Effective Security Schemes for Wireless Implantable Medical Devices

Effective Security Schemes for Wireless Implantable Medical Devices
Author :
Publisher :
Total Pages : 144
Release :
ISBN-10 : 108559842X
ISBN-13 : 9781085598422
Rating : 4/5 (2X Downloads)

Book Synopsis Effective Security Schemes for Wireless Implantable Medical Devices by : Taha Belkhouja

Download or read book Effective Security Schemes for Wireless Implantable Medical Devices written by Taha Belkhouja and published by . This book was released on 2019 with total page 144 pages. Available in PDF, EPUB and Kindle. Book excerpt: Healthcare remote devices are recognized as a promising technology for treating health related issues. Among them are the wireless Implantable Medical Devices (IMDs): These electronic devices are manufactured to treat, monitor, support or replace defected vital organs while being implanted in the human body. Thus, they play a critical role in healing and even saving lives. Current IMDs research trends concentrate on their medical reliability. However, deploying wireless technology in such applications without considering security measures may offer adversaries an easy way to compromise them. Many malicious attacks on these devices can directly affect the patient's health in a lethal way. Using insecure wireless channels for these devices offers adversaries easy ways to steal the patient's private data and hijack these systems. On the other hand, IMDs suffer from limited resources, such as the energy supply, processing power, and storage space. This renders security schemes a critical feature for implementation. A certain balance between security and efficiency must be attained in each IMD for a satisfactory and safe functioning. Therefore, we intend throughout our work to design effective security schemes to defend these IMDs. Our goal is to create or accommodate security approaches for the specific case of any IMD. We want to ensure for any IMD-user a high efficiency from the IMD to improve his health, while guaranteeing a safe use. Our plans are to decrease the computational complexity of security algorithms and authentication protocols to fit on any IMD. We also want to explore biometric features for better and safer use. We investigate all the possible scenarios (regular or urgent) to guarantee for the patient a reliable device.


Effective Security Schemes for Wireless Implantable Medical Devices Related Books

Effective Security Schemes for Wireless Implantable Medical Devices
Language: en
Pages: 144
Authors: Taha Belkhouja
Categories: Implants, Artificial
Type: BOOK - Published: 2019 - Publisher:

DOWNLOAD EBOOK

Healthcare remote devices are recognized as a promising technology for treating health related issues. Among them are the wireless Implantable Medical Devices (
Security for Wireless Implantable Medical Devices
Language: en
Pages: 52
Authors: Xiali Hei
Categories: Computers
Type: BOOK - Published: 2013-03-25 - Publisher: Springer Science & Business Media

DOWNLOAD EBOOK

In the treatment of chronic diseases, wireless Implantable Medical Devices (IMDs) are commonly used to communicate with an outside programmer (reader). Such com
Security Issues and Defense Methods for Wireless Medical Devices
Language: en
Pages: 165
Authors: Xiali Hei
Categories:
Type: BOOK - Published: 2014 - Publisher:

DOWNLOAD EBOOK

This dissertation evaluates the design of several defense schemes for wireless medical devices to address security issues. These schemes are designed to enable
Designing Effective Security and Privacy Schemes for Wireless Mobile Devices
Language: en
Pages: 170
Authors: Longfei Wu
Categories:
Type: BOOK - Published: 2017 - Publisher:

DOWNLOAD EBOOK

The growing ubiquity of modern wireless and mobile electronic devices has brought our daily lives with more convenience and fun. Today's smartphones are equippe
Security and Privacy for Implantable Medical Devices
Language: en
Pages: 0
Authors: Wayne Burleson
Categories: Technology & Engineering
Type: BOOK - Published: 2016-08-23 - Publisher: Springer

DOWNLOAD EBOOK

This book presents a systematic approach to analyzing the challenging engineering problems posed by the need for security and privacy in implantable medical dev