of EVE-NG and GNS3. Journal of Network and Computer Applications, 145, 103072.
Mortensen, E., & Tran, T. (2024). A Comparative Study on Cybersecurity Simulation Tools for Healthcare Applications. Healthcare Informatics and Security, 11(1), 89-106.
Perez, M., & Singh, R. (2023). Vulnerability Detection in Medical IoT Systems Using Nessie: A Case Study. Health Technology Journal, 6(5), 120-135.
Kim, D., & Park, H. (2023). Practical Applications of Nessie for Basic Vulnerability Detection in Healthcare IoT. Journal of Cybersecurity Practices, 9(3), 235-249.
Zhang, Y., & Lee, K. (2022). Evaluating Threat Mitigation Techniques for Medical IoT Systems: A Comprehensive Review. Journal of Health Informatics Research, 10(3), 55-73.
Razaque, A., & Ghani, F. (2023). Risk Assessment Framework for Cybersecurity in IoT-Based Medical Applications. International Journal of Cyber Security and Digital Forensics, 12(1), 15-29.
Zhou, L., Chen, J., & Xu, W. (2022). Securing Patient Data in IoT-Based Diagnostic Software: Emerging Trends and Challenges. Computers in Biology and Medicine, 140, 105053.
Carofiglio, G., & Palazzo, S. (2020). NS-3 Network Simulator for Next-Generation Wireless Networks. IEEE Access, 8, 34612–34621. https://doi.org/10.1109/ACCESS.2020.2969296
Varga, A., & Hornig, R. (2008). An overview of the OMNeT++ simulation environment. Proceedings of the 1st International Conference on Simulation Tools and Techniques for Communications, Networks and Systems & Workshops (Simutools), 1–10. https://doi.org/10.4108/ICST.SIMUTOOLS2008.3027
Lantz, B., Heller, B., & McKeown, N. (2010). A network in a laptop: Rapid prototyping for software-defined networks. Proceedings of the 9th ACM SIGCOMM Workshop on Hot Topics in Networks, 1–6. https://doi.org/10.1145/1868447.1868466
IBM Security. (2018). IBM X-Force Command Cyber Range: A Virtual Environment for Real-World Cybersecurity Training. IBM. Retrieved from https://www.ibm.com/security/xforce
Ahrenholz, J. (2010). Comparison of CORE network emulation platforms. Proceedings - IEEE Military Communications Conference MILCOM, 166–171. https://doi.org/10.1109/MILCOM.2010.5680217
Cuckoo Sandbox. (2021). Cuckoo Sandbox: Open Source Automated Malware Analysis. Retrieved from https://cuckoosandbox.org/
Cisco Networking Academy. (2019). Packet Tracer Instructor’s Guide. Cisco Systems, Inc. Retrieved from https://www.netacad.com/courses/packet-tracer
Rapid7. (2021). Nexpose: Vulnerability Management Solution. Rapid7. Retrieved from https://www.rapid7.com/products/nexpose/
Biondi, P., & Desclaux, F. (2004). Scapy: A Powerful Interactive Packet Manipulation Program. Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC), 371–380. https://doi.org/10.1109/CSAC.2004.42
Maynor, J. (2007). Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research. Syngress. Retrieved from https://www.syngress.com
Panhwar, A. O., Sathio, A. A., Lakhan, A., Umer, M., Mithiani, R. M., & Khan, S. (2022). Plant health detection enabled CNN scheme in IoT network. International Journal of Computing and Digital Systems, 11(1), 344-335.
A. Sathio, "A study on the conceptual framework of data warehousing in the health sector in Pakistan: A case study of a hospital system and disease (Hepatitis C)," Int. J. Comput. (IJC), vol. 29, no. 1, pp. 59–81, Sep. 2018. [Online]. Available: https://www.researchgate.net/publication/324896538
Anwar Ali Sathio and Arz Muhammad Brohi, "The Imperative Role of Pervasive Data in Healthcare," Dr. Mohammad Shahid Husain, Dr. Muhamad Hariz Bin Muhamad Adnan, Dr. Mohammad Zunnun Khan, Dr. Saurabh Shukla, and Fahad U Khan, Eds., Switzerland AG: Springer, Cham, 2021, pp. 17–21. doi: https://doi.org/10.1007/978-3-030-77746-3_2.
