메뉴 건너뛰기




Volumn , Issue , 2013, Pages

Towards trustworthy medical devices and body area networks

Author keywords

[No Author keywords available]

Indexed keywords

BODY AREA NETWORK; CATASTROPHIC CONSEQUENCES; FUNCTIONAL COMPLEXITY; HARDWARE FAILURES; MEDICAL CONDITIONS; POTENTIAL THREATS; SIDE CHANNEL ATTACK; WEARABLE MEDICAL DEVICES;

EID: 84879854202     PISSN: 0738100X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2463209.2488751     Document Type: Conference Paper
Times cited : (22)

References (49)
  • 3
    • 80053946151 scopus 로고    scopus 로고
    • Intel Health Guide, 2011. http://www.careinnovations.com/products/ healthguide.
    • (2011) Intel Health Guide
  • 7
    • 67549101202 scopus 로고    scopus 로고
    • Analysis and design of a hardware/software trusted platform module for embedded systems
    • 8:1-8:31, Jan.
    • N. Aaraj, A. Raghunathan, and N. K. Jha. Analysis and design of a hardware/software trusted platform module for embedded systems. ACM Trans. Embed. Comput. Syst., 8:8:1-8:31, Jan. 2009.
    • (2009) ACM Trans. Embed. Comput. Syst. , vol.8
    • Aaraj, N.1    Raghunathan, A.2    Jha, N.K.3
  • 11
    • 67651113733 scopus 로고    scopus 로고
    • Human-centric connectivity enabled by body-coupled communications
    • Jun.
    • H. Baldus, S. Corroy, A. Fazzi, K. Klabunde, and T. Schenk. Human-centric connectivity enabled by body-coupled communications. IEEE Comm. Mag., 47:172-178, Jun. 2009.
    • (2009) IEEE Comm. Mag. , vol.47 , pp. 172-178
    • Baldus, H.1    Corroy, S.2    Fazzi, A.3    Klabunde, K.4    Schenk, T.5
  • 14
    • 77953972283 scopus 로고    scopus 로고
    • Absence makes the heart grow fonder: New directions for implantable medical device security
    • Jul.
    • T. Denning, K. Fu, and T. Kohno. Absence makes the heart grow fonder: New directions for implantable medical device security. In Proc. Conf. Hot Topics in Security, pages 1-7, Jul. 2008.
    • (2008) Proc. Conf. Hot Topics in Security , pp. 1-7
    • Denning, T.1    Fu, K.2    Kohno, T.3
  • 15
    • 33645712892 scopus 로고    scopus 로고
    • Compressed sensing
    • Apr.
    • D. Donoho. Compressed sensing. IEEE Trans. Information Theory, 52(4):1289-1306, Apr. 2006.
    • (2006) IEEE Trans. Information Theory , vol.52 , Issue.4 , pp. 1289-1306
    • Donoho, D.1
  • 18
    • 79951477401 scopus 로고    scopus 로고
    • Eavesdropping attacks on high-frequency rfid tokens
    • Jul.
    • G. P. Hancke and S. C. Centre. Eavesdropping attacks on high-frequency RFID tokens. In Proc. Workshop RFID Security, pages 100-113, Jul. 2008.
    • (2008) Proc. Workshop RFID Security , pp. 100-113
    • Hancke, G.P.1    Centre, S.C.2
  • 20
    • 0035880664 scopus 로고    scopus 로고
    • Pacemaker systems as implantable cardiac rhythm monitors
    • Aug.
    • C. Israel and S. Barold. Pacemaker systems as implantable cardiac rhythm monitors. American J. Cardiology, 88(4):442-445, Aug. 2001.
    • (2001) American J. Cardiology , vol.88 , Issue.4 , pp. 442-445
    • Israel, C.1    Barold, S.2
  • 26
    • 36249007065 scopus 로고    scopus 로고
    • A wireless power interface for rechargeable battery operated medical implants
    • Oct.
    • P. Li and R. Bashirullah. A wireless power interface for rechargeable battery operated medical implants. IEEE Trans. Circuits and Systems, 54(10):912-916, Oct. 2007.
    • (2007) IEEE Trans. Circuits and Systems , vol.54 , Issue.10 , pp. 912-916
    • Li, P.1    Bashirullah, R.2
  • 27
    • 77954817369 scopus 로고    scopus 로고
    • A low overhead DPA countermeasure circuit based on ring oscillators
    • Jul.
    • P.-C. Liu, H.-C. Chang, and C.-Y. Lee. A low overhead DPA countermeasure circuit based on ring oscillators. IEEE Trans. Circuits and Systems, 57:546-550, Jul. 2010.
    • (2010) IEEE Trans. Circuits and Systems , vol.57 , pp. 546-550
    • Liu, P.-C.1    Chang, H.-C.2    Lee, C.-Y.3
  • 28
    • 4544296705 scopus 로고
    • The use of triple-modular redundancy to improve computer reliability
    • Apr.
    • R. E. Lyons and W. Vanderkulk. The use of triple-modular redundancy to improve computer reliability. IBM J. Res. Dev., 6:200-209, Apr. 1962.
    • (1962) IBM J. Res. Dev. , vol.6 , pp. 200-209
    • Lyons, R.E.1    Vanderkulk, W.2
  • 30
    • 51649122440 scopus 로고    scopus 로고
    • Energy harvesting from human and machine motion for wireless electronic devices
    • Sep.
    • P. D. Mitcheson, E. M. Yeatman, G. K. Rao, A. S. Holmes, and T. C. Green. Energy harvesting from human and machine motion for wireless electronic devices. Proc. IEEE, 96(9):1457-1486, Sep. 2008.
    • (2008) Proc. IEEE , vol.96 , Issue.9 , pp. 1457-1486
    • Mitcheson, P.D.1    Yeatman, E.M.2    Rao, G.K.3    Holmes, A.S.4    Green, T.C.5
  • 31
    • 77955998321 scopus 로고    scopus 로고
