Skip to main content
Top

2014 | OriginalPaper | Chapter

8. Attacking and Defending a Diabetes Therapy System

Authors : Chunxiao Li, Meng Zhang, Anand Raghunathan, Niraj K. Jha

Published in: Security and Privacy for Implantable Medical Devices

Publisher: Springer New York

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Wearable and implantable medical devices are being increasingly deployed to improve diagnosis, monitoring, and therapy for a range of medical conditions.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
4.
go back to reference Hacker shows off lethal attack by controlling wireless medical device, http://go.bloomberg.com/tech-blog/2012-02-29-hacker-shows-off-lethal-attack-%by-controlling-wireless-medical-device/. Hacker shows off lethal attack by controlling wireless medical device, http://​go.​bloomberg.​com/​tech-blog/​2012-02-29-hacker-shows-off-lethal-attack-%by-controlling-wireless-medical-device/.
8.
go back to reference A. I. Alrabady and S. M. Mahmud. Analysis of attacks against the security of keyless-entry systems for vehicles and suggestions for improved designs. IEEE Trans. Vehicular Technology, 54:41–50, Jan. 2005.CrossRef A. I. Alrabady and S. M. Mahmud. Analysis of attacks against the security of keyless-entry systems for vehicles and suggestions for improved designs. IEEE Trans. Vehicular Technology, 54:41–50, Jan. 2005.CrossRef
9.
go back to reference H. Baldus, S. Corroy, A. Fazzi, K. Klabunde, and T. Schenk. Human-centric connectivity enabled by body-coupled communications. IEEE Communications Magazine, 47:172–178, June 2009.CrossRef H. Baldus, S. Corroy, A. Fazzi, K. Klabunde, and T. Schenk. Human-centric connectivity enabled by body-coupled communications. IEEE Communications Magazine, 47:172–178, June 2009.CrossRef
10.
go back to reference S. Gollakota, H. Hassanieh, B. Ransford, D. Katabi, and K. Fu. They can hear your heartbeats: Non-invasive security for implantable medical devices. In Proc. ACM Conf. Special Interest Group on Data Communication, Aug. 2011. S. Gollakota, H. Hassanieh, B. Ransford, D. Katabi, and K. Fu. They can hear your heartbeats: Non-invasive security for implantable medical devices. In Proc. ACM Conf. Special Interest Group on Data Communication, Aug. 2011.
11.
go back to reference D. Halperin, T. S. Heydt-Benjamin, B. Ransford, S. S. Clark, B. Defend, W. Morgan, K. Fu, T. Kohno, and W. H. Maisel. Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses. In Proc. IEEE Symp. Security and Privacy, pages 129–142, May 2008. D. Halperin, T. S. Heydt-Benjamin, B. Ransford, S. S. Clark, B. Defend, W. Morgan, K. Fu, T. Kohno, and W. H. Maisel. Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses. In Proc. IEEE Symp. Security and Privacy, pages 129–142, May 2008.
12.
go back to reference N. G. Leveson and C. S. Turner. An investigation of the Therac-25 accidents. Computer, 26: 18–41, July 1993.CrossRef N. G. Leveson and C. S. Turner. An investigation of the Therac-25 accidents. Computer, 26: 18–41, July 1993.CrossRef
13.
go back to reference C. Li, A. Raghunathan, and N. K. Jha. Hijacking an insulin pump: Security attacks and defenses for a diabetes therapy system. In Proc. IEEE Int. Conf. on e-Health Networking Applications and Services, pages 150–156, June 2011. C. Li, A. Raghunathan, and N. K. Jha. Hijacking an insulin pump: Security attacks and defenses for a diabetes therapy system. In Proc. IEEE Int. Conf. on e-Health Networking Applications and Services, pages 150–156, June 2011.
14.
go back to reference M. Novotny and T. Kasper. Cryptanalysis of KeeLoq with COPACOBANA. In Proc. Wkshp. Special Purpose Hardware for Attacking Cryptographic Systems, pages 159–164, Sept. 2009. M. Novotny and T. Kasper. Cryptanalysis of KeeLoq with COPACOBANA. In Proc. Wkshp. Special Purpose Hardware for Attacking Cryptographic Systems, pages 159–164, Sept. 2009.
15.
go back to reference J. Radcliffe. Hacking medical devices for fun and insulin: Breaking the human SCADA System. In Proc. Black Hat Technical Security Conference, July-Aug. 2011. J. Radcliffe. Hacking medical devices for fun and insulin: Breaking the human SCADA System. In Proc. Black Hat Technical Security Conference, July-Aug. 2011.
16.
go back to reference C. H. Raine, L. E. Schrock, S. V. Edelman, S. R. Mudaliar, W. Zhong, L. J. Proud, and J. L. Parkes. Significant insulin dose errors may occur if blood glucose results are obtained from miscoded meters. J. Diabetes Science and Technology, 1(2):205–210, Mar. 2007. C. H. Raine, L. E. Schrock, S. V. Edelman, S. R. Mudaliar, W. Zhong, L. J. Proud, and J. L. Parkes. Significant insulin dose errors may occur if blood glucose results are obtained from miscoded meters. J. Diabetes Science and Technology, 1(2):205–210, Mar. 2007.
17.
go back to reference F. Xu, Z. Qin, C. C. Tan, B. Wang, and Q. Li. IMDGuard: Securing implantable medical devices with the external wearable guardian. In Proc. IEEE Int. Conf. Computer Communications, pages 1862–1870, Apr. 2011. F. Xu, Z. Qin, C. C. Tan, B. Wang, and Q. Li. IMDGuard: Securing implantable medical devices with the external wearable guardian. In Proc. IEEE Int. Conf. Computer Communications, pages 1862–1870, Apr. 2011.
18.
go back to reference H.-J. Yoo, S.-J. Song, N. Cho, and H.-J. Kim. Low energy on-body communication for BSN. In Proc. Int. Wkshp. Wearable and Implantable Body Sensor Networks, pages 15–20, Mar. 2007. H.-J. Yoo, S.-J. Song, N. Cho, and H.-J. Kim. Low energy on-body communication for BSN. In Proc. Int. Wkshp. Wearable and Implantable Body Sensor Networks, pages 15–20, Mar. 2007.
19.
go back to reference M. Zhang, A. Raghunathan, and N. K. Jha. MedMon: Securing medical devices through wireless monitoring and anomaly detection. IEEE Trans. on Biomedical Circuits and Systems, accepted for publication. M. Zhang, A. Raghunathan, and N. K. Jha. MedMon: Securing medical devices through wireless monitoring and anomaly detection. IEEE Trans. on Biomedical Circuits and Systems, accepted for publication.
Metadata
Title
Attacking and Defending a Diabetes Therapy System
Authors
Chunxiao Li
Meng Zhang
Anand Raghunathan
Niraj K. Jha
Copyright Year
2014
Publisher
Springer New York
DOI
https://doi.org/10.1007/978-1-4614-1674-6_8