2013
DOI: 10.1002/sec.939
|View full text |Cite
|
Sign up to set email alerts
|

Security of implantable medical devices: limits, requirements, and proposals

Abstract: Implantable medical devices (IMDs) are surgically implanted into a human body to collect physiological data and perform medical therapeutic functions. They are increasingly being used to improve the quality of life of patients by treating chronic ailments such as cardiac arrhythmia, diabetes, and Parkinson's disease. However, recent research has demonstrated the deficiency of wireless IMDs in enforcing security and privacy, and discussed the impact of these attacks on the patient's safety and efficacy of medic… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0
1

Year Published

2014
2014
2023
2023

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(13 citation statements)
references
References 23 publications
0
12
0
1
Order By: Relevance
“…To our knowledge, this is the first scoping review that specifically identifies legacy-compliant solutions to medical device security issues. Altawy and Youssef [10] and Ellouze et al [41] have discussed the concept of legacy-compliant solutions, but specifically focused on the area of implantable devices. Bennett [12] and Bisbal et al [13] examined the legacy problem from a software engineering perspective, but did not consider security or the medical domain.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…To our knowledge, this is the first scoping review that specifically identifies legacy-compliant solutions to medical device security issues. Altawy and Youssef [10] and Ellouze et al [41] have discussed the concept of legacy-compliant solutions, but specifically focused on the area of implantable devices. Bennett [12] and Bisbal et al [13] examined the legacy problem from a software engineering perspective, but did not consider security or the medical domain.…”
Section: Discussionmentioning
confidence: 99%
“…Altawy and Youssef [10] and Ellouze et al [41] described a denial-of-service attack against the shield: because unauthorised messages are scrambled but still processed by the IMD, the IMD's battery can be exhausted by repeatedly sending it arbitrary messages.…”
Section: ) Selective Jammingmentioning
confidence: 99%
“…Implantable IoMT devices typically requires surgeries to be implanted into patients' body. Therefore, security schemes for implantable devices have restrict requirements on power consumption, communication overhead, attack resilience, and support for emergency situations [100]. In addition to the aforementioned challenges, security schemes for implantable devices must comply with restrict regulations [101].…”
Section: Security Schemes For Implantable Iomt Devicesmentioning
confidence: 99%
“…Conforme Guimarães e Américo, os monitores voltados para o esporte profissional contam com: 2018, p. 61;ELLOUZE et al, 2014).…”
Section: São Exemplos De Tecnologias Vestíveis Ounclassified