메뉴 건너뛰기




Volumn , Issue , 2014, Pages 524-539

SoK: Security and privacy in implantable medical devices and body area networks

Author keywords

body area networks; health; implantable medical devices; privacy; security

Indexed keywords

DATA PRIVACY; HEALTH; TELEMETERING EQUIPMENT;

EID: 84914104968     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SP.2014.40     Document Type: Conference Paper
Times cited : (208)

References (100)
  • 4
    • 77649107719 scopus 로고    scopus 로고
    • Applications, challenges, and prospective in emerging body area networking technologies
    • Feb.
    • M. Patel and J. Wang, "Applications, challenges, and prospective in emerging body area networking technologies," Wireless Commun., vol. 17, no. 1, pp. 80-88, Feb. 2010.
    • (2010) Wireless Commun. , vol.17 , Issue.1 , pp. 80-88
    • Patel, M.1    Wang, J.2
  • 6
    • 85008023513 scopus 로고    scopus 로고
    • Will IEEE 802.15.4 make ubiquitous networking a reality?: A discussion on a potential low power, low bit rate standard
    • Jun.
    • J. Zheng and M. J. Lee, "Will IEEE 802.15.4 make ubiquitous networking a reality?: A discussion on a potential low power, low bit rate standard," IEEE Commun. Mag., vol. 42, no. 6, pp. 140-146, Jun. 2004.
    • (2004) IEEE Commun. Mag. , vol.42 , Issue.6 , pp. 140-146
    • Zheng, J.1    Lee, M.J.2
  • 13
    • 84885719603 scopus 로고    scopus 로고
    • Inside risks: Controlling for cybersecurity risks of medical device software
    • Oct.
    • K. Fu and J. Blum, "Inside risks: Controlling for cybersecurity risks of medical device software," Communications of the ACM, vol. 56, no. 10, pp. 21-23, Oct. 2013.
    • (2013) Communications of the ACM , vol.56 , Issue.10 , pp. 21-23
    • Fu, K.1    Blum, J.2
  • 31
    • 59449102982 scopus 로고    scopus 로고
    • Leads and longevity: How long will your pacemaker last?
    • R. K. Shepard and K. A. Ellenbogen, "Leads and longevity: How long will your pacemaker last?" Europace, vol. 11, no. 2, pp. 142-143, 2009.
    • (2009) Europace , vol.11 , Issue.2 , pp. 142-143
    • Shepard, R.K.1    Ellenbogen, K.A.2
  • 40
    • 84863011893 scopus 로고    scopus 로고
    • Security issues in healthcare applications using wireless medical sensor networks: A survey
    • P. Kumar and H.-J. Lee, "Security issues in healthcare applications using wireless medical sensor networks: A survey," Sensors, vol. 12, no. 1, pp. 55-91, 2011.
    • (2011) Sensors , vol.12 , Issue.1 , pp. 55-91
    • Kumar, P.1    Lee, H.-J.2
  • 41
    • 84860308263 scopus 로고    scopus 로고
    • Privacy in mobile technology for personal healthcare
    • Dec.
    • S. Avancha, A. Baxi, and D. Kotz, "Privacy in mobile technology for personal healthcare," ACM Comput. Surv., vol. 45, no. 1, pp. 3:1-3:54, Dec. 2012.
    • (2012) ACM Comput. Surv. , vol.45 , Issue.1 , pp. 1-54
    • Avancha, S.1    Baxi, A.2    Kotz, D.3
  • 42
    • 0035388827 scopus 로고    scopus 로고
    • Characteristics of radio transmitter fingerprints
    • K. Ellis and N. Serinken, "Characteristics of radio transmitter fingerprints," Radio Science, vol. 36, no. 4, pp. 585-597, 2001.
    • (2001) Radio Science , vol.36 , Issue.4 , pp. 585-597
    • Ellis, K.1    Serinken, N.2
  • 49
    • 84881523410 scopus 로고    scopus 로고
    • Analysis of safety-critical computer failures in medical devices
