2018
DOI: 10.3390/s18124327
|View full text |Cite
|
Sign up to set email alerts
|

Experimental Phantom-Based Security Analysis for Next-Generation Leadless Cardiac Pacemakers

Abstract: With technological advancement, implanted medical devices can treat a wide range of chronic diseases such as cardiac arrhythmia, deafness, diabetes, etc. Cardiac pacemakers are used to maintain normal heart rhythms. The next generation of these pacemakers is expected to be completely wireless, providing new security threats. Thus, it is critical to secure pacemaker transmissions between legitimate nodes from a third party or an eavesdropper. This work estimates the eavesdropping risk and explores the potential… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2019
2019
2025
2025

Publication Types

Select...
4
3

Relationship

4
3

Authors

Journals

citations
Cited by 10 publications
(12 citation statements)
references
References 34 publications
0
12
0
Order By: Relevance
“…After simplification (as provided in detail in Appendix A and adapted from [ 29 ]), can be represented in the form of Q-function for log-normal channels [ 19 , 29 ] as whereas the outage probability ( ) can be expressed as where and represents the mean SNR of respective links (legitimate and Eve Link, as expressed in Equation ( 5 )). In addition, and , where a and b is the standard deviation of the Gaussian distribution which corresponds to a log-normal distribution (if is the standard deviation of , then ).…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…After simplification (as provided in detail in Appendix A and adapted from [ 29 ]), can be represented in the form of Q-function for log-normal channels [ 19 , 29 ] as whereas the outage probability ( ) can be expressed as where and represents the mean SNR of respective links (legitimate and Eve Link, as expressed in Equation ( 5 )). In addition, and , where a and b is the standard deviation of the Gaussian distribution which corresponds to a log-normal distribution (if is the standard deviation of , then ).…”
Section: Resultsmentioning
confidence: 99%
“…Information theoretic measures or security via PLS depend on wireless channel characteristics for securing the communication between legitimate nodes. These characteristics may involve received signal strength, angle of arrival, phase or the inherent noise in the wireless channels that degrades the signal-to-noise ratio [ 17 , 18 , 19 , 20 ]. Therefore, channel modeling is the key aspect to evaluating the possibilities of using the PLS methods for securing the information content between legitimate nodes.…”
Section: Introductionmentioning
confidence: 99%
“…Furthermore, for experiments, a small battery powered antenna with transmitter is utilized instead of using conventional coaxial cables and vector network analyzer (VNA) for generation of sounding signal. This is because, in case of small dimensions of antenna, the adjoined coaxial cables also radiate which is being ignored by authors in the literature [37]. Another aspect of this work is that it evaluates the in-body to off-body link (Eve link) directly from deep implant (inside the right ventricle) and computes the channel attenuation of entire space around the body.…”
Section: B Motivation and Backgroundmentioning
confidence: 99%
“…The setup used for the channel measurements is shown in Fig. 3 [13], [14]. Our experimentation setup includes, phantom containers to hold the liquid phantoms, Anechoic chamber to avoid surrounding contributions, Vector Network Analyzer (VNA) to generate sounding signal in UWB frequency band, a magnetic tracker to track the distance between transmitter and receiver antenna at different spatial measurement positions, and the positioner, to move the antenna to different positions.…”
Section: B Measurement Setupmentioning
confidence: 99%