메뉴 건너뛰기




Volumn 10, Issue 4, 2013, Pages 1-23

A System Architecture, Processor, and Communication Protocol for Secure Implants

Author keywords

Algorithms; Design; Implantable Device; Performance; Security; System On Chip; Ultra Low Power

Indexed keywords


EID: 85025393425     PISSN: 15443566     EISSN: 15443973     Source Type: Journal    
DOI: 10.1145/2541228.2555313     Document Type: Article
Times cited : (15)

References (59)
  • 4
    • 1442292337 scopus 로고    scopus 로고
    • Protocols for authentication and key establishment
    • 3rd Ed. Springer Publishing Company, Incorporated
    • Boyd, C. and Mathuria, A. 2010. Protocols for authentication and key establishment. In Information Security and Cryptography 3rd Ed. Springer Publishing Company, Incorporated.
    • (2010) Information Security and Cryptography
    • Boyd, C.1    Mathuria, A.2
  • 7
    • 0031808307 scopus 로고    scopus 로고
    • Acute effects on insulin sensitivity and diurnal metabolic profiles of a high-sucrose compared with a high-starch diet
    • Daly, M. E., Vale, C., Walker, M., Littlefield, A., Alberti, K., and Mathers, J. C. 1998. Acute effects on insulin sensitivity and diurnal metabolic profiles of a high-sucrose compared with a high-starch diet. American Journal of Clinical Nutrition 67, 6, 1186-1196.
    • (1998) American Journal of Clinical Nutrition , vol.67 , pp. 1186-1196
    • Daly, M.E.1    Vale, C.2    Walker, M.3    Littlefield, A.4    Alberti, K.5    Mathers, J.C.6
  • 10
    • 77953972283 scopus 로고    scopus 로고
    • Absence makes the heart grow fonder: New directions for implantable medical device security
    • USENIX Association
    • Denning, T, Fu, K., and Kohno, T. 2008. Absence makes the heart grow fonder: New directions for implantable medical device security. In Proceedings of the 3rd Conference on Hot Topics in Security. USENIX Association, 5:1-5:7.
    • (2008) Proceedings of the 3rd Conference on Hot Topics in Security. , vol.5 , Issue.7 , pp. 1-5
    • Denning, T.1    Fu, K.2    Kohno, T.3
  • 11
    • 65649101592 scopus 로고    scopus 로고
    • Class-1 Generation-2 UHF RFID protocol for communications at 860 MHz-960 MHz (version 1.2.0)
    • Epcglobal Inc. 2008. Class-1 Generation-2 UHF RFID protocol for communications at 860 MHz-960 MHz (version 1.2.0).
    • (2008) Epcglobal Inc.
  • 12
    • 85025381566 scopus 로고    scopus 로고
    • FCC. FCC 47CFR95.601-95.673 Subpart E/I. Rules for MedRadio Services
    • FCC. 2003. MICS Medical Implant Communication Services. FCC 47CFR95.601-95.673 Subpart E/I. Rules for MedRadio Services.
    • (2003) MICS Medical Implant Communication Services.
  • 13
    • 0026117424 scopus 로고
    • A microprocessor-based implantable telemetry system
    • Fernald, K., Cook, T., Iii, T. M., and Paulos, J. 1991. A microprocessor-based implantable telemetry system. IEEE Computer 24, 23-30.
    • (1991) IEEE Computer , vol.24 , pp. 23-30
    • Fernald, K.1    Cook, T.2    Iii, T.M.3    Paulos, J.4
  • 15
    • 84892454478 scopus 로고    scopus 로고
    • They Can Hear Your Heartbeats: Non-invasive Security for Implantable Medical Devices
    • Retrieved December 2, 2013 from http://groups.csail.mit.edu/netmit/imdshield/paper.pdf
    • Gollakota, S., Hassanieh, H., Ransford, B., Katabi, D., and Fu, K. 2011. They Can Hear Your Heartbeats: Non-invasive Security for Implantable Medical Devices. Retrieved December 2, 2013 from http://groups.csail.mit.edu/netmit/imdshield/paper.pdf.
    • (2011)
    • Gollakota, S.1    Hassanieh, H.2    Ransford, B.3    Katabi, D.4    Fu, K.5
  • 20
    • 84943520337 scopus 로고    scopus 로고
    • Defending resource depletion attacks on implantable medical devices
    • Globecom
    • Hei, X., Du, X., Wu, J., and Hu, F. 2010. Defending resource depletion attacks on implantable medical devices. In Globecom. IEEE, 1-5.
    • (2010) IEEE , pp. 1-5
    • Hei, X.1    Du, X.2    Wu, J.3    Hu, F.4
  • 22
    • 85025415194 scopus 로고    scopus 로고
    • Information technology-Security techniques-Entity authentication-Part 2: Mechanisms using symmetric encipherment algorithms
    • ISO. 2008 International Standard
