Security vulnerabilities, attacks, countermeasures, and regulations of networked medical devices—A review

T Yaqoob, H Abbas… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
Over the last few years, healthcare administrations have been digitizing their provision of
care that led to an increased number of networked medical devices and medical telemetry …

A taxonomy on smart healthcare technologies: Security framework, case study, and future directions

S Chaudhary, R Kakkar, NK Jadav, A Nair… - Journal of …, 2022 - Wiley Online Library
There is a massive transformation in the traditional healthcare system from the specialist‐
centric approach to the patient‐centric approach by adopting modern and intelligent …

A survey on security and privacy issues in modern healthcare systems: Attacks and defenses

AKMI Newaz, AK Sikder, MA Rahman… - ACM Transactions on …, 2021 - dl.acm.org
Recent advancements in computing systems and wireless communications have made
healthcare systems more efficient than before. Modern healthcare devices can monitor and …

Sok: Security and privacy in implantable medical devices and body area networks

M Rushanan, AD Rubin, DF Kune… - 2014 IEEE symposium …, 2014 - ieeexplore.ieee.org
Balancing security, privacy, safety, and utility is a necessity in the health care domain, in
which implantable medical devices (IMDs) and body area networks (BANs) have made it …

Toward energy-efficient and trustworthy eHealth monitoring system

A Sawand, S Djahel, Z Zhang… - China …, 2015 - ieeexplore.ieee.org
The rapid technological convergence between Internet of Things (IoT), Wireless Body Area
Networks (WBANs) and cloud computing has made e-healthcare emerge as a promising …

A brief chronology of medical device security

AJ Burns, ME Johnson, P Honeyman - Communications of the ACM, 2016 - dl.acm.org
A brief chronology of medical device security Page 1 66 COMMUNICATIONS OF THE ACM
| OCTOBER 2016 | VOL. 59 | NO. 10 review articles X-RA Y IMA GE B Y TEW AN B …

Multidisciplinary approaches to achieving efficient and trustworthy eHealth monitoring systems

A Sawand, S Djahel, Z Zhang… - 2014 IEEE/CIC …, 2014 - ieeexplore.ieee.org
The rapid technological convergence between Internet of Things (IoT), Wireless Body Area
Networks (WBANs) and cloud computing have contributed to the emergence of e …

[PDF][PDF] Security and privacy in ubiquitous sensor networks

AJ Perez, S Zeadally, N Jabeur - Journal of Information Processing …, 2018 - koreascience.kr
The availability of powerful and sensor-enabled mobile and Internet-connected devices
have enabled the advent of the ubiquitous sensor network (USN) paradigm. USN provides …

Investigating security for ubiquitous sensor networks

AJ Perez, S Zeadally, N Jabeur - Procedia computer science, 2017 - Elsevier
The availability of powerful and sensor-enabled mobile and Internet-connected devices
have enabled the advent of the ubiquitous sensor network paradigm which is providing …

Security assessment of micro-electrode-dot-array biochips

M Shayan, J Tang, K Chakrabarty… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Digital microfluidic biochips (DMFBs) are versatile, reconfigurable systems for manipulating
discrete fluid droplets. Building on the success of DMFBs, platforms based on “sea-of …