In recent years, the healthcare industry has felt the impact of non-medical technologies transforming the way we deliver medical care, with one notable development being the use of drones or Unmanned Aerial Vehicles (UAVs) in the sector. The potential applications of drones in healthcare are vast, with one of the most significant being the transportation of medical supplies and equipment to remote or hard-to-reach areas.

Drones can provide timely and efficient delivery of medical supplies, samples, and even organs for transplant. They can also quickly transport medical professionals and patients in emergencies, allowing for rapid response times and potentially saving lives.

However, the security threat to UAVs cannot be ignored. The risks are multifaceted, involving:

  • cybersecurity threats like unauthorized access to control drones
  • data breaches leading to exposure of patient information, and
  • malware attacks that can immobilize the system.
  • Physical risks include potential tampering, vandalism, loss of cargo, and safety risks due to system failures.

These challenges are not exclusive to the healthcare industry but apply to various sectors, such as agriculture, logistics, and defence, where similar risks exist. In healthcare, the stakes are exceptionally high due to the life-saving nature of medical supplies and the time-sensitivity of deliveries.

Given the increasing use of UAVs in healthcare, addressing the security risks associated with their deployment is essential. As a project deliverable, this document by Prof. Andrei Gurtov (Linköping University) explores the potential security threats to UAVs in the Emergency Medical Services (EMS) sector and analyses the associated risks.

The methodology employed includes examining the current state of cybersecurity in UAVs, identifying potential vulnerabilities through a comprehensive analysis of existing literature, and seeking insights to help stakeholders enhance the security of UAVs in the healthcare industry. By understanding these specific challenges,
stakeholders can develop robust risk mitigation strategies.