Patients, pacemakers, and implantable defibrillators: human values and security for wireless implantable medical devices

@article{Denning2010PatientsPA,
  title={Patients, pacemakers, and implantable defibrillators: human values and security for wireless implantable medical devices},
  author={Tamara Denning and Alan Borning and Batya Friedman and Brian T. Gill and Tadayoshi Kohno and William H. Maisel},
  journal={Proceedings of the SIGCHI Conference on Human Factors in Computing Systems},
  year={2010}
}
Implantable medical devices (IMDs) improve patients' quality of life and help sustain their lives. In this study, we explore patient views and values regarding their devices to inform the design of computer security for wireless IMDs. We interviewed 13 individuals with implanted cardiac devices. Key questions concerned the evaluation of 8 mockups of IMD security systems. Our results suggest that some systems that are technically viable are nonetheless undesirable to patients. Patients called… Expand
Design challenges for secure implantable medical devices
TLDR
This survey paper summarizes recent work on IMD security and discusses sound security principles to follow and common security pitfalls to avoid and the importance of understanding and addressing security and privacy concerns in an increasingly connected world. Expand
Ideas and Challenges for Securing Wireless Implantable Medical Devices: A Review
Implantable medical devices (IMDs) are normally used for monitoring and treating various medical conditions. These days, wireless modules have become an intrinsic part of many modern IMDs. So,Expand
Reliability and security of implantable and wearable medical devices
Abstract Implantable and wearable medical devices (IWMDs) are used for monitoring, diagnosis, and therapy of an ever-increasing range of medical conditions, leading to improved quality of life andExpand
Securing Implantable Cardioverter Defibrillators Using Smartphones
TLDR
A novel security framework to protect Implantable Cardioverter Defibrillators (ICDs) using Smartphones using Kerberos based security scheme is proposed using simulated EP, ICD, and an Androidbased smartphone. Expand
Implantable Medical Devices : Device security and emergency access
markdownabstractImplantable Medical Devices (IMDs) are battery-powered devices that are implanted in the human body and which employ local (electric) stimulation to treat a wide range of medicalExpand
Security and privacy issues in implantable medical devices: A comprehensive survey
TLDR
This article surveys the main security goals for the next generation of IMDs and analyzes the most relevant protection mechanisms proposed so far, with the battery lifetime being another critical parameter in the design phase. Expand
Access Control Schemes for Implantable Medical Devices: A Survey
TLDR
A comprehensive survey of the existing literature on IMD security, with a focus on the access control schemes to prevent unauthorized access, and discusses the viability of online authentication and low/zero power authentication in the IMD context. Expand
ON AWARENESS OF CYBERSECURITY OF WIRELESS IMPLANTABLE MEDICAL DEVICES
Implantable medical devices (IMDs) have become widely utilized medical care options for people with chronic illnesses such as type I diabetes and heart arrhythmias since they provide convenient,Expand
Security That Is Meant to Be Skin Deep: Using Ultraviolet Micropigmentation to Store Emergency-Access Keys for Implantable Medical Devices
TLDR
It is proposed that access keys be written into patients’ skin using ultraviolet-ink micropigmentation (invisible tattoos), which gives the greatest control to reluctant patients and guarantees a minimum level of key entropy and can be augmented with error correcting codes. Expand
Implantable devices, often dependent on software, save countless lives. But how secure are they?
TLDR
Medical devices comprise a broad range of instruments and implements that have more and more embedded software with communication mechanisms that now qualify them as information systems, which includes internal hardware and software aspects as well as intentional and unintentional external threats. Expand
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 37 REFERENCES
Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses
TLDR
This paper is the first in the community to use general-purpose software radios to analyze and attack previously unknown radio communications protocols, and introduces three new zero-power defenses based on RF power harvesting. Expand
Security and Privacy for Implantable Medical Devices
TLDR
The latest IMDs support delivery of telemetry for remote monitoring over long-range, high-bandwidth wireless links, and emerging devices will communicate with other interoperating IMDs. Expand
Absence Makes the Heart Grow Fonder: New Directions for Implantable Medical Device Security
TLDR
A class of new, fail-open defensive techniques for implantable medical devices that attempt to strike a balance between safety in the common case and security under adversarial conditions for wireless implantableMedical Alert bracelets are proposed. Expand
Proximity-based access control for implantable medical devices
TLDR
It is shown that, although implanted, IMDs can successfully verify the proximity of other devices with high accuracy and the integration of the scheme with existing IMD devices and with their existing security measures is discussed. Expand
Biosec: a biometric based approach for securing communication in wireless networks of biosensors implanted in the human body
TLDR
This paper proposes an approach wherein, biometrics derived from the body are used for securing the keying material, which obviates the need for expensive computation and avoids unnecessary communication making this approach novel compared to existing approaches. Expand
Quality of Privacy (QoP) for the Design of Ubiquitous Healthcare Applications
TLDR
The results indicate that hospital workers tend to manage privacy by assessing the value of the services provided by a ubicomp application and the amount of privacy they are willing to concede. Expand
Security and Usability
TLDR
Security & Usability is the first book-length work describing the current state of the art in this emerging field and groups 34 essays into six parts: Realigning Usability and Security---with careful attention to user-centered design principles, security and usability can be synergistic. Expand
A Privacy Awareness System for Ubiquitous Computing Environments
TLDR
This work introduces a privacy awareness system targeted at ubiquitous computing environments that allows data collectors to both announce and implement data usage policies, as well as providing data subjects with technical means to keep track of their personal information as it is stored, used, and possibly removed from the system. Expand
Privacy-Aware Autonomous Agents for Pervasive Healthcare
TLDR
Autonomous agents can help developers design privacy-aware systems that handle the threats raised by pervasive technology. Expand
Designing for Privacy in a Multi-agent World
TLDR
It is shown how the i* framework can be used to model and reason about privacy requirements and solutions, and how the impact of alternative solutions are assessed by propagating qualitative evaluations through a dependency network. Expand
...
1
2
3
4
...