[HTML][HTML] Security and privacy issues in implantable medical devices: A comprehensive survey

C Camara, P Peris-Lopez, JE Tapiador - Journal of biomedical informatics, 2015‏ - Elsevier
Bioengineering is a field in expansion. New technologies are appearing to provide a more
efficient treatment of diseases or human deficiencies. Implantable Medical Devices (IMDs) …

A survey on security and privacy issues in Internet-of-Things

Y Yang, L Wu, G Yin, L Li, H Zhao - IEEE Internet of things …, 2017‏ - ieeexplore.ieee.org
Internet-of-Things (IoT) are everywhere in our daily life. They are used in our homes, in
hospitals, deployed outside to control and report the changes in environment, prevent fires …

Ideas and challenges for securing wireless implantable medical devices: A review

G Zheng, R Shankaran, MA Orgun, L Qiao… - IEEE Sensors …, 2016‏ - ieeexplore.ieee.org
Implantable medical devices (IMDs) are normally used for monitoring and treating various
medical conditions. These days, wireless modules have become an intrinsic part of many …

Achieving efficient and secure data acquisition for cloud-supported internet of things in smart grid

Z Guan, J Li, L Wu, Y Zhang, J Wu… - IEEE Internet of Things …, 2017‏ - ieeexplore.ieee.org
Cloud-supported Internet of Things (Cloud-IoT) has been broadly deployed in smart grid
systems. The IoT front-ends are responsible for data acquisition and status supervision …

Reliable and privacy-preserving truth discovery for mobile crowdsensing systems

C Zhang, L Zhu, C Xu, X Liu… - IEEE Transactions on …, 2019‏ - ieeexplore.ieee.org
Truth discovery has received considerable attention in mobile crowdsensing systems. In real
practice, it is vital to resolve conflicts among a large amount of sensory data and estimate the …

Security tradeoffs in cyber physical systems: A case study survey on implantable medical devices

R AlTawy, AM Youssef - Ieee Access, 2016‏ - ieeexplore.ieee.org
The new culture of networked systems that offer everywhere accessible services has given
rise to various types of security tradeoffs. In fact, with the evolution of physical systems that …

BANA: Body area network authentication exploiting channel characteristics

L Shi, M Li, S Yu, J Yuan - Proceedings of the fifth ACM conference on …, 2012‏ - dl.acm.org
Wireless body area network (BAN) is a promising technology for real-time monitoring of
physiological signals to support medical applications. In order to ensure the trustworthy and …

Achieving efficient detection against false data injection attacks in smart grid

R Xu, R Wang, Z Guan, L Wu, J Wu, X Du - IEEE Access, 2017‏ - ieeexplore.ieee.org
Internet of Things (IoT) technologies have been broadly applied in smart grid for monitoring
physical or environmental conditions. Especially, state estimation is an important IoT-based …

A Coherent and Privacy-Protecting Biometric Authentication Strategy in Cloud Computing

BP Yadav, CSS Prasad, C Padmaja… - IOP Conference …, 2020‏ - iopscience.iop.org
The Biometric authentication has become progressively more desired in current years. With
this expansion of cloud computing, database holders be influenced to expand this extensive …

A novel deep learning strategy for classifying different attack patterns for deep brain implants

H Rathore, AK Al-Ali, A Mohamed, X Du… - IEEE Access, 2019‏ - ieeexplore.ieee.org
Deep brain stimulators (DBSs), a widely used and comprehensively acknowledged
restorative methodology, are a type of implantable medical device which uses electrical …