Security vulnerabilities, attacks, countermeasures, and regulations of networked medical devices—A review
Over the last few years, healthcare administrations have been digitizing their provision of
care that led to an increased number of networked medical devices and medical telemetry …
care that led to an increased number of networked medical devices and medical telemetry …
[HTML][HTML] Security and privacy issues in implantable medical devices: A comprehensive survey
Bioengineering is a field in expansion. New technologies are appearing to provide a more
efficient treatment of diseases or human deficiencies. Implantable Medical Devices (IMDs) …
efficient treatment of diseases or human deficiencies. Implantable Medical Devices (IMDs) …
Cyber-physical systems security—A survey
With the exponential growth of cyber-physical systems (CPSs), new security challenges
have emerged. Various vulnerabilities, threats, attacks, and controls have been introduced …
have emerged. Various vulnerabilities, threats, attacks, and controls have been introduced …
A survey on security and privacy issues in modern healthcare systems: Attacks and defenses
Recent advancements in computing systems and wireless communications have made
healthcare systems more efficient than before. Modern healthcare devices can monitor and …
healthcare systems more efficient than before. Modern healthcare devices can monitor and …
Sok: Security and privacy in implantable medical devices and body area networks
Balancing security, privacy, safety, and utility is a necessity in the health care domain, in
which implantable medical devices (IMDs) and body area networks (BANs) have made it …
which implantable medical devices (IMDs) and body area networks (BANs) have made it …
Heart-to-heart (H2H) authentication for implanted medical devices
We present Heart-to-Heart (H2H), a system to authenticate external medical device
controllers and programmers to Implantable Medical Devices (IMDs). IMDs, which include …
controllers and programmers to Implantable Medical Devices (IMDs). IMDs, which include …
Security tradeoffs in cyber physical systems: A case study survey on implantable medical devices
R AlTawy, AM Youssef - Ieee Access, 2016 - ieeexplore.ieee.org
The new culture of networked systems that offer everywhere accessible services has given
rise to various types of security tradeoffs. In fact, with the evolution of physical systems that …
rise to various types of security tradeoffs. In fact, with the evolution of physical systems that …
Sensors for context-aware smart healthcare: A security perspective
The advances in the miniaturisation of electronic devices and the deployment of cheaper
and faster data networks have propelled environments augmented with contextual and real …
and faster data networks have propelled environments augmented with contextual and real …
Secure anonymous mutual authentication for star two-tier wireless body area networks
Background and objectives Mutual authentication is a very important service that must be
established between sensor nodes in wireless body area network (WBAN) to ensure the …
established between sensor nodes in wireless body area network (WBAN) to ensure the …
On the (in) security of the latest generation implantable cardiac defibrillators and how to secure them
Implantable Medical Devices (IMDs) typically use proprietary protocols with no or limited
security to wirelessly communicate with a device programmer. These protocols enable …
security to wirelessly communicate with a device programmer. These protocols enable …