메뉴 건너뛰기




Volumn , Issue , 2013, Pages

Balancing security and utility in medical devices?

Author keywords

IMD security; Implantable medical devices

Indexed keywords

ACCESS-CONTROL MECHANISMS; BODYAREA NETWORKS (BAN); COMPUTATIONAL CAPABILITY; IMD SECURITY; IMPLANTABLE MEDICAL DEVICES; MEDICAL INTERVENTION; MONITORING AND CONTROL; WIRELESS CONNECTIVITIES;

EID: 84879868277     PISSN: 0738100X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2463209.2488750     Document Type: Conference Paper
Times cited : (61)

References (39)
  • 2
    • 23944466429 scopus 로고    scopus 로고
    • Safety issues involving medical devices
    • Aug.
    • W. Maisel, "Safety issues involving medical devices, " Journal of the American Medical Association, vol. 294, pp. 955-958, Aug. 2005.
    • (2005) Journal of the American Medical Association , vol.294 , pp. 955-958
    • Maisel, W.1
  • 6
    • 0001831930 scopus 로고    scopus 로고
    • The resurrecting duckling: Security issues for ad-hoc wireless networks
    • F. Stajano and R. Anderson, "The resurrecting duckling: Security issues for ad-hoc wireless networks, " in Int. Workshop of Security Protocols, pp. 172-194, 1999.
    • (1999) Int. Workshop of Security Protocols , pp. 172-194
    • Stajano, F.1    Anderson, R.2
  • 9
    • 78249242072 scopus 로고    scopus 로고
    • Trustworthy data collection from implantable medical devices via high-speed security implementation based on ieee 1363
    • Nov.
    • F. Hu, Q. Hao, M. Lukowiak, Q. Sun, K. Wilhelm, S. Radziszowski, and Y. Wu, "Trustworthy data collection from implantable medical devices via high-speed security implementation based on IEEE 1363, " IEEE Trans. on Info. Tech. in Biomedicine, vol. 14, pp. 1397-1404, Nov. 2010.
    • (2010) IEEE Trans. on Info. Tech. in Biomedicine , vol.14 , pp. 1397-1404
    • Hu, F.1    Hao, Q.2    Lukowiak, M.3    Sun, Q.4    Wilhelm, K.5    Radziszowski, S.6    Wu, Y.7
  • 10
    • 84879873019 scopus 로고    scopus 로고
    • Diginotar files for bankruptcy in wake of devastating hack
    • 20 Sept.
    • K. Zetter, "DigiNotar files for bankruptcy in wake of devastating hack, " Wired, 20 Sept. 2011.
    • (2011) Wired
    • Zetter, K.1
  • 11
    • 79960873920 scopus 로고    scopus 로고
    • Imdguard: Securing implantable medical devices with the external wearable guardian
    • F. Xu, Z. Qin, C. Tan, B. Wang, and Q. Li, "IMDGuard: Securing implantable medical devices with the external wearable guardian, " in Proc. of IEEE INFOCOM, pp. 1862-1870, 2011.
    • (2011) Proc. of IEEE INFOCOM , pp. 1862-1870
    • Xu, F.1    Qin, Z.2    Tan, C.3    Wang, B.4    Li, Q.5
  • 12
    • 84879861042 scopus 로고    scopus 로고
    • Opfka: Secure and efficient ordered-physiological-feature-based key agreement for wireless body area networks
    • To Appear
    • C. Hu, X. Cheng, F. Zhangand, D. Wuand, X. Liao, and D. Chen, "OPFKA: Secure and efficient ordered-physiological-feature-based key agreement for wireless body area networks, " in Proc. of IEEE INFOCOM, To Appear, 2013.
    • (2013) Proc. of IEEE INFOCOM
    • Hu, C.1    Cheng, X.2    Zhangand, F.3    Wuand, D.4    Liao, X.5    Chen, D.6
  • 13
    • 0030380805 scopus 로고    scopus 로고
    • Personal area networks: Near-field intrabody communication
    • T. G. Zimmerman, "Personal area networks: near-field intrabody communication, " IBM systems Journal, vol. 35, pp. 609-617, 1996.
    • (1996) IBM Systems Journal , vol.35 , pp. 609-617
    • Zimmerman, T.G.1
  • 16
    • 84939435969 scopus 로고    scopus 로고
    • Biosec: A biometric based approach for securing communication in wireless networks of biosensors implanted in the human body
    • S. Cherukuri, K. Venkatasubramanian, and S. Gupta, "Biosec: a biometric based approach for securing communication in wireless networks of biosensors implanted in the human body, " in Parallel Processing Workshop, pp. 432-439, 2003.
    • (2003) Parallel Processing Workshop , pp. 432-439
    • Cherukuri, S.1    Venkatasubramanian, K.2    Gupta, S.3
  • 18
    • 0035075949 scopus 로고    scopus 로고
    • Applying nonlinear noise reduction in the analysis of heart rate variability
    • IEEE
    • M. Signorini, F. Marchetti, and S. Cerutti, "Applying nonlinear noise reduction in the analysis of heart rate variability, " Engineering in Medicine and Biology Magazine, IEEE, vol. 20, no. 2, pp. 59-68, 2001.
    • (2001) Engineering in Medicine and Biology Magazine , vol.20 , Issue.2 , pp. 59-68
    • Signorini, M.1    Marchetti, F.2    Cerutti, S.3
  • 19
    • 41349097058 scopus 로고    scopus 로고
    • Quantification of heart rate variability by discrete nonstationary non-markov stochastic processes
    • R. Yulmetyev, P. Hänggi, and F. Gafarov, "Quantification of heart rate variability by discrete nonstationary non-Markov stochastic processes, " Physical Review E, vol. 65, no. 4, p. 046107, 2002.
