Industrial Technology - Linked-in Industrial Technology - Twitter Industrial Technology - News Feed
Latest Issue
Diary and Events

UKIVA Machine Vision Conference



Join us on 15 July 2021 on the MVC Technology Presentation Hub and explore eight online seminar theatres. (more)

PPMA Show 2021

NEC, Birmingham(B40 1NT)

28/09/2021 - 30/09/2021

PPMA Show 2021 will be the UK’s largest ever event dedicated to state-of-the-art processing and (more)

Southern Manufacturing

Farnborough, Hants(GU14 6TQ)

06/10/2021 - 07/10/2021

Southern Manufacturing and Electronics is the most comprehensive annual industrial exhibition in the (more)

Advanced Engineering 2021

NEC Birmingham(B40 1NT)

03/11/2021 - 04/11/2021

Join us in our 12th and most important edition to date, as we invite engineers and management from all (more)

The internet of vulnerable things

The internet of vulnerable things

Every year in Louisville, Kentucky, hackers and security experts gather for DerbyCon. While a get-together of hackers may sound troubling on its own, what’s truly disturbing is what came out of last year’s conference. Medical cyber crime is on the rise, and there are thousands of critical medical devices which can currently be located online and hacked directly, says Rob Phillips, sales and marketing director of Accutronics.

This is alarming for two reasons. First, these accessible and vulnerable medical devices are often of a critical nature, such as MRI scanners and defibrillators. Second, the number of vulnerable systems revealed at DerbyCon totalled around 68,000. As terrifying as that sounds, it’s apparently just a drop in the ocean because this figure isn’t a national or even a global figure. This was in just one healthcare organisation.

Hackers were able to locate these systems through an Internet of Things (IoT) search engine known as Shodan. It was here that security researchers created two “honey pots” – software designed to mimic critical medical devices – which were hacked into 55,416 times in the space of six months.

The rate of cyber attacks on medical devices is already high and the figures are only going to increase. As the medical technology (medtech) industry embraces IoT and increases the uptake of portable and wearable medical devices, more opportunities for cyber crime will present themselves.

With heightened attention and pressure on the medtech industry to exercise better cyber security, it’s important that the hardware itself doesn’t get forgotten. While reducing hacker accessibility to devices will help prevent unexpected and ultimately dangerous failures, there are other ways that medtech can be compromised.

Counterfeit components, for example, can lead to inconsistent and unreliable performance compared to genuine products. In the case of a portable defibrillator, for instance, a fake component that doesn’t meet regulatory standards could pose a serious risk to life.

The humble battery is one such component that is especially vulnerable to counterfeiting. Batteries used in medical devices have to meet such a high standard of regulation that using a cheap copycat can cause serious problems. Professional battery manufacturers design to meet regulation in order to assure quality and reliability, counterfeit manufacturers will not go to such lengths. Fakes may be visual replicas of professional batteries but things like circuitry will be completely different, without appropriate measures taken to protect against problems such as battery swelling or combustion.

Lithium-Ion (Li-Ion) batteries are commonly used both commercially and professionally due to their high energy density. However, as the cells of these batteries become volatile over time, manufacturing requirements vary market to market. For professional applications protection circuits must be used to safeguard against over-charging, over-discharging and over-current.

To fight the fakes, Accutronics works closely with OEMs during initial design and manufacturing stages. By building advanced computer cryptography known as algorithmic security into the battery the medical device is able to recognise the difference between a legitimate battery and a counterfeit. It works by assigning each battery a randomly generated 20-digit authorisation key that is permanently contained on an integrated circuit. The key corresponds to the host medical device and, when the battery is connected, the two perform a set calculation within 100ms.

A medtech OEM can then programme the device to either present a pop-up alert when a counterfeit is detected, or to power down entirely.

While the figures may not be quite as staggering as medical cyber attacks, estimates by research organisation IHS show that over 10 per cent of all global supply chain electronics are counterfeits. As with cyber crime, this percentage is likely to increase as we venture deeper into the web of connectedness that is IoT. The more devices active in a network naturally means an increased likelihood of counterfeit components.

The future of medtech is reliant on bolstered security measures across both software and hardware to ensure that the two sides of the coin can work together harmoniously without risk. Security means more than just protecting your device from external saboteur; it is a promise of performance and reliability for your most vital asset - your patients.


Latest news about Batteries

Additional Information
Text styles