2014
DOI: 10.1007/978-1-4614-1674-6
|View full text |Cite
|
Sign up to set email alerts
|

Security and Privacy for Implantable Medical Devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 10 publications
(3 citation statements)
references
References 58 publications
0
3
0
Order By: Relevance
“…However, wearable computing also has some disadvantages. For example, wearable devices may be more vulnerable to security breaches or data leaks, as the data must be transmitted to an external device for processing. , …”
Section: Infrastructure Integrationmentioning
confidence: 99%
See 2 more Smart Citations
“…However, wearable computing also has some disadvantages. For example, wearable devices may be more vulnerable to security breaches or data leaks, as the data must be transmitted to an external device for processing. , …”
Section: Infrastructure Integrationmentioning
confidence: 99%
“…460,519,717 Outlined data paths may result in regulatory challenges because data from implantable medical devices offers substantial insight; however, the personal nature of the data means that privacy and data security are a substantial concern. 718 Shown in Figure 23c is an example of secure data flow where requested data from an implant is encrypted on-device before being transmitted wirelessly, as recommended by the FDA. 705 In the case that an implant does not support secure communication protocols, the onus is on the wearable or other interface to encrypt the data as it is received.…”
Section: Infrastructure Integrationmentioning
confidence: 99%
See 1 more Smart Citation