메뉴 건너뛰기




Volumn 1, Issue 2, 2010, Pages 16-27

Interoperable medical devices: Communication security issues

Author keywords

[No Author keywords available]

Indexed keywords


EID: 81155138997     PISSN: 21542287     EISSN: None     Source Type: Journal    
DOI: 10.1109/MPUL.2010.937905     Document Type: Article
Times cited : (26)

References (40)
  • 1
    • 81155136708 scopus 로고    scopus 로고
    • BodyMedia [Online], Available
    • BodyMedia [Online]. Available: http://www.bodymedia.com/
  • 2
    • 81155154604 scopus 로고    scopus 로고
    • Cybersecurity for networked medical devices containing offthe- shelf (OTS) software [Online]. Available:
    • Cybersecurity for networked medical devices containing offthe- shelf (OTS) software [Online]. Available: http://www.fda. gov/cdrh/comp/guidance/1553. html
  • 3
    • 81155136711 scopus 로고    scopus 로고
    • Medical devices "plug-n-play" interoperability program [Online]. Available
    • Medical devices "plug-n-play" interoperability program [Online]. Available: http://mdpnp.org/
  • 4
    • 81155136713 scopus 로고    scopus 로고
    • Medtronics Inc. [Online], Available
    • Medtronics Inc. [Online]. Available: http://www.medtronic.com/your- health/bradycardia/device/
  • 8
    • 33749416259 scopus 로고    scopus 로고
    • Usability for medical devices
    • DOI 10.1109/PSES.2005.1529517, 1529517, 2005 IEEE Symposium on Product Safety Engineering
    • S. Braun, "Usability for medical devices ," in Proc. 2005 IEEE Symp. Product Safety Engineering, Oct. 2005, pp. 16-22 . (Pubitemid 44499834)
    • (2005) 2005 IEEE Symposium on Product Safety Engineering , vol.2005 , pp. 16-22
    • Braun, S.1
  • 9
    • 0025386404 scopus 로고
    • A logic of authentication
    • M. Burrows and R. Needham, "A logic of authentication ," ACM Trans. Comput. Syst., vol. 8, no. 1, pp. 18-36, 1990 .
    • (1990) ACM Trans. Comput. Syst. , vol.8 , Issue.1 , pp. 18-36
    • Burrows, M.1    Needham, R.2
  • 10
    • 33645994181 scopus 로고    scopus 로고
    • Ensuring patient safety in wireless medical device networks
    • Apr
    • V. Cehlot and E. B. Sloane, "Ensuring patient safety in wireless medical device networks ," Computer, vol. 39, no. 4, pp. 54-60, Apr. 2006 .
    • (2006) Computer , vol.39 , Issue.4 , pp. 54-60
    • Cehlot, V.1    Sloane, E.B.2
  • 12
    • 4043138710 scopus 로고    scopus 로고
    • Medical and information technologies converge
    • DOI 10.1109/MEMB.2004.1317983
    • T. Cohen, "Medical and information technologies converge ," IEEE Eng. Med. Biol. Mag., vol. 23, no. 3, pp. 59-65, May-June 2004. (Pubitemid 39078915)
    • (2004) IEEE Engineering in Medicine and Biology Magazine , vol.23 , Issue.3 , pp. 59-65
    • Cohen, T.1
  • 13
    • 33751024861 scopus 로고    scopus 로고
    • A logic for constraint-based security protocol analysis
    • DOI 10.1109/SP.2006.3, 1624009, Proceedings - 2006 IEEE Symposium on Security and Privacy, S+P 2006
    • R. Corin and A. Saptawijaya, "A logic for constraint-based security protocol analysis ," in Proc. IEEE Symp. Security and Privacy, May 2006, pp. 155-168 . (Pubitemid 44753720)
    • (2006) Proceedings - IEEE Symposium on Security and Privacy , vol.2006 , pp. 155-168
    • Corin, R.1    Saptawijaya, A.2    Etalle, S.3
  • 17
    • 7044274523 scopus 로고    scopus 로고
    • Security: A new clinical engineering paradigm
    • July-Aug
