Back to Results
First PageMeta Content
Bioengineering / Body area network / Ubiquitous computing / Medical device / Encryption / Privacy / Telemetry / Two-factor authentication / Radio-frequency identification / Technology / Wireless networking / Wireless


SoK: Security and Privacy in Implantable Medical Devices and Body Area Networks Michael Rushanan, Aviel D. Rubin Computer Science Johns Hopkins University Baltimore, MD, USA ,
Add to Reading List

Document Date: 2014-04-21 13:48:10


Open Document

File Size: 196,36 KB

Share Result on Facebook

Company

Indicated Threat Threat Wireless / Atmel / Defending / Body Area Networks / B. Software Threats Software / the Guardian / Distance Bounding Software / /

Country

United States / /

/

Event

Product Recall / Product Issues / /

Facility

Aviel D. Rubin Computer Science Johns Hopkins University / Engineering University of Michigan Ann Arbor / /

IndustryTerm

area networks / typical distance-bounding protocol / wireless telemetry threats / implanted sensor networks / external proxy device / area network / software implementations / medical device software / authenticated mobile device / safetycritical systems / Wireless jamming Analog sensor injection Battery depletion Protocol Design Flaws Software / wireless communications / wireless transmissions / safety-critical devices / trustworthy hardware / wireless telemetry interface / level communication protocol / implantable medical devices / software packages / Wireless modification Wireless replay / medical equipment / networked medical devices / agreement protocol / communications standards / rst public software security analysis / system manufacturer / passive and active wireless attacks / energy / software defects / calibrated saline solution / homogeneous and heterogeneous autonomous devices / implantable medical device / increased energy efficiency / sensor networks / software defined / software bugs / defines wireless medical telemetry / respective device / deployed medical devices / access to medical devices / energy efficiency / real-time monitoring / wireless medical telemetry system / communication networks / distance-bounding protocols / typical wireless sensor network / phrase wireless telemetry / security protocols / lightweight communication protocols / wireless attacks / device-specific software / authentication protocol / analog sensor systems / food-grade meat / Wireless Attacks Attack contribution Distance / embedded systems / wireless telemetry / wireless network / software exploits / software exploitation / drop wireless communications / term medical device / wireless sensor networks / software threats / defective devices / wireless signals / external device / external wearable device / power key exchange Wireless / wireless networks / neural devices / device systems / ultra-low-power wireless connectivity / external programming devices / auth using wireless channel / acoustic authentication Wireless / possible software vulnerabilities / wireless data / external devices / wireless threats / trustworthy software / software vulnerabilities / onbody device / cardiac implantable electrical devices / wearable computing devices / partial solutions / make small-scale sense-actuate systems / authentication protocols / wireless medical telemetry / heterogeneous computing devices / /

MusicGroup

MHz / /

Organization

IMD / M. Swanson Computer Science and Engineering University of Michigan Ann Arbor / Association for the Advancement of Medical Instrumentation / FDA / U.S. Federal Communications Commission / MIT / Johns Hopkins University / Medical Implant Communication Service / /

Person

Dick Cheney / Michael Rushanan / Colleen M. Swanson / /

Position

Vice President / physician / ICD/Programmer / programmer communication / malicious programmer / programmer / hospital administrator / unauthenticated programmer / Internet Programmer / /

Product

defective devices / devices / /

ProgrammingLanguage

C / /

PublishedMedium

the Guardian / PLoS ONE / /

Technology

high-level communication protocol / secret key / IPIbased authentication protocol / mobile devices / authentication protocols / distance-bounding protocols / lightweight communication protocols / wireless communications / smartphone / key agreement protocol / mobile device / known security protocols / MRI / Wireless jamming Analog sensor injection Battery depletion Protocol / typical distance-bounding protocol / smartphones / secure Information Technology / radio frequency / /

SocialTag