    • H. Alemzadeh, R. Iyer, Z. Kalbarczyk, and J. Raman, "Analysis of safety-critical computer failures in medical devices," IEEE Security Privacy, vol. 11, no. 4, pp. 14-26, 2013.
    • (2013) IEEE Security Privacy , vol.11 , Issue.4 , pp. 14-26
    • Alemzadeh, H.1    Iyer, R.2    Kalbarczyk, Z.3    Raman, J.4
  • 51
    • 84893849701 scopus 로고    scopus 로고
    • MedMon: Securing medical devices through wireless monitoring and anomaly detection
    • Dec.
    • M. Zhang, A. Raghunathan, and N. Jha, "MedMon: Securing medical devices through wireless monitoring and anomaly detection," IEEE Trans. Biomed. Circuits Syst., vol. 7, no. 6, pp. 871-881, Dec. 2013.
    • (2013) IEEE Trans. Biomed. Circuits Syst. , vol.7 , Issue.6 , pp. 871-881
    • Zhang, M.1    Raghunathan, A.2    Jha, N.3
  • 53
    • 84864058685 scopus 로고    scopus 로고
    • Security and privacy qualities of medical devices: An analysis of FDA postmarket surveillance
    • Jul.
    • D. B. Kramer, M. Baker, B. Ransford, A. Molina-Markham, Q. Stewart, K. Fu, and M. R. Reynolds, "Security and privacy qualities of medical devices: An analysis of FDA postmarket surveillance," PLoS ONE, vol. 7, p. e40200, Jul. 2012.
    • (2012) PLoS ONE , vol.7 , pp. e40200
    • Kramer, D.B.1    Baker, M.2    Ransford, B.3    Molina-Markham, A.4    Stewart, Q.5    Fu, K.6    Reynolds, M.R.7
  • 59
    • 80053135174 scopus 로고    scopus 로고
    • They can hear your heartbeats: Non-invasive security for implantable medical devices
    • Aug.
    • S. Gollakota, H. Hassanieh, B. Ransford, D. Katabi, and K. Fu, "They can hear your heartbeats: Non-invasive security for implantable medical devices," SIGCOMM Comput. Commun. Rev., vol. 41, no. 4, pp. 2-13, Aug. 2011.
    • (2011) SIGCOMM Comput. Commun. Rev. , vol.41 , Issue.4 , pp. 2-13
    • Gollakota, S.1    Hassanieh, H.2    Ransford, B.3    Katabi, D.4    Fu, K.5
  • 60
    • 77954990804 scopus 로고    scopus 로고
    • Physiological value-based efficient usable security solutions for body sensor networks
    • Jul.
    • K. K. Venkatasubramanian and S. K. S. Gupta, "Physiological value-based efficient usable security solutions for body sensor networks," ACM Trans. Sen. Netw. (TOSN), vol. 6, no. 4, pp. 31:1-31:36, Jul. 2010.
    • (2010) ACM Trans. Sen. Netw. (TOSN) , vol.6 , Issue.4 , pp. 1-36
    • Venkatasubramanian, K.K.1    Gupta, S.K.S.2
  • 61
    • 78650034972 scopus 로고    scopus 로고
    • On pairing constrained wireless devices based on secrecy of auxiliary channels: The case of acoustic eavesdropping
    • T. Halevi and N. Saxena, "On pairing constrained wireless devices based on secrecy of auxiliary channels: The case of acoustic eavesdropping," in Proc. 17th ACM conference on Computer and Communications Security (CCS 2010), 2010, pp. 97-108.
    • (2010) Proc. 17th ACM Conference on Computer and Communications Security (CCS 2010) , pp. 97-108
    • Halevi, T.1    Saxena, N.2
  • 66
    • 67651015355 scopus 로고    scopus 로고
    • Neurosecurity: Security and privacy for neural devices
    • Jul.
    • T. Denning, Y. Matsuoka, and T. Kohno, "Neurosecurity: Security and privacy for neural devices," Journal of Neurosurgery: Pediatrics, vol. 27, no. 1, p. E7, Jul. 2009.
    • (2009) Journal of Neurosurgery: Pediatrics , vol.27 , Issue.1 , pp. E7
    • Denning, T.1    Matsuoka, Y.2    Kohno, T.3
  • 72
    • 33646948221 scopus 로고    scopus 로고
    • A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health
