{"id":58234,"date":"2019-07-18T10:36:24","date_gmt":"2019-07-18T14:36:24","guid":{"rendered":"https:\/\/newsroom.carleton.ca\/?post_type=cu_story&#038;p=58234"},"modified":"2025-09-30T11:39:24","modified_gmt":"2025-09-30T15:39:24","slug":"protecting-e-health","status":"publish","type":"cu_story","link":"https:\/\/carleton.ca\/news\/story\/protecting-e-health\/","title":{"rendered":"Carleton Researchers Protect Our E-Health"},"content":{"rendered":"\n<section class=\"w-screen px-6 cu-section cu-section--white ml-offset-center md:px-8 lg:px-14\">\n    <div class=\"space-y-6 cu-max-w-child-max  md:space-y-10 cu-prose-first-last\">\n\n        \n                    \n                    \n            \n    <div class=\"cu-wideimage relative flex items-center justify-center mx-auto px-8 overflow-hidden md:px-16 rounded-xl not-prose  my-6 md:my-12 first:mt-0 bg-opacity-50 bg-cover bg-cu-black-50 pt-24 pb-32 md:pt-28 md:pb-44 lg:pt-36 lg:pb-60 xl:pt-48 xl:pb-72\" style=\"background-image: url(https:\/\/carleton.ca\/news\/wp-content\/uploads\/sites\/162\/e-health-banner-1200x900.jpg); background-position: 50% 50%;\">\n\n                    <div class=\"absolute top-0 w-full h-screen\" style=\"background-color:rgba(0,0,0,0.600);\"><\/div>\n        \n        <div class=\"relative z-[2] max-w-4xl w-full flex flex-col items-center gap-2 cu-wideimage-image cu-zero-first-last\">\n            <header class=\"mx-auto mb-6 text-center text-white cu-pageheader cu-component-updated cu-pageheader--center md:mb-12\">\n\n                                    <h1 class=\"cu-prose-first-last font-semibold mb-2 text-3xl md:text-4xl lg:text-5xl lg:leading-[3.5rem] cu-pageheader--center text-center mx-auto after:left-px\">\n                        Carleton Researchers Protect Our E-Health\n                    <\/h1>\n                \n                            <\/header>\n        <\/div>\n\n                    <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"absolute bottom-0 w-full z-[1]\" fill=\"none\" viewbox=\"0 0 1280 312\">\n                <path fill=\"#fff\" d=\"M26.412 315.608c-.602-.268-6.655-2.412-13.524-4.769a1943.84 1943.84 0 0 1-14.682-5.144l-2.276-.858v-5.358c0-4.876.086-5.358.773-5.09 1.674.643 21.38 5.84 34.646 9.109 14.682 3.59 28.935 6.858 45.936 10.449l9.874 2.089H57.322c-16.4 0-30.31-.16-30.91-.428ZM460.019 315.233c42.974-10.074 75.602-19.88 132.443-39.867 76.16-26.791 152.063-57.709 222.385-90.663 16.7-7.823 21.336-10.074 44.262-21.273 85.004-41.688 134.719-64.193 195.291-88.413 66.55-26.577 145.2-53.584 194.27-66.765C1258.5 5.626 1281.34 0 1282.24 0c.17 0 .34 27.596.34 61.3v61.299l-2.23.375c-84.7 13.718-165.93 35.955-310.736 84.931-46.494 15.753-65.427 22.076-96.166 32.15-9.102 3-24.814 8.198-34.989 11.574-107.543 35.954-153.008 50.422-196.626 62.639l-6.74 1.876-89.126-.054c-78.135-.054-88.782-.161-85.948-.857ZM729.628 312.875c33.229-10.985 69.248-23.523 127.506-44.207 118.705-42.223 164.596-57.709 217.446-73.302 2.62-.75 8.29-2.465 12.67-3.751 56.19-16.772 126.94-33.597 184.17-43.671 5.07-.91 9.66-1.768 10.22-1.875l.94-.161v170.236l-281.28-.054H719.968l9.66-3.215ZM246.864 313.411c-65.041-2.251-143.047-12.11-208.432-26.256-18.375-3.965-41.73-9.538-42.202-10.074-.171-.214-.257-21.38-.214-47.046l.129-46.618 6.654 3.697c57.313 32.043 118.491 56.531 197.699 79.143 40.313 11.521 83.459 18.058 138.669 21.059 15.584.857 65.685.857 81.14 0 33.744-1.876 61.306-4.93 88.396-9.806 6.396-1.126 11.634-1.983 11.722-1.929.255.375-20.48 7.769-30.999 11.038-28.592 8.948-59.288 15.646-91.873 20.147-26.36 3.59-50.015 5.627-78.35 6.698-15.584.59-55.209.59-72.339-.053Z\"><\/path>\n                <path fill=\"#fff\" d=\"M-3.066 295.067 32.06 304.1v9.033H-3.066v-18.066Z\"><\/path>\n            <\/svg>\n            <\/div>\n\n    \n\n    <\/div>\n<\/section>\n\n<p>The rise of e-health has been rapid. At any given moment, millions of medical devices are keeping patients in constant contact with their health care providers.<\/p>\n\n\n\n<p>These devices and the data they generate can provide a 24\/7 record of a patient\u2019s symptoms and vital signs. They make health care more efficient by letting patients know when they need to get to a hospital \u2014 and when they don\u2019t.<\/p>\n\n\n\n<p>But no connected device is ever fully secure, and medical devices are no exception. When hackers infiltrate e-health systems, lives literally hang in the balance.