    • ISO. 1999. Information technology-Security techniques-Entity authentication-Part 2: Mechanisms using symmetric encipherment algorithms, ISO/IEC 2-9798: 2008. International Standard.
    • (1999) ISO/IEC , pp. 2-9798
  • 26
    • 77956045650 scopus 로고    scopus 로고
    • Researchers Fight to Keep Implanted Medical Devices Safe from Hackers
    • Leavitt, N. 2010. Researchers Fight to Keep Implanted Medical Devices Safe from Hackers. Computer 43,11-14.
    • (2010) Computer , vol.43 , pp. 11-14
    • Leavitt, N.1
  • 27
    • 78049298573 scopus 로고    scopus 로고
    • The price of security in wireless sensor networks
    • Lee, J., Kapitanova, K., and Son, S. H. 2010. The price of security in wireless sensor networks. Computer Networks 54, 17, 2967-2978.
    • (2010) Computer Networks , vol.54 , pp. 2967-2978
    • Lee, J.1    Kapitanova, K.2    Son, S.H.3
  • 33
    • 20344371167 scopus 로고    scopus 로고
    • A description of the misty1 encryption algorithm
    • November
    • Ohta, H. and Matsui, M. 2000. A description of the misty1 encryption algorithm. RFC2994, November.
    • (2000) RFC2994
    • Ohta, H.1    Matsui, M.2
  • 34
    • 79961134633 scopus 로고    scopus 로고
    • Energy harvesting and remote powering for implantable biosensors
    • Olivo, J., Carrara, S., and De Micheli, G. 2011. Energy harvesting and remote powering for implantable biosensors. IEEE Sensors Journal 11, 7, 1573-1586.
    • (2011) IEEE Sensors Journal , vol.11 , pp. 1573-1586
    • Olivo, J.1    Carrara, S.2    De Micheli, G.3
  • 37
    • 70350212750 scopus 로고    scopus 로고
    • Hackers Assault Epilepsy Patients via Computer
    • Retrieved from www.wired.com/ politics/security/news/2008/03/epilepsy
    • Poulson, K. 2008. Hackers Assault Epilepsy Patients via Computer. Retrieved from www.wired.com/ politics/security/news/2008/03/epilepsy.
    • (2008)
    • Poulson, K.1
  • 40
    • 33144472952 scopus 로고    scopus 로고
    • RFID Guardian: A battery-powered mobile device for RFID privacy management
    • Springer, Berlin
    • Rieback, M., Crispo, B., and Tanenbaum, A. 2008. RFID Guardian: A battery-powered mobile device for RFID privacy management. In Information Security and Privacy. Springer, Berlin, 259-273.
    • (2008) Information Security and Privacy. , pp. 259-273
    • Rieback, M.1    Crispo, B.2    Tanenbaum, A.3
  • 41
    • 84948990100 scopus 로고
    • The rc5 encryption algorithm
    • Springer
    • RIVEST, R. L. 1995. The rc5 encryption algorithm. In Fast Software Encryption. Springer, 86-96.
    • (1995) Fast Software Encryption. , pp. 86-96
    • RIVEST, R.L.1
  • 43
    • 85092032703 scopus 로고    scopus 로고
    • Security That is Meant to be Skin Deep Using Ultraviolet Micropigmentation to Store Emergency-Access Keys for Implantable Medical Devices
    • USENIX
    • Schechter, S. 2010. Security That is Meant to be Skin Deep Using Ultraviolet Micropigmentation to Store Emergency-Access Keys for Implantable Medical Devices. In HealthSec. USENIX.
    • (2010) HealthSec.
    • Schechter, S.1
  • 54
    • 0348011360 scopus 로고    scopus 로고
    • Pervasive healthcare
    • Varshney, U. 2003. Pervasive healthcare. Computer 36, 12, 138-140.
    • (2003) Computer , vol.36 , pp. 138-140
    • Varshney, U.1
  • 57
    • 0028407196 scopus 로고
    • A low power multi-sensor interface for injectable microprocessor-based animal monitoring system
    • Wouters, P., Cooman, M. D., Lapadatu, D., and Puers, R. 1994. A low power multi-sensor interface for injectable microprocessor-based animal monitoring system. Sensors and Actuators A: Physical. 41-42, 198-206.
    • (1994) Sensors and Actuators A: Physical. , vol.41-42 , pp. 198-206
    • Wouters, P.1    Cooman, M.D.2    Lapadatu, D.3    Puers, R.4
  • 58
    • 79960873920 scopus 로고    scopus 로고
    • IMDGuard: Securing implantable medical devices with the external wearable guardian
    • Xu, F., Qin, Z., Tan, C. C., Wang, B., and LI, Q. 2011. IMDGuard: Securing implantable medical devices with the external wearable guardian. IEEE INFOCOM 1862-1870.
    • (2011) IEEE INFOCOM , pp. 1862-1870
    • Xu, F.1    Qin, Z.2    Tan, C.C.3    Wang, B.4    LI, Q.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.