메뉴 건너뛰기




Volumn , Issue , 2013, Pages 243-248

Security threats against the transmission chain of a medical health monitoring system

Author keywords

Body sensor networks; Communication system security; Health information management; Information security

Indexed keywords


EID: 84894160528     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/HealthCom.2013.6720675     Document Type: Conference Paper
Times cited : (30)

References (48)
  • 1
    • 34548702421 scopus 로고    scopus 로고
    • Adverse interaction between a left ventricular assist device and an implantable cardioverter defibrillator
    • Sep
    • J. C. Matthews, D. Betley, F. Morady, and F. Pelosi, "Adverse interaction between a left ventricular assist device and an implantable cardioverter defibrillator," J. Cardiovasc. Electrophysiol., vol. 18, no. 10, pp. 1107-1108, Sep 2007.
    • (2007) J. Cardiovasc. Electrophysiol. , vol.18 , Issue.10 , pp. 1107-1108
    • Matthews, J.C.1    Betley, D.2    Morady, F.3    Pelosi, F.4
  • 3
    • 84885876349 scopus 로고    scopus 로고
    • Hacking medical devices for fun and insulin: Breaking the human scada system
    • J. Radcliffe, "Hacking medical devices for fun and insulin: Breaking the human scada system," Black Hat Conference presentation slides 2011, 2011.
    • (2011) Black Hat Conference Presentation Slides 2011
    • Radcliffe, J.1
  • 7
    • 35548956399 scopus 로고    scopus 로고
    • Detection of subtle nocturnal motor activity from 3-d accelerometry recordings in epilepsy patients
    • T. Nijsen, P. J. M. Cluitmans, J. Arends, and P. Griep, "Detection of subtle nocturnal motor activity from 3-d accelerometry recordings in epilepsy patients," Biomedical Engineering, IEEE Transactions on, vol. 54, no. 11, pp. 2073-2081, 2007.
    • (2007) Biomedical Engineering, IEEE Transactions on , vol.54 , Issue.11 , pp. 2073-2081
    • Nijsen, T.1    Cluitmans, P.J.M.2    Arends, J.3    Griep, P.4
  • 13
    • 33244467676 scopus 로고    scopus 로고
    • Ambulatory motor assessment in parkinson's disease
    • N. L. Keijsers, M. W. Horstink, and S. C. Gielen, "Ambulatory motor assessment in parkinson's disease," Movement Disorders, vol. 21, no. 1, pp. 34-44, 2006. [Online]. Available: http://dx.doi.org/10.1002/mds.20633
    • (2006) Movement Disorders , vol.21 , Issue.1 , pp. 34-44
    • Keijsers, N.L.1    Horstink, M.W.2    Gielen, S.C.3
  • 14
    • 34547371054 scopus 로고    scopus 로고
    • System architecture of a wireless body area sensor network for ubiquitous health monitoring
    • C. Otto, A. Milenkovic, C. Sanders, and E. Jovanov, "System architecture of a wireless body area sensor network for ubiquitous health monitoring," Journal of Mobile Multimedia, vol. 1, no. 4, pp. 307-326, 2006.
    • (2006) Journal of Mobile Multimedia , vol.1 , Issue.4 , pp. 307-326
    • Otto, C.1    Milenkovic, A.2    Sanders, C.3    Jovanov, E.4
  • 16
    • 84863011893 scopus 로고    scopus 로고
    • Security issues in healthcare applications using wireless medical sensor networks: A survey
    • P. Kumar and H.-J. Lee, "Security issues in healthcare applications using wireless medical sensor networks: A survey," Sensors, vol. 12, no. 1, pp. 55-91, 2011. [Online]. Available: http://www.mdpi.com/1424-8220/12/1/55
    • (2011) Sensors , vol.12 , Issue.1 , pp. 55-91
    • Kumar, P.1    Lee, H.-J.2
  • 19
    • 77649094379 scopus 로고    scopus 로고
    • Data security and privacy in wireless body area networks
    • M. Li, W. Lou, and K. Ren, "Data security and privacy in wireless body area networks," Wireless Communications, IEEE, vol. 17, no. 1, pp. 51-58, 2010.
    • (2010) Wireless Communications, IEEE , vol.17 , Issue.1 , pp. 51-58
    • Li, M.1    Lou, W.2    Ren, K.3
  • 20
    • 11144340927 scopus 로고    scopus 로고
    • Designing secure sensor networks
    • E. Shi and A. Perrig, "Designing secure sensor networks," Wireless Communications, IEEE, vol. 11, no. 6, pp. 38-43, 2004.
    • (2004) Wireless Communications, IEEE , vol.11 , Issue.6 , pp. 38-43
    • Shi, E.1    Perrig, A.2
  • 26
    • 2942656255 scopus 로고    scopus 로고