    • Ieee 802.11-01/610r02: 802.1.x and 802.11 key interactions
    • T. Moore. IEEE 802.11-01/610r02: 802.1.x and 802.11 key interactions. Technical report, Microsoft Research, 2001.
    • (2001) Technical Report, Microsoft Research
    • Moore, T.1
  • 32
    • 0022721282 scopus 로고
    • A review of fault-tolerant techniques for the enhancement of integrated circuit yield
    • May
    • W. R. Moore. A review of fault-tolerant techniques for the enhancement of integrated circuit yield. Proc. IEEE, 74(5):684-698, May 1986.
    • (1986) Proc. IEEE , vol.74 , Issue.5 , pp. 684-698
    • Moore, W.R.1
  • 33
    • 51849112476 scopus 로고    scopus 로고
    • Protection circuit against differential power analysis attacks for smart cards
    • Nov.
    • R. Muresan and S. Gregori. Protection circuit against differential power analysis attacks for smart cards. IEEE Trans. Comput., 57:1540-1549, Nov. 2008.
    • (2008) IEEE Trans. Comput. , vol.57 , pp. 1540-1549
    • Muresan, R.1    Gregori, S.2
  • 35
    • 84885876349 scopus 로고    scopus 로고
    • Hacking medical devices for fun and insulin: Breaking the human scada system
    • July-Aug.
    • J. Radcliffe. Hacking medical devices for fun and insulin: Breaking the human SCADA System. In Proc. Black Hat Technical Security Conf., July-Aug. 2011.
    • (2011) Proc. Black Hat Technical Security Conf.
    • Radcliffe, J.1
  • 36
    • 0016829070 scopus 로고
    • System structure for software fault tolerance
    • Apr.
    • B. Randell. System structure for software fault tolerance. SIGPLAN Not., 10:437-449, Apr. 1975.
    • (1975) SIGPLAN Not , vol.10 , pp. 437-449
    • Randell, B.1
  • 39
    • 27544452115 scopus 로고    scopus 로고
    • Mics transceivers: Regulatory standards and applications
    • Apr.
    • H. S. Savci, A. Sula, Z. Wang, N. S. Dogan, and E. Arvas. MICS transceivers: Regulatory standards and applications. Proc. IEEE, pages 179-182, Apr. 2005.
    • (2005) Proc. IEEE , pp. 179-182
    • Savci, H.S.1    Sula, A.2    Wang, Z.3    Dogan, N.S.4    Arvas, E.5
  • 40
    • 78650220913 scopus 로고    scopus 로고
    • Security that is meant to be skin deep: Using ultraviolet micropigmentation to store emergency-access keys for implantable medical devices
    • Apr.
    • S. Schechter. Security that is meant to be skin deep: Using ultraviolet micropigmentation to store emergency-access keys for implantable medical devices. Technical Report MSR-TR-2010-33, Microsoft Research, Apr. 2010.
    • (2010) Technical Report MSR-TR-2010-33, Microsoft Research
    • Schechter, S.1
  • 41
    • 0033293553 scopus 로고    scopus 로고
    • Building a high-performance, programmable secure coprocessor
    • Apr.
    • S. W. Smith and S. Weingart. Building a high-performance, programmable secure coprocessor. Comput. Netw., 31:831-860, Apr. 1999.
    • (1999) Comput. Netw. , vol.31 , pp. 831-860
    • Smith, S.W.1    Weingart, S.2
  • 44
    • 17644417528 scopus 로고    scopus 로고
    • Charge recycling sense amplifier based logic: Securing low power security ics against dpa
    • K. Tiri and I. Verbauwhede. Charge recycling sense amplifier based logic: Securing low power security ICs against DPA. In Proc. European Solid-State Circuits Conf., pages 179-182, 2004.
    • (2004) Proc. European Solid-State Circuits Conf. , pp. 179-182
    • Tiri, K.1    Verbauwhede, I.2
  • 46
    • 79960873920 scopus 로고    scopus 로고
    • Imdguard: Securing implantable medical devices with the external wearable guardian
    • Apr.
    • F. Xu, Z. Qin, C. C. Tan, B. Wang, and Q. Li. IMDGuard: Securing implantable medical devices with the external wearable guardian. In Proc. IEEE Int. Conf. Computer Communications, pages 1862-1870, Apr. 2011.
    • (2011) Proc. IEEE Int. Conf. Computer Communications , pp. 1862-1870
    • Xu, F.1    Qin, Z.2    Tan, C.C.3    Wang, B.4    Li, Q.5
  • 47
    • 80052017643 scopus 로고    scopus 로고
    • Finfet-based power management for improved dpa resistance with low overhead
    • 10:1-10:16, Aug.
    • M. Zhang and N. K. Jha. FinFET-based power management for improved DPA resistance with low overhead. ACM J. Emerg. Technol. Comput. Syst., 7(3):10:1-10:16, Aug. 2011.
    • (2011) ACM J. Emerg. Technol. Comput. Syst. , vol.7 , Issue.3
    • Zhang, M.1    Jha, N.K.2
  • 49
    • 84879867975 scopus 로고    scopus 로고
    • Medmon: Securing medical devices through wireless monitoring and anomaly detection
    • accepted for publication in
    • M. Zhang, A. Raghunathan, and N. K. Jha. MedMon: Securing medical devices through wireless monitoring and anomaly detection. accepted for publication in IEEE Trans. Biomedical Circuits and Systems.
    • IEEE Trans. Biomedical Circuits and Systems
    • Zhang, M.1    Raghunathan, A.2    Jha, N.K.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.