Securing Legacy Mobile Medical Devices

نویسندگان

  • Vahab Pournaghshband
  • Majid Sarrafzadeh
  • Peter L. Reiher
چکیده

Millions of people use mobile medical devices—more every day. But our understanding of device security and privacy for such devices is incomplete. Man-inthe-middle attacks can be performed on typical Bluetooth-enabled mobile medical devices, compromising the privacy and safety of patients. In response, we developed the Personal Security Device, a portable device to improve security for mobile medical systems. This device requires no changes to either the medical device or its monitoring software, and offers protection for millions of existing devices. We evaluate our defense mechanism to show that it adds insignificant overhead and analyze its robustness against various attacks.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Increasing Trustworthiness of Face Authentication in Mobile Devices by Modeling Gesture Behavior and Location Using Neural Networks

Personal mobile devices currently have access to a significant portion of their user’s private sensitive data and are increasingly used for processing mobile payments. Consequently, securing access to these mobile devices is a requirement for securing access to the sensitive data and potentially costly services. Face authentication is one of the promising biometrics-based user authentication me...

متن کامل

Securing AODV routing protocol against the black hole attack using Firefly algorithm

Mobile ad hoc networks are networks composed of wireless devices to create a network with the ability for self-organization. These networks are designed as a new generation of computer networks to satisfy some specific requirements and with features different from wired networks. These networks have no fixed communication infrastructure and for communication with other nodes the intermediate no...

متن کامل

Securing mobile devices: malware mitigation methods

Malware on mobile handsets has always been a point of concern for its users. With the widespread adoption of smartphones and tablets and the emergence of centralized application markets it started to represent a significant threat. This situation has led to the development of defence methods for securing mobile devices coming from operating system developers, antivirus vendors and security rese...

متن کامل

Security of Telemedical Applications over the Internet using Programmable Cellular Automata

As the increasing number of telemedical applications over the Internet using mobile devices (PDAs, Tablet PC, various medical devices, and so on), for access of medical data in terms of telemedicine and remote patient telemonitoring, the necessity of new powerful encryption techniques becomes a crucial issue. In this paper is presented a fully functional software encryption system based on a co...

متن کامل

Protecting Applications and Devices in Nomadic Business Environments

This paper presents a pragmatic approach to protect the integrity of execution of an application in a nomadic business environment. Applications run in such contexts are based on the federation of appliances collaborating through direct communication as well as through the distribution of mobile pieces of code. Securing the operation of an application means protecting mobile code since executio...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012