    • S. L. Grimes, "Security: A new clinical engineering paradigm ," IEEE Eng. Med. Biol. Mag., vol. 23, no. 4, pp. 80-82, July-Aug. 2004.
    • (2004) IEEE Eng. Med. Biol. Mag. , vol.23 , Issue.4 , pp. 80-82
    • Grimes, S.L.1
  • 20
    • 2142821517 scopus 로고    scopus 로고
    • The Health Insurance Portability and Accountability Act privacy rule: A practical guide for researchers
    • P. P. Gunn, A. M. Fremont, M. Bottrell, L. R. Shugarman, J. Galegher, and T. Bikson, "The Health Insurance Portability and Accountability Act privacy rule: A practical guide for researchers," Med. Care, vol. 42, no. 4, pp. 321-327.
    • Med. Care , vol.42 , Issue.4 , pp. 321-327
    • Gunn, P.P.1    Fremont, A.M.2    Bottrell, M.3    Shugarman, L.R.4    Galegher, J.5    Bikson, T.6
  • 21
    • 38449083694 scopus 로고    scopus 로고
    • Accessibility and usability guidelines for mobile devices in home health monitoring
    • Jan
    • R. Hubert, "Accessibility and usability guidelines for mobile devices in home health monitoring ," SIGACCESS Access. Comput., no. 84, pp. 26-29, Jan. 2006 .
    • (2006) SIGACCESS Access. Comput. , Issue.84 , pp. 26-29
    • Hubert, R.1
  • 22
    • 0141571131 scopus 로고    scopus 로고
    • Using usability heuristics to evaluate patient safety of medical devices
    • DOI 10.1016/S1532-0464(03)00060-1
    • J. Zhang, T. R. Johnson, V. L. Patel, D. L. Paigec, and T. Kubose, "Using usability heuristics to evaluate patient safety of medical devices," J. Biomed. Inform., vol. 36, no. 12, pp. 23-30, Feb.- Apr. 2003. (Pubitemid 37206388)
    • (2003) Journal of Biomedical Informatics , vol.36 , Issue.1-2 , pp. 23-30
    • Zhang, J.1    Johnson, T.R.2    Patel, V.L.3    Paige, D.L.4    Kubose, T.5
  • 23
    • 34247491209 scopus 로고    scopus 로고
    • A formal approach to pre-market review for medical device software
    • DOI 10.1109/COMPSAC.2006.9, 4020075, Proceedings - 30th Annual International Computer Software and Applications Conference, COMPSAC 2006
    • R. Jetley, S. P. Iyer, P. L. Jones, and W. Spees, "A formal approach to pre-market review for medical device software ," in Proc. 30th Annu. Int. Computer Software and Applications Conf. (COMPSAC'06), Washington, DC, 2006, pp. 169-177 . (Pubitemid 46661646)
    • (2006) Proceedings - International Computer Software and Applications Conference , vol.1 , pp. 169-177
    • Jetley, R.1    Purushothaman Iyer, S.2    Jones, P.L.3    Spees, W.4
  • 25
    • 84942426861 scopus 로고    scopus 로고
    • Secure routing in wireless sensor networks: Attacks and countermeasures
    • May
    • C. Karlof and D. Wagner, "Secure routing in wireless sensor networks: Attacks and countermeasures ," in Proc. IEEE 38th Int. Conf. Communication, May 2003, pp. 113-127 .
    • (2003) Proc. IEEE 38th Int. Conf. Communication , pp. 113-127
    • Karlof, C.1    Wagner, D.2
  • 30
    • 40649108378 scopus 로고    scopus 로고
    • Emerging technologies: Wireless communication systems for implantable medical devices
    • DOI 10.1109/EMB.2008.915488
    • D. Panescu, "Emerging technologies [wireless communication systems for implantable medical devices] ," IEEE Eng. Med. Biol. Mag., vol. 27, no. 2, pp. 96-101, Mar.-Apr. 2008 . (Pubitemid 351374193)
    • (2008) IEEE Engineering in Medicine and Biology Magazine , vol.27 , Issue.2 , pp. 96-101
    • Panescu, D.1
  • 31
    • 0036738266 scopus 로고    scopus 로고