<\/p>\n\n\n\n<p>Carleton cybersecurity researchers are working to ensure that these devices and this data are more secure. <a href=\"https:\/\/carleton.ca\/sce\/\" target=\"_blank\" rel=\"noopener noreferrer\">Systems and Computer Engineering<\/a> Prof. Mohamed Ibnkahla, the NSERC\/Cisco Senior Industrial Research Chair in Sensor Networks for the Internet of Things (IoT), is leading a three-year research project that seeks to identify vulnerabilities in the systems we use to deliver e-health and recommend ways that cyber threats can be mitigated.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full wp-image-58244\"><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"680\" src=\"https:\/\/newsroom.carleton.ca\/wp-content\/uploads\/e-health-mohammed-1200x680.jpg\" alt=\"A closeup of Systems and Computer Engineering Prof. Mohamed Ibnkahla while he speaks about security and e-health.\" class=\"wp-image-58244\" srcset=\"https:\/\/carleton.ca\/news\/wp-content\/uploads\/sites\/162\/e-health-mohammed-1200x680.jpg 1200w, https:\/\/carleton.ca\/news\/wp-content\/uploads\/sites\/162\/e-health-mohammed-1200x680-300x170.jpg 300w, https:\/\/carleton.ca\/news\/wp-content\/uploads\/sites\/162\/e-health-mohammed-1200x680-400x227.jpg 400w, https:\/\/carleton.ca\/news\/wp-content\/uploads\/sites\/162\/e-health-mohammed-1200x680-768x435.jpg 768w, https:\/\/carleton.ca\/news\/wp-content\/uploads\/sites\/162\/e-health-mohammed-1200x680-700x397.jpg 700w, https:\/\/carleton.ca\/news\/wp-content\/uploads\/sites\/162\/e-health-mohammed-1200x680-200x113.jpg 200w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/><figcaption class=\"wp-element-caption\">Prof. Mohamed Ibnkahla<\/figcaption><\/figure>\n\n\n\n<p>\u201cSystem-level Security for IoT-enabled e-Health Systems\u201d is a $2-million project funded through <a href=\"https:\/\/www.canada.ca\/en\/defence-research-development.html\" target=\"_blank\" rel=\"noopener noreferrer\">Defence Research and Development Canada<\/a>\u2019s <a href=\"http:\/\/www.science.gc.ca\/eic\/site\/063.nsf\/eng\/h_5B5BE154.html\" target=\"_blank\" rel=\"noopener noreferrer\">Canadian Safety and Security Program<\/a>. The project has brought Carleton researchers together with partners from the <a href=\"https:\/\/www.cheo.on.ca\/en\/index.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">Children\u2019s Hospital of Eastern Ontario<\/a> (CHEO), <a href=\"https:\/\/www.macadamian.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Macadamian<\/a>, <a href=\"https:\/\/www.canimmunize.ca\/en\/home\" target=\"_blank\" rel=\"noopener noreferrer\">CANImmunize<\/a>, <a href=\"https:\/\/twelvedot.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Twelvedot<\/a> and the <a href=\"https:\/\/nrc.canada.ca\/en\" target=\"_blank\" rel=\"noopener noreferrer\">National Research Council of Canada<\/a>.<\/p>\n\n\n\n<p>\u201cCybersecurity is part of national security,\u201d says Ibnkahla. \u201cE-health is more efficient, but more vulnerable. The threat can be anything. An individual person can be attacked, or the whole system can be attacked. To model the threats, we need to track what\u2019s going on below the surface.\u201d<\/p>\n\n\n\n<h2 id=\"an-integrated-approach-to-e-health-security\" class=\"wp-block-heading\">An Integrated Approach to E-Health Security<\/h2>\n\n\n\n<p>To keep pace with the constant evolution of threats, the research project is seeking to establish ways to continuously monitor the entire system.<\/p>\n\n\n<div class=\"not-prose cu-quote cu-component-spacing\">\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\u201cSecurity has been always been modular or scattered,\u201d says Ibnkahla. \u201cNetwork security, physical devices security, data security and user access to the system: all of these areas have been addressed separately. In this project, we\u2019re assessing gaps in the system, including humans and interactions. Security is not just one fix \u2014 it\u2019s a whole process and procedure.\u201d<\/p>\n<\/blockquote>\n<\/div>\n\n\n<p>Even if a medical device manufacturer has followed every security standard when designing and manufacturing a device, those standards can\u2019t anticipate every possible threat.