메뉴 건너뛰기




Volumn , Issue , 2015, Pages 246-249

A comparative review on the wireless implantable medical devices privacy and security

Author keywords

Body Area Networks; Implantable medical devices (IMDs); In Vivo communication; Security

Indexed keywords

HEALTH CARE;

EID: 84925359289     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/MOBIHEALTH.2014.7015957     Document Type: Conference Paper
Times cited : (25)

References (35)
  • 2
    • 23944466429 scopus 로고    scopus 로고
    • Safety issues involving medical devices
    • W. Maisel, "Safety issues involving medical devices," J. Am. Medical Assoc, vol. 294, pp. 955-985, 2005.
    • (2005) J. Am. Medical Assoc , vol.294 , pp. 955-985
    • Maisel, W.1
  • 3
    • 68949178835 scopus 로고    scopus 로고
    • Securing wireless implantable devices for healthcare: Ideas and challenges
    • K. Malasri and L. Wang, "Securing wireless implantable devices for healthcare: Ideas and challenges," IEEE Comm. Mag., vol. 47. 7, pp. 74-80, 2009.
    • (2009) IEEE Comm. Mag. , vol.47 , Issue.7 , pp. 74-80
    • Malasri, K.1    Wang, L.2
  • 4
    • 67449084060 scopus 로고    scopus 로고
    • Inside risks: Reducing risks of implantable medical devices
    • K. Fu, "Inside risks: Reducing risks of implantable medical devices," Communications of the ACM, vol. 52. 6, pp. 25-27, 2009.
    • (2009) Communications of the ACM , vol.52 , Issue.6 , pp. 25-27
    • Fu, K.1
  • 6
    • 77950500674 scopus 로고    scopus 로고
    • Improving the security and privacy of implantable medical devices
    • W. H. Maisel and K. Tadayoshi, "Improving the security and privacy of implantable medical devices," New England journal of medicine, vol. 362. 13, p. 1164, 2010.
    • (2010) New England Journal of Medicine , vol.362 , Issue.13
    • Maisel, W.H.1    Tadayoshi, K.2
  • 8
    • 33745853759 scopus 로고    scopus 로고
    • Security issues of wireless sensor networks in healthcare applications
    • H. S. Ng, M. L. Sim, and C. M. Tan, "Security issues of wireless sensor networks in healthcare applications," BT Technology Journal, vol. 24. 2, pp. 138-144, 2006.
    • (2006) BT Technology Journal , vol.24 , Issue.2 , pp. 138-144
    • Ng, H.S.1    Sim, M.L.2    Tan, C.M.3
  • 10
    • 84883076209 scopus 로고    scopus 로고
    • Pipac: Patient infusion pattern based access control scheme for wireless insulin pump system
    • X. Hei, X. Du, S. Lin, and I. Lee, "Pipac: patient infusion pattern based access control scheme for wireless insulin pump system," in IEEE INFOCOM, 2013.
    • (2013) IEEE INFOCOM
    • Hei, X.1    Du, X.2    Lin, S.3    Lee, I.4
  • 11
    • 77956045650 scopus 로고    scopus 로고
    • Researchers fight to keep implanted medical devices safe from hackers
    • N. Leavitt, "Researchers fight to keep implanted medical devices safe from hackers," Computer, vol. 43. 8, pp. 11-14, 2010.
    • (2010) Computer , vol.43 , Issue.8 , pp. 11-14
    • Leavitt, N.1
  • 13
    • 59249083926 scopus 로고    scopus 로고
    • Design and implementation of a secure wireless mote-based medical sensor network
    • K. Malasri and L. Wang, "Design and implementation of a secure wireless mote-based medical sensor network," in Proc. 10th Int'l. Conf. Ubiquitous Computing, 2008.
    • (2008) Proc. 10th Int'l. Conf. Ubiquitous Computing
    • Malasri, K.1    Wang, L.2
  • 14
    • 33750030809 scopus 로고    scopus 로고
    • Implementation of security policy for clinical information systems over wireless sensor networks
    • J. Misic and V. B. Misic, "Implementation of security policy for clinical information systems over wireless sensor networks," Ad Hoc Net., pp. 134-144, 2007.
    • (2007) Ad Hoc Net. , pp. 134-144
    • Misic, J.1    Misic, V.B.2
  • 15
    • 84925376140 scopus 로고    scopus 로고
    • Springer, 2000, ch. Authenticated encryption: Relations among notions and analysis of the generic composition paradigm
    • M. Bellare and N. Chanathip, Advances in Cryptology-ASIACRYPT. Springer, 2000, ch. Authenticated encryption: Relations among notions and analysis of the generic composition paradigm, pp. 531-545.
    • Advances in Cryptology-ASIACRYPT , pp. 531-545
    • Bellare, M.1    Chanathip, N.2
  • 16
    • 84925350987 scopus 로고    scopus 로고
