Skip to main content

2014 | OriginalPaper | Buchkapitel

8. Attacking and Defending a Diabetes Therapy System

verfasst von : Chunxiao Li, Meng Zhang, Anand Raghunathan, Niraj K. Jha

Erschienen in: Security and Privacy for Implantable Medical Devices

Verlag: Springer New York

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Wearable and implantable medical devices are being increasingly deployed to improve diagnosis, monitoring, and therapy for a range of medical conditions.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
4.
Zurück zum Zitat Hacker shows off lethal attack by controlling wireless medical device, http://go.bloomberg.com/tech-blog/2012-02-29-hacker-shows-off-lethal-attack-%by-controlling-wireless-medical-device/. Hacker shows off lethal attack by controlling wireless medical device, http://​go.​bloomberg.​com/​tech-blog/​2012-02-29-hacker-shows-off-lethal-attack-%by-controlling-wireless-medical-device/.
8.
Zurück zum Zitat A. I. Alrabady and S. M. Mahmud. Analysis of attacks against the security of keyless-entry systems for vehicles and suggestions for improved designs. IEEE Trans. Vehicular Technology, 54:41–50, Jan. 2005.CrossRef A. I. Alrabady and S. M. Mahmud. Analysis of attacks against the security of keyless-entry systems for vehicles and suggestions for improved designs. IEEE Trans. Vehicular Technology, 54:41–50, Jan. 2005.CrossRef
9.
Zurück zum Zitat H. Baldus, S. Corroy, A. Fazzi, K. Klabunde, and T. Schenk. Human-centric connectivity enabled by body-coupled communications. IEEE Communications Magazine, 47:172–178, June 2009.CrossRef H. Baldus, S. Corroy, A. Fazzi, K. Klabunde, and T. Schenk. Human-centric connectivity enabled by body-coupled communications. IEEE Communications Magazine, 47:172–178, June 2009.CrossRef
10.
Zurück zum Zitat S. Gollakota, H. Hassanieh, B. Ransford, D. Katabi, and K. Fu. They can hear your heartbeats: Non-invasive security for implantable medical devices. In Proc. ACM Conf. Special Interest Group on Data Communication, Aug. 2011. S. Gollakota, H. Hassanieh, B. Ransford, D. Katabi, and K. Fu. They can hear your heartbeats: Non-invasive security for implantable medical devices. In Proc. ACM Conf. Special Interest Group on Data Communication, Aug. 2011.
11.
Zurück zum Zitat D. Halperin, T. S. Heydt-Benjamin, B. Ransford, S. S. Clark, B. Defend, W. Morgan, K. Fu, T. Kohno, and W. H. Maisel. Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses. In Proc. IEEE Symp. Security and Privacy, pages 129–142, May 2008. D. Halperin, T. S. Heydt-Benjamin, B. Ransford, S. S. Clark, B. Defend, W. Morgan, K. Fu, T. Kohno, and W. H. Maisel. Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses. In Proc. IEEE Symp. Security and Privacy, pages 129–142, May 2008.
12.
Zurück zum Zitat N. G. Leveson and C. S. Turner. An investigation of the Therac-25 accidents. Computer, 26: 18–41, July 1993.CrossRef N. G. Leveson and C. S. Turner. An investigation of the Therac-25 accidents. Computer, 26: 18–41, July 1993.CrossRef
13.
Zurück zum Zitat C. Li, A. Raghunathan, and N. K. Jha. Hijacking an insulin pump: Security attacks and defenses for a diabetes therapy system. In Proc. IEEE Int. Conf. on e-Health Networking Applications and Services, pages 150–156, June 2011. C. Li, A. Raghunathan, and N. K. Jha. Hijacking an insulin pump: Security attacks and defenses for a diabetes therapy system. In Proc. IEEE Int. Conf. on e-Health Networking Applications and Services, pages 150–156, June 2011.
14.
Zurück zum Zitat M. Novotny and T. Kasper. Cryptanalysis of KeeLoq with COPACOBANA. In Proc. Wkshp. Special Purpose Hardware for Attacking Cryptographic Systems, pages 159–164, Sept. 2009. M. Novotny and T. Kasper. Cryptanalysis of KeeLoq with COPACOBANA. In Proc. Wkshp. Special Purpose Hardware for Attacking Cryptographic Systems, pages 159–164, Sept. 2009.
15.
Zurück zum Zitat J. Radcliffe. Hacking medical devices for fun and insulin: Breaking the human SCADA System. In Proc. Black Hat Technical Security Conference, July-Aug. 2011. J. Radcliffe. Hacking medical devices for fun and insulin: Breaking the human SCADA System. In Proc. Black Hat Technical Security Conference, July-Aug. 2011.
16.
Zurück zum Zitat C. H. Raine, L. E. Schrock, S. V. Edelman, S. R. Mudaliar, W. Zhong, L. J. Proud, and J. L. Parkes. Significant insulin dose errors may occur if blood glucose results are obtained from miscoded meters. J. Diabetes Science and Technology, 1(2):205–210, Mar. 2007. C. H. Raine, L. E. Schrock, S. V. Edelman, S. R. Mudaliar, W. Zhong, L. J. Proud, and J. L. Parkes. Significant insulin dose errors may occur if blood glucose results are obtained from miscoded meters. J. Diabetes Science and Technology, 1(2):205–210, Mar. 2007.
17.
Zurück zum Zitat F. Xu, Z. Qin, C. C. Tan, B. Wang, and Q. Li. IMDGuard: Securing implantable medical devices with the external wearable guardian. In Proc. IEEE Int. Conf. Computer Communications, pages 1862–1870, Apr. 2011. F. Xu, Z. Qin, C. C. Tan, B. Wang, and Q. Li. IMDGuard: Securing implantable medical devices with the external wearable guardian. In Proc. IEEE Int. Conf. Computer Communications, pages 1862–1870, Apr. 2011.
18.
Zurück zum Zitat H.-J. Yoo, S.-J. Song, N. Cho, and H.-J. Kim. Low energy on-body communication for BSN. In Proc. Int. Wkshp. Wearable and Implantable Body Sensor Networks, pages 15–20, Mar. 2007. H.-J. Yoo, S.-J. Song, N. Cho, and H.-J. Kim. Low energy on-body communication for BSN. In Proc. Int. Wkshp. Wearable and Implantable Body Sensor Networks, pages 15–20, Mar. 2007.
19.
Zurück zum Zitat M. Zhang, A. Raghunathan, and N. K. Jha. MedMon: Securing medical devices through wireless monitoring and anomaly detection. IEEE Trans. on Biomedical Circuits and Systems, accepted for publication. M. Zhang, A. Raghunathan, and N. K. Jha. MedMon: Securing medical devices through wireless monitoring and anomaly detection. IEEE Trans. on Biomedical Circuits and Systems, accepted for publication.
Metadaten
Titel
Attacking and Defending a Diabetes Therapy System
verfasst von
Chunxiao Li
Meng Zhang
Anand Raghunathan
Niraj K. Jha
Copyright-Jahr
2014
Verlag
Springer New York
DOI
https://doi.org/10.1007/978-1-4614-1674-6_8

Neuer Inhalt