Security vulnerabilities, attacks, countermeasures, and regulations of networked medical devices—A review

T Yaqoob, H Abbas… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
Over the last few years, healthcare administrations have been digitizing their provision of
care that led to an increased number of networked medical devices and medical telemetry …

[HTML][HTML] Security and privacy issues in implantable medical devices: A comprehensive survey

C Camara, P Peris-Lopez, JE Tapiador - Journal of biomedical informatics, 2015 - Elsevier
Bioengineering is a field in expansion. New technologies are appearing to provide a more
efficient treatment of diseases or human deficiencies. Implantable Medical Devices (IMDs) …

Cyber-physical systems security—A survey

A Humayed, J Lin, F Li, B Luo - IEEE Internet of Things Journal, 2017 - ieeexplore.ieee.org
With the exponential growth of cyber-physical systems (CPSs), new security challenges
have emerged. Various vulnerabilities, threats, attacks, and controls have been introduced …

A survey on security and privacy issues in modern healthcare systems: Attacks and defenses

AKMI Newaz, AK Sikder, MA Rahman… - ACM Transactions on …, 2021 - dl.acm.org
Recent advancements in computing systems and wireless communications have made
healthcare systems more efficient than before. Modern healthcare devices can monitor and …

Sok: Security and privacy in implantable medical devices and body area networks

M Rushanan, AD Rubin, DF Kune… - 2014 IEEE symposium …, 2014 - ieeexplore.ieee.org
Balancing security, privacy, safety, and utility is a necessity in the health care domain, in
which implantable medical devices (IMDs) and body area networks (BANs) have made it …

Heart-to-heart (H2H) authentication for implanted medical devices

M Rostami, A Juels, F Koushanfar - Proceedings of the 2013 ACM …, 2013 - dl.acm.org
We present Heart-to-Heart (H2H), a system to authenticate external medical device
controllers and programmers to Implantable Medical Devices (IMDs). IMDs, which include …

Security tradeoffs in cyber physical systems: A case study survey on implantable medical devices

R AlTawy, AM Youssef - Ieee Access, 2016 - ieeexplore.ieee.org
The new culture of networked systems that offer everywhere accessible services has given
rise to various types of security tradeoffs. In fact, with the evolution of physical systems that …

Sensors for context-aware smart healthcare: A security perspective

E Batista, MA Moncusi, P López-Aguilar… - Sensors, 2021 - mdpi.com
The advances in the miniaturisation of electronic devices and the deployment of cheaper
and faster data networks have propelled environments augmented with contextual and real …

Secure anonymous mutual authentication for star two-tier wireless body area networks

MH Ibrahim, S Kumari, AK Das, M Wazid… - Computer methods and …, 2016 - Elsevier
Background and objectives Mutual authentication is a very important service that must be
established between sensor nodes in wireless body area network (WBAN) to ensure the …

On the (in) security of the latest generation implantable cardiac defibrillators and how to secure them

E Marin, D Singelée, FD Garcia, T Chothia… - Proceedings of the …, 2016 - dl.acm.org
Implantable Medical Devices (IMDs) typically use proprietary protocols with no or limited
security to wirelessly communicate with a device programmer. These protocols enable …