2017 IEEE International Conference on Intelligence and Security Informatics (ISI) 2017
DOI: 10.1109/isi.2017.8004903
|View full text |Cite
|
Sign up to set email alerts
|

Assessing medical device vulnerabilities on the Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
42
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 45 publications
(42 citation statements)
references
References 6 publications
0
42
0
Order By: Relevance
“…D. Decoded info transmission: Attackers screen prepare thus on listen in and take passwords. The transmission of decoded info accesses the appliance thus on separate knowledge for transmission malevolent directions [13]. Encryption Security is most widely discussed in this paper.…”
Section: Security Issues In Existing Iot Health Care Systemmentioning
confidence: 99%
“…D. Decoded info transmission: Attackers screen prepare thus on listen in and take passwords. The transmission of decoded info accesses the appliance thus on separate knowledge for transmission malevolent directions [13]. Encryption Security is most widely discussed in this paper.…”
Section: Security Issues In Existing Iot Health Care Systemmentioning
confidence: 99%
“…The governments and research communities have realized the importance to protect their IMDS [3][4][5][6]. However, there is limited research on how the compromise has happened and how this can be prevented.…”
Section: Introductionmentioning
confidence: 99%
“…However, there is limited research on how the compromise has happened and how this can be prevented. Current cyber security research in healthcare focuses on protecting medical devices from cyber attacks [3][4][5][6][7][8][9][10], however, those strategies cannot be applied to protect IMDS. Accordingly, this study was undertaken to show how the IMDS diagnosis results can be compromised and present a set of cyber defense strategies to prevent such compromise.…”
Section: Introductionmentioning
confidence: 99%
“…Even though these numbers present a promising future for wearable-based health monitoring solutions, our review indicates that there still exist some crucial hurdles before implementing health monitoring devices and applications in real-time [ 6 ]. These include: Focusing on developing physiological signal analysis algorithms which promote edge computing approaches [ 4 , 5 , 6 , 9 ]. That is, the data acquisition, compression and analysis must be done at the device level without having the need to transmit long, streaming data to cloud services.…”
Section: Introductionmentioning
confidence: 99%
“…This would lead to optimization of cloud resources by minimizing usage for data storage and analysis. The idea of edge computing is to help in optimizing on-device memory and power usage, thereby increasing operating efficiency and throughput [ 5 , 9 ]. In addition to this, there is also a need for data acquisition standardization with respect to data formats and communication protocols [ 10 , 11 ].…”
Section: Introductionmentioning
confidence: 99%