    • Secure routing in wireless sensor networks: Attacks and countermeasures
    • C. Karlof and D. Wagner, "Secure routing in wireless sensor networks: attacks and countermeasures," Ad Hoc Networks, vol. 1, no. 2-3, pp. 293-315, 2003. [Online]. Available: http://www.sciencedirect.com/science/ article/pii/S1570870503000088
    • (2003) Ad Hoc Networks , vol.1 , Issue.2-3 , pp. 293-315
    • Karlof, C.1    Wagner, D.2
  • 28
    • 84947251443 scopus 로고    scopus 로고
    • The resurrecting duckling: Security issues for ad-hoc wireless networks
    • London, UK, UK: Springer-Verlag
    • F. Stajano and R. J. Anderson, "The resurrecting duckling: Security issues for ad-hoc wireless networks," in Proceedings of the 7th International Workshop on Security Protocols. London, UK, UK: Springer-Verlag, 2000, pp. 172-194. [Online]. Available: http://dl.acm.org/citation.cfm?id= 647217.760118
    • (2000) Proceedings of the 7th International Workshop on Security Protocols , pp. 172-194
    • Stajano, F.1    Anderson, R.J.2
  • 31
    • 7244238418 scopus 로고    scopus 로고
    • Virtual private networks: An overview with performance evaluation
    • S. Khanvilkar and A. Khokhar, "Virtual private networks: an overview with performance evaluation," Communications Magazine, IEEE, vol. 42, no. 10, pp. 146-154, 2004.
    • (2004) Communications Magazine, IEEE , vol.42 , Issue.10 , pp. 146-154
    • Khanvilkar, S.1    Khokhar, A.2
  • 35
    • 85032751754 scopus 로고    scopus 로고
    • Recent advances in homomorphic encryption: A possible future for signal processing in the encrypted domain
    • C. Aguilar-Melchor, S. Fau, C. Fontaine, G. Gogniat, and R. Sirdey, "Recent advances in homomorphic encryption: A possible future for signal processing in the encrypted domain," Signal Processing Magazine, IEEE, vol. 30, no. 2, pp. 108-117, 2013.
    • (2013) Signal Processing Magazine, IEEE , vol.30 , Issue.2 , pp. 108-117
    • Aguilar-Melchor, C.1    Fau, S.2    Fontaine, C.3    Gogniat, G.4    Sirdey, R.5
  • 41
    • 33745062882 scopus 로고    scopus 로고
    • Jamming sensor networks: Attack and defense strategies
    • W. Xu, K. Ma, W. Trappe, and Y. Zhang, "Jamming sensor networks: attack and defense strategies," Network, IEEE, vol. 20, no. 3, pp. 41-47, 2006.
    • (2006) Network, IEEE , vol.20 , Issue.3 , pp. 41-47
    • Xu, W.1    Ma, K.2    Trappe, W.3    Zhang, Y.4
  • 42
    • 77951462755 scopus 로고    scopus 로고
    • Bluetooth cavities
    • P. McFedries, "Bluetooth cavities," IEEE Spectrum, vol. 42, no. 6, p. 88, 2005.
    • (2005) IEEE Spectrum , vol.42 , Issue.6 , pp. 88
    • McFedries, P.1
  • 45
    • 11244354854 scopus 로고    scopus 로고
    • Security considerations for ieee 802.15.4 networks
    • ser. WiSe '04. New York, NY, USA: ACM
    • N. Sastry and D. Wagner, "Security considerations for IEEE 802.15.4 networks," in Proceedings of the 3rd ACM workshop on Wireless security, ser. WiSe '04. New York, NY, USA: ACM, 2004, pp. 32-42. [Online]. Available: http://doi.acm.org/10.1145/1023646.1023654
    • (2004) Proceedings of the 3rd ACM Workshop on Wireless Security , pp. 32-42
    • Sastry, N.1    Wagner, D.2
  • 47
    • 34247394276 scopus 로고    scopus 로고
    • Review of the bluetooth security architecture
    • D. Singeĺee and B. Preneel, "Review of the Bluetooth security architecture," Information Security Bulletin, vol. 11, pp. 45-53, 2006.
    • (2006) Information Security Bulletin , vol.11 , pp. 45-53
    • Singeĺee, D.1    Preneel, B.2
  • 48
    • 71949122821 scopus 로고    scopus 로고
    • Perils of transitive trust in the domain name system
    • ser. IMC '05. Berkeley, CA, USA: USENIX Association
    • V. Ramasubramanian and E. G. Sirer, "Perils of transitive trust in the domain name system," in Proceedings of the 5th ACM SIGCOMM conference on Internet Measurement, ser. IMC '05. Berkeley, CA, USA: USENIX Association, 2005, pp. 35-35. [Online]. Available: http://dl.acm.org/citation.cfm?id=1251086. 1251121
    • (2005) Proceedings of the 5th ACM SIGCOMM Conference on Internet Measurement , pp. 35-35
    • Ramasubramanian, V.1    Sirer, E.G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.