메뉴 건너뛰기




Volumn , Issue , 2008, Pages

Threat assessment of wireless patient monitoring systems

Author keywords

Biomealcal sensor networks; Healthcare; Patient monitoring; Security; Threat assessment; Wireless

Indexed keywords

BIOSENSORS; COMMUNICATION; MONITORING; PATIENT MONITORING; SECURITY OF DATA; SENSOR NETWORKS; SENSORS; TECHNOLOGY; TELECOMMUNICATION; TELECOMMUNICATION EQUIPMENT;

EID: 49149115890     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICTTA.2008.4530274     Document Type: Conference Paper
Times cited : (11)

References (17)
  • 1
    • 1842815887 scopus 로고    scopus 로고
    • Security in mobile ad hoc networks: Challenges and solutions
    • H. Yang, H. Luo, S. Ye, S. Lu, L. Zhang: "Security in mobile ad hoc networks: Challenges and solutions", IEEE Wireless Communications, 11(1), pp. 38-47, 2004.
    • (2004) IEEE Wireless Communications , vol.11 , Issue.1 , pp. 38-47
    • Yang, H.1    Luo, H.2    Ye, S.3    Lu, S.4    Zhang, L.5
  • 3
    • 10644233142 scopus 로고    scopus 로고
    • Introduction to the special section on M-Health: Beyond seamless mobility and global wireless health-care connectivity
    • R.S.H. Istepanian, E. Jovanov, Y.T. Zhang: "Introduction to the special section on M-Health: Beyond seamless mobility and global wireless health-care connectivity", IEEE Transactions on Information Technology in Biomedicine, 8(4), pp. 405414,2004.
    • (2004) IEEE Transactions on Information Technology in Biomedicine , vol.8 , Issue.4 , pp. 405414
    • Istepanian, R.S.H.1    Jovanov, E.2    Zhang, Y.T.3
  • 5
    • 49149127071 scopus 로고    scopus 로고
    • R. Arnesen, J. Danielson, I. Vestgården, J. Ølnes: Wireless Health & Care security architecture, NR Report No. 1006, Norsk Regnesentral, 2005.
    • R. Arnesen, J. Danielson, I. Vestgården, J. Ølnes: "Wireless Health & Care security architecture", NR Report No. 1006, Norsk Regnesentral, 2005.
  • 7
    • 49149106575 scopus 로고    scopus 로고
    • P. Rae, J. Øles, A. Larsen, I. Balasingham, K. Øyri: Wireless Health & Care security architecture - the wireless instrumentation demonstrator WiSMoS, Research Note DART/07/05, Norsk Regnesentral, 2005.
    • P. Rae, J. Øles, A. Larsen, I. Balasingham, K. Øyri: "Wireless Health & Care security architecture - the wireless instrumentation demonstrator WiSMoS", Research Note DART/07/05, Norsk Regnesentral, 2005.
  • 10
    • 49149126558 scopus 로고    scopus 로고
    • Balasingham, Ilangko; Kyas, Marcel; Leister, Wolfgang; Liang, Xuedong; Ostvold, Bjarte M.; Rossum, Anne van; Salden, Alfons; Steffen, Martin; Valk, Jeroen M.: Deliverable D6.1 - User driven requirements, CREDO, Project number 33826, funded by the European Commission, 2007.
    • Balasingham, Ilangko; Kyas, Marcel; Leister, Wolfgang; Liang, Xuedong; Ostvold, Bjarte M.; Rossum, Anne van; Salden, Alfons; Steffen, Martin; Valk, Jeroen M.: "Deliverable D6.1 - User driven requirements", CREDO, Project number 33826, funded by the European Commission, 2007.
  • 11
    • 49149096986 scopus 로고    scopus 로고
    • R. Arnesen, J. Danielsson, J. Vestgården, J. Ølnes: Wireless Health & Care security requirements, Research Note DART/01/05, Norsk Regnesentral, 2005.
    • R. Arnesen, J. Danielsson, J. Vestgården, J. Ølnes: "Wireless Health & Care security requirements", Research Note DART/01/05, Norsk Regnesentral, 2005.
  • 12
    • 0041973497 scopus 로고    scopus 로고
    • Packet Leashes: "A defense against wormhole attacks in wireless ad hoc networks", Proc
    • Y. Hu, A. Perrig, D. Johnson: Packet Leashes: "A defense against wormhole attacks in wireless ad hoc networks", Proc. INFOCOM, 2003.
    • INFOCOM, 2003
    • Hu, Y.1    Perrig, A.2    Johnson, D.3
  • 13
    • 1542317831 scopus 로고    scopus 로고
    • Y. Hu, A. Perrig, D. Johnson: Rushing attacks and defense in wireless ad hoc network routing protocols, Proc. WISE, 2003.
    • Y. Hu, A. Perrig, D. Johnson: "Rushing attacks and defense in wireless ad hoc network routing protocols", Proc. WISE, 2003.
  • 14
    • 11244326497 scopus 로고    scopus 로고
    • The sybil attack in sensor networks: Analysis and defenses
    • J. Newsome, E. Shi, D. Song, A. Perrig: "The sybil attack in sensor networks: analysis and defenses", Proc. IPSN, 2004.
    • (2004) Proc. IPSN
    • Newsome, J.1    Shi, E.2    Song, D.3    Perrig, A.4
  • 16
    • 49149128749 scopus 로고    scopus 로고
    • C. Karlof, D. Wagner: Secure routing in sensor networks: attacks and countermeasures, Proc. SNPA, 2003
    • C. Karlof, D. Wagner: "Secure routing in sensor networks: attacks and countermeasures", Proc. SNPA, 2003
  • 17
    • 11244264140 scopus 로고    scopus 로고
    • L. Lazos, R. Poovendran: SeRLoc: Secure range-independent localization for wireless sensor networks, ACM Workshop on Wireless Security, 2004.
    • L. Lazos, R. Poovendran: SeRLoc: "Secure range-independent localization for wireless sensor networks", ACM Workshop on Wireless Security, 2004.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.