    • (2002) Physical Review E , vol.65 , Issue.4 , pp. 046107
    • Yulmetyev, R.1    Hänggi, P.2    Gafarov, F.3
  • 22
    • 33646948221 scopus 로고    scopus 로고
    • A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health
    • C. Poon, Y. Zhang, and S. Bao, "A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health, " IEEE Communications Magazine, vol. 44, no. 4, pp. 73-81, 2006.
    • (2006) IEEE Communications Magazine , vol.44 , Issue.4 , pp. 73-81
    • Poon, C.1    Zhang, Y.2    Bao, S.3
  • 23
    • 56649112965 scopus 로고    scopus 로고
    • Using the timing information of heartbeats as an entity identifier to secure body sensor network
    • S. Bao, C. Poon, Y. Zhang, and L. Shen, "Using the timing information of heartbeats as an entity identifier to secure body sensor network, " IEEE Trans. on Info. Tech. in Biomedicine, vol. 12, no. 6, pp. 772-779, 2008.
    • (2008) IEEE Trans. on Info. Tech. in Biomedicine , vol.12 , Issue.6 , pp. 772-779
    • Bao, S.1    Poon, C.2    Zhang, Y.3    Shen, L.4
  • 24
    • 77954990804 scopus 로고    scopus 로고
    • Physiological value-based efficient usable security solutions for body sensor networks
    • 31:1-31:36, July
    • K. Venkatasubramanian and S. Gupta, "Physiological value-based efficient usable security solutions for body sensor networks, " ACM Trans. Sensor Networks, vol. 6, pp. 31:1-31:36, July 2010.
    • (2010) ACM Trans. Sensor Networks , vol.6
    • Venkatasubramanian, K.1    Gupta, S.2
  • 25
    • 84863288241 scopus 로고    scopus 로고
    • Biometric based secure communications without pre-deployed key for biosensor implanted in body sensor networks
    • K. Cho and D. Lee, "Biometric based secure communications without pre-deployed key for biosensor implanted in body sensor networks, " in Information Security Applications, pp. 203-218, 2012.
    • (2012) Information Security Applications , pp. 203-218
    • Cho, K.1    Lee, D.2
  • 26
    • 52149117439 scopus 로고    scopus 로고
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    • Y. Dodis, L. Reyzin, and A. Smith, "Fuzzy extractors: How to generate strong keys from biometrics and other noisy data, " SIAM Journal on Computing, vol. 38, no. 1, pp. 97-139, 2008.
    • (2008) SIAM Journal on Computing , vol.38 , Issue.1 , pp. 97-139
    • Dodis, Y.1    Reyzin, L.2    Smith, A.3
  • 28
    • 84891050675 scopus 로고    scopus 로고
    • Body area network security: A fuzzy attribute-based signcryption scheme
    • To Appear
    • X. Liao, "Body area network security: A fuzzy attribute-based signcryption scheme, " IEEE Journal on Selected Areas in Communications, To Appear, 2013.
    • (2013) IEEE Journal on Selected Areas in Communications
    • Liao, X.1
  • 29
    • 77953972283 scopus 로고    scopus 로고
    • Absence makes the heart grow fonder: New directions for implantable medical device security
    • T. Denning, K. Fu, and T. Kohno, "Absence makes the heart grow fonder: New directions for implantable medical device security, " in USENIX HotSec, 2008.
    • (2008) USENIX HotSec
    • Denning, T.1    Fu, K.2    Kohno, T.3
  • 30
    • 80053135174 scopus 로고    scopus 로고
    • They can hear your heartbeats: Non-invasive security for implantable medical devices
    • S. Gollakota, H. Hassanieh, B. Ransford, D. Katabi, and K. Fu, "They can hear your heartbeats: non-invasive security for implantable medical devices, " in ACM SIGCOMM, pp. 2-13, 2011.
    • (2011) ACM SIGCOMM , pp. 2-13
    • Gollakota, S.1    Hassanieh, H.2    Ransford, B.3    Katabi, D.4    Fu, K.5
  • 31
    • 84881223293 scopus 로고    scopus 로고
    • Ally friendly jamming: How to jam your enemy and maintain your own wireless connectivity at the same time
    • W. Shen, P. Ning, X. He, and H. Dai, "Ally friendly jamming: How to jam your enemy and maintain your own wireless connectivity at the same time, " in IEEE Symp. on Security and Privacy, 2013.
    • (2013) IEEE Symp. on Security and Privacy
    • Shen, W.1    Ning, P.2    He, X.3    Dai, H.4
  • 35
    • 33845498091 scopus 로고    scopus 로고
    • Referenced 2012
    • distributed.net, "Project RC5." http://www.distributed.net/RC5, Referenced 2012.
    • Project RC5
  • 36
    • 67650671123 scopus 로고    scopus 로고
    • Key agreement from close secrets over unsecured channels
    • B. Kanukurthi and L. Reyzin, "Key agreement from close secrets over unsecured channels, " in Eurocrypt, pp. 206-223, 2009.
    • (2009) Eurocrypt , pp. 206-223
    • Kanukurthi, B.1    Reyzin, L.2
  • 39
    • 17044365390 scopus 로고    scopus 로고
    • Energy scavenging for mobile and wireless electronics
    • J. Paradiso and T. Starner, "Energy scavenging for mobile and wireless electronics, " IEEE Pervasive Computing, vol. 4, no. 1, pp. 18-27, 2005.
    • (2005) IEEE Pervasive Computing , vol.4 , Issue.1 , pp. 18-27
    • Paradiso, J.1    Starner, T.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.