Sathio, A. A., Dootio, M. A., Lakhan, A., ur Rehman, M., Pnhwar, A. O., & Sahito, M. A. (2021, August). Pervasive futuristic healthcare and blockchain enabled digital identities-challenges and future intensions. In 2021 International Conference on Computing, Electronics & Communications Engineering (iCCECE) (pp. 30-35). IEEE.
Sathio, A. A., Rind, M. M., & Lakhan, A. (2024). Deep Learning Algorithms: Clustering and Classifications for Multimedia Data. In Deep Learning for Multimedia Processing Applications (pp. 114-145). CRC Press.
Shaikh, Z. A., Wagan, A. A., Laghari, A. A., Ali, K., Memon, M. A., & Sathio, A. A. (2019). The role of software configuration management and capability maturity model in system quality. IJCSNS, 19(11), 114.
Vavekanand, R., Sathio, A. A., Singh, V., & Anwar, S. (2024). Water4. 0: An Industrial Water Pollution Forecasting Using Machine Learning. Available at SSRN 4849924.
Sathio, A. A., Awan, S. A., Panhwar, A. O., Aamir, A. M., Brohi, A. M., & Burdi, A. (2023). A Blockchain-Enabled Machine Learning Mask Detection Method for Prevention of Pandemic Diseases. VAWKUM Transactions on Computer Sciences, 11(1), 165-183.
Sathio, A. A., Rind, M. M., & Lakhan, A. Deep Learning Algorithms and Architectures for Multimodal Data Analysis. In Deep Learning for Multimedia Processing Applications (pp. 74-113). CRC Press.
Singh, V., Sathio, A. A., Anwar, S., Vavekanand, R., & Danish, R. (2024). A Medical Imaging Approach for Recognising Mitral Regurgi-tation Through Machine Learning Methods in Cardiac Imaging.
Shah, H., Ahmed, S., Sathio, A. A., & Burdi, A. (2023). W-rank: A keyphrase extraction method for webpage based on linguistics and DOM-base features. VAWKUM Transactions on Computer Sciences, 11(1), 217-228.
Ali, A. (2021). Implementation of etl tool for data warehousing for non-hodgkin lymphoma (nhl) cancer in public sector, pakistan. LC International Journal of STEM (ISSN: 2708-7123), 2(3), 98-102.
I. Kotenko, I. Saenko, A. Privalov, and O. Lauta, "Ensuring SDN Resilience under the Influence of Cyber Attacks: Combining Methods of Topological Transformation of Stochastic Networks, Markov Processes, and Neural Networks," *Big Data and Cognitive Computing*, vol. 7, no. 2, p. 66, 2023, MDPI.
J. Gomez, E. F. Kfoury, J. Crichigno, and G. Srivastava, "A survey on network simulators, emulators, and testbeds used for research and education," *Computer Networks*, vol. 237, p. 110054, 2023, Elsevier.
S. H. Almotiri, M. Nadeem, M. A. Al Ghamdi, and R. A. Khan, "Analytic review of healthcare software by using quantum computing security techniques," *International Journal of Fuzzy Logic and Intelligent Systems*, vol. 23, no. 3, pp. 336-352, 2023, Korean Institute of Intelligent Systems.
Y. K. Saheed, A. I. Abiodun, S. Misra, M. K. Holone, and R. Colomo-Palacios, "A machine learning-based intrusion detection for detecting internet of things network attacks," *Alexandria Engineering Journal*, vol. 61, no. 12, pp. 9395-9409, 2022, Elsevier.
A. O. Panhwar, A. A. Sathio, N. M. Shah, and S. Memon, "A scheme based on deep learning for fruit classification," *Mehran University Research Journal of Engineering and Technology*, vol. 44, no. 1, pp. 8-19, 2025, Mehran University of Engineering & Technology, Jamshoro.
Downloads
Published
How to Cite
Issue
Section
License
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License (CC-By) that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
This work is licensed under a Creative Commons Attribution License CC BY