    • C. C. Y. Poon, Y.-T. Zhang, and S.-D. Bao, "A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health," IEEE Commun. Mag., vol. 44, no. 4, pp. 73-81, 2006.
    • (2006) IEEE Commun. Mag. , vol.44 , Issue.4 , pp. 73-81
    • Poon, C.C.Y.1    Zhang, Y.-T.2    Bao, S.-D.3
  • 73
    • 84876065473 scopus 로고    scopus 로고
    • Secure ad hoc trust initialization and key management in wireless body area networks
    • Apr.
    • M. Li, S. Yu, J. D. Guttman, W. Lou, and K. Ren, "Secure ad hoc trust initialization and key management in wireless body area networks," ACM Trans. Sen. Netw. (TOSN), vol. 9, no. 2, pp. 18:1-18:35, Apr. 2013.
    • (2013) ACM Trans. Sen. Netw. (TOSN) , vol.9 , Issue.2 , pp. 1-35
    • Li, M.1    Yu, S.2    Guttman, J.D.3    Lou, W.4    Ren, K.5
  • 74
    • 84891050675 scopus 로고    scopus 로고
    • Body area network security: A fuzzy attribute-based signcryption scheme
    • Sep.
    • C. Hu, N. Zhang, H. Li, X. Cheng, and X. Liao, "Body area network security: A fuzzy attribute-based signcryption scheme," IEEE J. Sel. Areas Commun., vol. 31, no. 9, pp. 37-46, Sep. 2013.
    • (2013) IEEE J. Sel. Areas Commun. , vol.31 , Issue.9 , pp. 37-46
    • Hu, C.1    Zhang, N.2    Li, H.3    Cheng, X.4    Liao, X.5
  • 80
    • 84976295016 scopus 로고
    • Distance-bounding protocols
    • ser. Lecture Notes in Computer Science
    • S. Brands and D. Chaum, "Distance-bounding protocols," in Advances in Cryptology - EUROCRYPT'93, ser. Lecture Notes in Computer Science, vol. 765, 1994, pp. 344-359.
    • (1994) Advances in Cryptology - EUROCRYPT'93 , vol.765 , pp. 344-359
    • Brands, S.1    Chaum, D.2
  • 90
    • 84914099332 scopus 로고    scopus 로고
    • (Mar.)
    • (2014, Mar.) Peach fuzzer. http://peachfuzzer.com/.
    • (2014) Peach Fuzzer
  • 96
    • 84862114860 scopus 로고    scopus 로고
    • A closer look at security in random number generators design
    • ser. Lecture Notes in Computer Science
    • V. Fischer, "A closer look at security in random number generators design," in Constructive Side-Channel Analysis and Secure Design, ser. Lecture Notes in Computer Science, 2012, vol. 7275, pp. 167-182.
    • (2012) Constructive Side-Channel Analysis and Secure Design , vol.7275 , pp. 167-182
    • Fischer, V.1
  • 97
    • 21144449843 scopus 로고    scopus 로고
    • Evaluation criteria for true (physical) random number generators used in cryptographic applications
    • ser. Lecture Notes in Computer Science
    • W. Schindler and W. Killmann, "Evaluation criteria for true (physical) random number generators used in cryptographic applications," in Cryptographic Hardware and Embedded Systems (CHES 2002), ser. Lecture Notes in Computer Science, 2003, vol. 2523, pp. 431-449.
    • (2003) Cryptographic Hardware and Embedded Systems (CHES 2002) , vol.2523 , pp. 431-449
    • Schindler, W.1    Killmann, W.2
  • 98
    • 79551572458 scopus 로고    scopus 로고
    • Advancements in noncontact, multiparameter physiological measurements using a webcam
    • Jan.
    • M. Poh, D. J. McDuff, and R. W. Picard, "Advancements in noncontact, multiparameter physiological measurements using a webcam," IEEE Trans. Biomed. Eng., vol. 58, no. 1, pp. 7-11, Jan. 2011.
    • (2011) IEEE Trans. Biomed. Eng. , vol.58 , Issue.1 , pp. 7-11
    • Poh, M.1    McDuff, D.J.2    Picard, R.W.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.