2021
DOI: 10.3390/s21248383
|View full text |Cite
|
Sign up to set email alerts
|

Can Formal Security Verification Really Be Optional? Scrutinizing the Security of IMD Authentication Protocols

Abstract: The need for continuous monitoring of physiological information of critical organs of the human body, combined with the ever-growing field of electronics and sensor technologies and the vast opportunities brought by 5G connectivity, have made implantable medical devices (IMDs) the most necessitated devices in the health arena. IMDs are very sensitive since they are implanted in the human body, and the patients depend on them for the proper functioning of their vital organs. Simultaneously, they are intrinsical… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 38 publications
0
2
0
Order By: Relevance
“…Because of their size and location, these IMD have limited resources, including power, memory, and processing speed, that must be included in any proposed security measures. Zero watermarking approaches [23] This ID is a meaningless piece of paper devoid of personal or identifying information about the owner.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…Because of their size and location, these IMD have limited resources, including power, memory, and processing speed, that must be included in any proposed security measures. Zero watermarking approaches [23] This ID is a meaningless piece of paper devoid of personal or identifying information about the owner.…”
Section: Methodsmentioning
confidence: 99%
“…Mishra et al [21] comes with a lossless model for the identification of biometric images for the generation of unique digital code [22]. Although the admirable attempts created by the academic communities, there were still problems that need to be solved, including insufficient fundamental capabilities, higher communications and computational overheads, and formal lag in security verifications [23]. Dorsal hand vein (DHV) biometrics, one of the newest biometrics technologies, has drawn a lot of attention lately [24].…”
Section: Introductionmentioning
confidence: 99%