Amazon cover image
Image from Amazon.com

Security for Wireless Implantable Medical Devices [electronic resource] / by Xiali Hei, Xiaojiang Du.

By: Contributor(s): Series: SpringerBriefs in Computer SciencePublisher: New York, NY : Springer New York : Imprint: Springer, 2013Description: XI, 45 p. 13 illus. online resourceContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9781461471530
Subject(s): Genre/Form: Additional physical formats: Printed edition:: No titleDDC classification:
  • 003.54 23
LOC classification:
  • QA268
Online resources:
Contents:
Overview -- Related Work -- The Resource Depletion Attack and Defense Scheme -- IMD Access Control during Emergencies -- Conclusion and Future Directions.
In: Springer eBooksSummary: In the treatment of chronic diseases, wireless Implantable Medical Devices (IMDs) are commonly used to communicate with an outside programmer (reader). Such communication raises serious security concerns, such as the ability for hackers to gain access to a patient’s medical records. This brief provides an overview of such attacks and the new security challenges, defenses, design issues, modeling and performance evaluation in wireless IMDs.  While studying the vulnerabilities of IMDs and corresponding security defenses, the reader will also learn the methodologies and tools for designing security schemes, modeling, security analysis, and performance evaluation, thus keeping pace with quickly-evolving wireless security research.
Item type: eBooks
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

Overview -- Related Work -- The Resource Depletion Attack and Defense Scheme -- IMD Access Control during Emergencies -- Conclusion and Future Directions.

In the treatment of chronic diseases, wireless Implantable Medical Devices (IMDs) are commonly used to communicate with an outside programmer (reader). Such communication raises serious security concerns, such as the ability for hackers to gain access to a patient’s medical records. This brief provides an overview of such attacks and the new security challenges, defenses, design issues, modeling and performance evaluation in wireless IMDs.  While studying the vulnerabilities of IMDs and corresponding security defenses, the reader will also learn the methodologies and tools for designing security schemes, modeling, security analysis, and performance evaluation, thus keeping pace with quickly-evolving wireless security research.

Copyright © 2020 Alfaisal University Library. All Rights Reserved.
Tel: +966 11 2158948 Fax: +966 11 2157910 Email:
librarian@alfaisal.edu