    • SPINS: Security protocol for sensor networks
    • Sept
    • A. Perrig, R. Szewczyk, V. Wen, D. Culler, and D. Tygar, "SPINS: Security protocol for sensor networks ," Wireless Netw., vol. 8, no. 5, pp. 521-534, Sept. 2002 .
    • (2002) Wireless Netw. , vol.8 , Issue.5 , pp. 521-534
    • Perrig, A.1    Szewczyk, R.2    Wen, V.3    Culler, D.4    Tygar, D.5
  • 32
  • 33
    • 2442701417 scopus 로고    scopus 로고
    • The case for integrating public health informatics networks
    • DOI 10.1109/MEMB.2004.1297178
    • N. L. Snee and K. A. McCormick, "The case for integrating public health informatics networks ," IEEE Eng. Med. Biol. Mag., vol. 23, no. 1, pp. 81-88, Jan.-Feb. 2004 . (Pubitemid 38667849)
    • (2004) IEEE Engineering in Medicine and Biology Magazine , vol.23 , Issue.1 , pp. 81-88
    • Snee, N.L.1    McCormick, K.A.2
  • 34
    • 0001831930 scopus 로고    scopus 로고
    • The resurrecting duckling: Security issues for ad-hoc wireless networks
    • F. Stajano and R. Anderson, "The resurrecting duckling: Security issues for ad-hoc wireless networks ," in Proc. 7th Int. Workshop Security Protocols, 1999, pp. 172-194 .
    • (1999) Proc. 7th Int. Workshop Security Protocols , pp. 172-194
    • Stajano, F.1    Anderson, R.2
  • 37
    • 76849098534 scopus 로고    scopus 로고
    • Pska: Usable and secure key agreement scheme for body area networks
    • (Special Issue on Wireless Health), Jan
    • K. Venkatasubramanian, A. Banerjee, and S. K. S. Gupta, "Pska: Usable and secure key agreement scheme for body area networks ," IEEE Trans. Inform. Technol. Biomed. (Special Issue on Wireless Health), vol. 14, no. 1, pp. 60-68, Jan. 2010 .
    • (2010) IEEE Trans. Inform. Technol. Biomed. , vol.14 , Issue.1 , pp. 60-68
    • Venkatasubramanian, K.1    Banerjee, A.2    Gupta, S.K.S.3
  • 38
    • 77954990804 scopus 로고    scopus 로고
    • Physiological value based efficient usable security solutions for body sensor networks
    • K. Venkatasubramanian and S. K. S. Gupta, "Physiological value based efficient usable security solutions for body sensor networks ," ACM Trans. Sensor Networks, vol. 6, no. 4, pp. 1-36, 2010 .
    • (2010) ACM Trans. Sensor Networks , vol.6 , Issue.4 , pp. 1-36
    • Venkatasubramanian, K.1    Gupta, S.K.S.2
  • 39
    • 81155136703 scopus 로고    scopus 로고
    • Caac- An adaptive and proactive access control approach for emergencies for smart infrastructures
    • (Special Issue on Adaptive Security), to be published
    • K. Venkatasubramanian, T. Mukherjee, and S. K. S. Gupta, "Caac- An adaptive and proactive access control approach for emergencies for smart infrastructures ," ACM Trans. Autonom. Adaptive Syst. (Special Issue on Adaptive Security), to be published .
    • ACM Trans. Autonom. Adaptive Syst.
    • Venkatasubramanian, K.1    Mukherjee, T.2    Gupta, S.K.S.3
  • 40
    • 33847120377 scopus 로고    scopus 로고
    • LEAP+: Efficient security mechanisms for large-scale distributed sensor networks
    • DOI 10.1145/1218556.1218559
    • S. Zhu, S. Setia, and S. Jajodia, "LEAP+: Efficient security mechanisms for large-scale distributed sensor networks ," ACM Trans. Sensor Networks, vol. 2, no. 4, pp. 500-528, Nov. 2006 . (Pubitemid 46278640)
    • (2006) ACM Transactions on Sensor Networks , vol.2 , Issue.4 , pp. 500-528
    • Zhu, S.1    Setia, S.2    Jajodia, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.