2014
DOI: 10.1155/2014/543051
|View full text |Cite
|
Sign up to set email alerts
|

Security Mechanism Based on Hospital Authentication Server for Secure Application of Implantable Medical Devices

Abstract: After two recent security attacks against implantable medical devices (IMDs) have been reported, the privacy and security risks of IMDs have been widely recognized in the medical device market and research community, since the malfunctioning of IMDs might endanger the patient's life. During the last few years, a lot of researches have been carried out to address the security-related issues of IMDs, including privacy, safety, and accessibility issues. A physician accesses IMD through an external device called a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
14
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(14 citation statements)
references
References 14 publications
0
14
0
Order By: Relevance
“…The information technology community has given some degree of recognition to medical implant information security vulnerabilities, as detailed in Secure implant design, but the topic has only been discussed seriously in the biomedical literature recently [27][28][29] and there are no detailed discussions of the risks specific to neurological implants beyond a single forward-thinking but brief review published several years ago 3 .…”
Section: And Us Vice President Dickmentioning
confidence: 99%
See 2 more Smart Citations
“…The information technology community has given some degree of recognition to medical implant information security vulnerabilities, as detailed in Secure implant design, but the topic has only been discussed seriously in the biomedical literature recently [27][28][29] and there are no detailed discussions of the risks specific to neurological implants beyond a single forward-thinking but brief review published several years ago 3 .…”
Section: And Us Vice President Dickmentioning
confidence: 99%
“…Several design constraints exist that necessitate trade-offs between neurosecurity and other desirable features of IPGs. These trade-offs and challenges, along with specific methods of attack and desirable security features for future devices, have been discussed in greater detail elsewhere [27][28][29][77][78][79] , therefore this section will consider the factors most relevant to clinical practice -battery life and practicality.…”
Section: Secure Implant Designmentioning
confidence: 99%
See 1 more Smart Citation
“…To deal with these concerns, several approaches protecting IMDs were proposed in the literature. In [1,5], a 3-tier architecture, which integrates in addition to the IMDs and the programmers, an Authentication Server, was proposed. This server allows authenticating programmers and distributing credentials (useful for establishing secure communication with the IMD).…”
Section: Introductionmentioning
confidence: 99%
“…Various types of cyber-attacks have recently been attempted on biomedical information systems [1, 2]. This is mainly because the personal records included in biomedical systems represent valuable financial information.…”
Section: Introductionmentioning
confidence: 99%