[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Wu et al., 2017 - Google Patents

Access control schemes for implantable medical devices: A survey

Wu et al., 2017

View PDF
Document ID
16515082204009089272
Author
Wu L
Du X
Guizani M
Mohamed A
Publication year
Publication venue
IEEE Internet of Things Journal

External Links

Snippet

Implantable medical devices (IMDs) are electronic devices implanted within human body for diagnostic, monitoring, and therapeutic purposes. It is imperative to guarantee that IMDs are completely secured since the patient's life is closely bound to the robustness and …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • AHUMAN NECESSITIES
    • A61MEDICAL OR VETERINARY SCIENCE; HYGIENE
    • A61NELECTROTHERAPY; MAGNETOTHERAPY; RADIATION THERAPY; ULTRASOUND THERAPY
    • A61N1/00Electrotherapy; Circuits therefor
    • A61N1/18Applying electric currents by contact electrodes
    • A61N1/32Applying electric currents by contact electrodes alternating or intermittent currents
    • A61N1/36Applying electric currents by contact electrodes alternating or intermittent currents for stimulation, e.g. heart pace-makers
    • A61N1/372Arrangements in connection with the implantation of stimulators
    • A61N1/37211Means for communicating with stimulators
    • A61N1/37252Details of algorithms or data aspects of communicaton system, e.g. handshaking, transmitting specific data or segmenting data
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2105Dual mode as a secondary aspect
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F19/00Digital computing or data processing equipment or methods, specially adapted for specific applications
    • G06F19/30Medical informatics, i.e. computer-based analysis or dissemination of patient or disease data
    • G06F19/34Computer-assisted medical diagnosis or treatment, e.g. computerised prescription or delivery of medication or diets, computerised local control of medical devices, medical expert systems or telemedicine
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual entry or exit registers
    • G07C9/00007Access-control involving the use of a pass
    • G07C9/00031Access-control involving the use of a pass in combination with an identity-check of the pass-holder

Similar Documents

Publication Publication Date Title
Wu et al. Access control schemes for implantable medical devices: A survey
Ghubaish et al. Recent advances in the internet-of-medical-things (IoMT) systems security
Sun et al. Security and privacy for the internet of medical things enabled healthcare systems: A survey
Yaacoub et al. Securing internet of medical things systems: Limitations, issues and recommendations
Papaioannou et al. A survey on security threats and countermeasures in internet of medical things (IoMT)
Sharma et al. A lightweight user authentication scheme for cloud-IoT based healthcare services
Narwal et al. A survey on security and authentication in wireless body area networks
Zheng et al. Ideas and challenges for securing wireless implantable medical devices: A review
Camara et al. Security and privacy issues in implantable medical devices: A comprehensive survey
AlTawy et al. Security tradeoffs in cyber physical systems: A case study survey on implantable medical devices
Xu et al. IMDGuard: Securing implantable medical devices with the external wearable guardian
Rathore et al. A review of security challenges, attacks and resolutions for wireless medical devices
Halperin et al. Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses
US20150089590A1 (en) Methods for secure control of and secure data extraction from implantable medical devices using smartphones or other mobile devices
Challa et al. Authentication protocols for implantable medical devices: Taxonomy, analysis and future directions
Wang et al. Security in wearable communications
Umar et al. Mutual authentication in body area networks using signal propagation characteristics
Wazid et al. ASCP-IoMT: AI-enabled lightweight secure communication protocol for internet of medical things
Siddiqi et al. Imdfence: Architecting a secure protocol for implantable medical devices
Ellouze et al. Powerless security for cardiac implantable medical devices: Use of wireless identification and sensing platform
Ellouze et al. Security of implantable medical devices: Limits, requirements, and proposals
Law et al. Kalwen: A new practical and interoperable key management scheme for body sensor networks
Zheng et al. From WannaCry to WannaDie: Security trade-offs and design for implantable medical devices
Arya et al. Data security for WBAN in e-health IoT applications
Wu et al. Designing novel proxy-based access control scheme for implantable medical devices