Wu et al., 2017 - Google Patents
Access control schemes for implantable medical devices: A surveyWu et al., 2017
View PDF- Document ID
- 16515082204009089272
- Author
- Wu L
- Du X
- Guizani M
- Mohamed A
- Publication year
- Publication venue
- IEEE Internet of Things Journal
External Links
Snippet
Implantable medical devices (IMDs) are electronic devices implanted within human body for diagnostic, monitoring, and therapeutic purposes. It is imperative to guarantee that IMDs are completely secured since the patient's life is closely bound to the robustness and …
- 230000036541 health 0 abstract description 8
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- A—HUMAN NECESSITIES
- A61—MEDICAL OR VETERINARY SCIENCE; HYGIENE
- A61N—ELECTROTHERAPY; MAGNETOTHERAPY; RADIATION THERAPY; ULTRASOUND THERAPY
- A61N1/00—Electrotherapy; Circuits therefor
- A61N1/18—Applying electric currents by contact electrodes
- A61N1/32—Applying electric currents by contact electrodes alternating or intermittent currents
- A61N1/36—Applying electric currents by contact electrodes alternating or intermittent currents for stimulation, e.g. heart pace-makers
- A61N1/372—Arrangements in connection with the implantation of stimulators
- A61N1/37211—Means for communicating with stimulators
- A61N1/37252—Details of algorithms or data aspects of communicaton system, e.g. handshaking, transmitting specific data or segmenting data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2105—Dual mode as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F19/00—Digital computing or data processing equipment or methods, specially adapted for specific applications
- G06F19/30—Medical informatics, i.e. computer-based analysis or dissemination of patient or disease data
- G06F19/34—Computer-assisted medical diagnosis or treatment, e.g. computerised prescription or delivery of medication or diets, computerised local control of medical devices, medical expert systems or telemedicine
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual entry or exit registers
- G07C9/00007—Access-control involving the use of a pass
- G07C9/00031—Access-control involving the use of a pass in combination with an identity-check of the pass-holder
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Wu et al. | Access control schemes for implantable medical devices: A survey | |
Ghubaish et al. | Recent advances in the internet-of-medical-things (IoMT) systems security | |
Sun et al. | Security and privacy for the internet of medical things enabled healthcare systems: A survey | |
Yaacoub et al. | Securing internet of medical things systems: Limitations, issues and recommendations | |
Papaioannou et al. | A survey on security threats and countermeasures in internet of medical things (IoMT) | |
Sharma et al. | A lightweight user authentication scheme for cloud-IoT based healthcare services | |
Narwal et al. | A survey on security and authentication in wireless body area networks | |
Zheng et al. | Ideas and challenges for securing wireless implantable medical devices: A review | |
Camara et al. | Security and privacy issues in implantable medical devices: A comprehensive survey | |
AlTawy et al. | Security tradeoffs in cyber physical systems: A case study survey on implantable medical devices | |
Xu et al. | IMDGuard: Securing implantable medical devices with the external wearable guardian | |
Rathore et al. | A review of security challenges, attacks and resolutions for wireless medical devices | |
Halperin et al. | Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses | |
US20150089590A1 (en) | Methods for secure control of and secure data extraction from implantable medical devices using smartphones or other mobile devices | |
Challa et al. | Authentication protocols for implantable medical devices: Taxonomy, analysis and future directions | |
Wang et al. | Security in wearable communications | |
Umar et al. | Mutual authentication in body area networks using signal propagation characteristics | |
Wazid et al. | ASCP-IoMT: AI-enabled lightweight secure communication protocol for internet of medical things | |
Siddiqi et al. | Imdfence: Architecting a secure protocol for implantable medical devices | |
Ellouze et al. | Powerless security for cardiac implantable medical devices: Use of wireless identification and sensing platform | |
Ellouze et al. | Security of implantable medical devices: Limits, requirements, and proposals | |
Law et al. | Kalwen: A new practical and interoperable key management scheme for body sensor networks | |
Zheng et al. | From WannaCry to WannaDie: Security trade-offs and design for implantable medical devices | |
Arya et al. | Data security for WBAN in e-health IoT applications | |
Wu et al. | Designing novel proxy-based access control scheme for implantable medical devices |