<\/p>\n\n\n\n<figure class=\"wp-block-gallery has-nested-images columns-3 is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex\">\n\n\n\n<\/figure>\n\n\n\n<p>\u201cWhen the device goes to the external world \u2014 to real life \u2014 it\u2019s a jungle,\u201d Ibnkahla says. \u201cYou put a medical device in a hospital or with a patient and it becomes vulnerable to all types of attacks. A company would not have thought of these particular threats. They designed it according to the standards in a test lab environment, but no one knows what\u2019s going on in this jungle of the IoT. It\u2019s completely unpredictable.\u201d<\/p>\n\n\n\n<h2 id=\"a-multidisciplinary-search-for-solutions\" class=\"wp-block-heading\">A Multidisciplinary Search for Solutions<\/h2>\n\n\n\n<p>The complexity of the problem demands a multidisciplinary approach. Ibnkahla brings expertise in IoT infrastructure, networking and security to the project, and he has teamed up with fellow Systems and Computer Engineering Prof. Jason Jaskolka, who specializes in security assessment, and <a href=\"https:\/\/www.csit.carleton.ca\/\" target=\"_blank\" rel=\"noopener noreferrer\">Information Technology<\/a> Prof. Ashraf Matrawy, who specializes in network security.<\/p>\n\n\n\n<p>In order to secure medical devices, it\u2019s critical to know how health care providers are actually using them. Ibnkahla\u2019s team is working with medical and IT teams from CHEO, e-health software developer Macadamian, medical device app builder CANimmunize and security threat modeling and assessment company Twelvedot.<\/p>\n\n\n\n<p>They\u2019ve been developing ways to monitor the \u201cthreat surface\u201d on a continuous basis, and providing a best-practices guide to help hospitals, clinicians and patients to ensure they\u2019re being cyber safe.<\/p>\n\n\n\n<p>Some of the biggest threats to system security can be relatively easily solved, according to Ibnkahla.<\/p>\n\n\n<div class=\"not-prose cu-quote cu-component-spacing\">\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\u201cNinety per cent of problems can be avoided by simple procedures,\u201d he says. \u201cFor example, don\u2019t leave your device unattended or don\u2019t connect to public WiFi. Many problems can be eliminated by educating people. That can eliminate 90 per cent of the problem.<\/p>\n<\/blockquote>\n<\/div>\n\n\n<p>\u201cThe other 10 per cent is probably out of the control of patients.&nbsp;You can improve security without a large budget. It\u2019s not nothing or everything. Through this project, we\u2019ll try to educate people that you cannot compromise on security and that many security threats can be addressed, even with a small budget.\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The rise of e-health has been rapid. At any given moment, millions of medical devices are keeping patients in constant contact with their health care providers. These devices and the data they generate can provide a 24\/7 record of a patient\u2019s symptoms and vital signs. They make health care more efficient by letting patients know [&hellip;]<\/p>\n","protected":false},"author":410,"featured_media":58237,"template":"","meta":{"_acf_changed":false,"footnotes":"","_links_to":"","_links_to_target":""},"cu_story_type":[54,13,1931],"cu_story_tag":[1918,1925],"class_list":["post-58234","cu_story","type-cu_story","status-publish","has-post-thumbnail","hentry","cu_story_type-health-wellness","cu_story_type-research-discovery","cu_story_type-social-innovation","cu_story_tag-faculty-of-engineering-and-design","cu_story_tag-research"],"acf":{"cu_post_thumbnail":"blueprint"},"_links":{"self":[{"href":"https:\/\/carleton.ca\/news\/wp-json\/wp\/v2\/cu_story\/58234","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/carleton.ca\/news\/wp-json\/wp\/v2\/cu_story"}],"about":[{"href":"https:\/\/carleton.ca\/news\/wp-json\/wp\/v2\/types\/cu_story"}],"author":[{"embeddable":true,"href":"https:\/\/carleton.ca\/news\/wp-json\/wp\/v2\/users\/410"}],"version-history":[{"count":3,"href":"https:\/\/carleton.ca\/news\/wp-json\/wp\/v2\/cu_story\/58234\/revisions"}],"predecessor-version":[{"id":97314,"href":"https:\/\/carleton.ca\/news\/wp-json\/wp\/v2\/cu_story\/58234\/revisions\/97314"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/carleton.ca\/news\/wp-json\/wp\/v2\/media\/58237"}],"wp:attachment":[{"href":"https:\/\/carleton.ca\/news\/wp-json\/wp\/v2\/media?parent=58234"}],"wp:term":[{"taxonomy":"cu_story_type","embeddable":true,"href":"https:\/\/carleton.ca\/news\/wp-json\/wp\/v2\/cu_story_type?post=58234"},{"taxonomy":"cu_story_tag","embeddable":true,"href":"https:\/\/carleton.ca\/news\/wp-json\/wp\/v2\/cu_story_tag?post=58234"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}