    • Springer, ch. Solutions for the storage problem of mceliece public and private keys on memoryconstrained platforms
    • F. Strenzke, Information Security. Springer, 2012, ch. Solutions for the storage problem of mceliece public and private keys on memoryconstrained platforms, pp. 120-135.
    • (2012) Information Security , pp. 120-135
    • Strenzke, F.1
  • 17
    • 84939435969 scopus 로고    scopus 로고
    • Biosec: A biometric based approach for securing communication in wireless networks of biosensors implanted in the human body
    • S. Cherukuri, K. Venkatasubramanian, and S. Gupta, "Biosec: A biometric based approach for securing communication in wireless networks of biosensors implanted in the human body," in Int. Conference on Parallel Processing Workshops, 2003.
    • (2003) Int. Conference on Parallel Processing Workshops
    • Cherukuri, S.1    Venkatasubramanian, K.2    Gupta, S.3
  • 18
    • 33646948221 scopus 로고    scopus 로고
    • A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health
    • C. Poon, Y. Zhang, and S. Bao, "A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health," IEEE Communications Magazine, vol. 44(4), pp. 73-81, 2006.
    • (2006) IEEE Communications Magazine , vol.44 , Issue.4 , pp. 73-81
    • Poon, C.1    Zhang, Y.2    Bao, S.3
  • 19
    • 56649112965 scopus 로고    scopus 로고
    • Using the timing information of heartbeats as an entity identifier to secure body sensor network
    • S. Bao, C. Poon, Y. Zhang, and L. Shen, "Using the timing information of heartbeats as an entity identifier to secure body sensor network," IEEE Trans Inf Technol Biomed., vol. 12(6), pp. 772-9, 2008.
    • (2008) IEEE Trans Inf Technol Biomed. , vol.12 , Issue.6 , pp. 772-779
    • Bao, S.1    Poon, C.2    Zhang, Y.3    Shen, L.4
  • 21
    • 79960873920 scopus 로고    scopus 로고
    • Imdguard: Securing implantable medical devices with the external wearable guardian
    • F. Xu, Z. Qin, C. C. Tan, B. Wang, and Q. Li, "Imdguard: Securing implantable medical devices with the external wearable guardian," in IEEE INFOCOM Proc., 2011.
    • (2011) IEEE INFOCOM Proc
    • Xu, F.1    Qin, Z.2    Tan, C.C.3    Wang, B.4    Li, Q.5
  • 23
    • 77953972283 scopus 로고    scopus 로고
    • Absence makes the heart grow fonder: New directions for implantable medical device security
    • T. Denning, K. Fu, and T. Kohno, "Absence makes the heart grow fonder: New directions for implantable medical device security," in HotSec, 2008.
    • (2008) HotSec
    • Denning, T.1    Fu, K.2    Kohno, T.3
  • 26
    • 0024605454 scopus 로고
    • Pulse oximetry
    • K. K. Tremper, "Pulse oximetry," CHEST Journal, pp. 713-715, 1989.
    • (1989) CHEST Journal , pp. 713-715
    • Tremper, K.K.1
  • 27
    • 84879861042 scopus 로고    scopus 로고
    • Opfka: Secure and efficient ordered-physiological-feature-based key agreement for wireless body area networks
    • H. Chunqiang, X. Cheng, F. Zhang, D. Wu, X. Liao, and D. Chen, "Opfka: Secure and efficient ordered-physiological-feature-based key agreement for wireless body area networks," in IEEE INFOCOM Proc., 2013.
    • (2013) IEEE INFOCOM Proc
    • Chunqiang, H.1    Cheng, X.2    Zhang, F.3    Wu, D.4    Liao, X.5    Chen, D.6
  • 30
    • 77957557705 scopus 로고    scopus 로고
    • Securing the communication of medical information using local biometric authentication and commercial wireless links
    • V. I. Ivanov, L. Y. Paul, and J. S. Baras, "Securing the communication of medical information using local biometric authentication and commercial wireless links," Health informatics journal, vol. 16. 3, pp. 211-223, 2010.
    • (2010) Health Informatics Journal , vol.16 , Issue.3 , pp. 211-223
    • Ivanov, V.I.1    Paul, L.Y.2    Baras, J.S.3
  • 32
    • 84893849701 scopus 로고    scopus 로고
    • Medmon: Securing medical devices through wireless monitoring and anomaly detection
    • M. Zhang, A. Raghunathan, and N. K. Jha, "Medmon: Securing medical devices through wireless monitoring and anomaly detection," Biomedical Circuits and Systems, IEEE Transactions on, vol. 7. 6, pp. 871-881, 2013.
    • (2013) Biomedical Circuits and Systems, IEEE Transactions on , vol.7 , Issue.6 , pp. 871-881
    • Zhang, M.1    Raghunathan, A.2    Jha, N.K.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.