Language:
English
繁體中文
Help
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Effective Security Schemes for Wirel...
~
University of Idaho.
Effective Security Schemes for Wireless Implantable Medical Devices.
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Effective Security Schemes for Wireless Implantable Medical Devices./
Author:
Belkhouja, Taha.
Published:
Ann Arbor : ProQuest Dissertations & Theses, : 2019,
Description:
84 p.
Notes:
Source: Masters Abstracts International, Volume: 81-03.
Contained By:
Masters Abstracts International81-03.
Subject:
Information technology. -
Online resource:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=13812822
ISBN:
9781085598422
Effective Security Schemes for Wireless Implantable Medical Devices.
Belkhouja, Taha.
Effective Security Schemes for Wireless Implantable Medical Devices.
- Ann Arbor : ProQuest Dissertations & Theses, 2019 - 84 p.
Source: Masters Abstracts International, Volume: 81-03.
Thesis (M.S.)--University of Idaho, 2019.
This item must not be sold to any third party vendors.
Healthcare remote devices are recognized as a promising technology for treating health related issues. Among them are the wireless Implantable Medical Devices (IMDs): These electronic devices are manufactured to treat, monitor, support or replace defected vital organs while being implanted in the human body. Thus, they play a critical role in healing and even saving lives. Current IMDs research trends concentrate on their medical reliability. However, deploying wireless technology in such applications without considering security measures may offer adversaries an easy way to compromise them. Many malicious attacks on these devices can directly affect the patient's health in a lethal way. Using insecure wireless channels for these devices offers adversaries easy ways to steal the patient's private data and hijack these systems. On the other hand, IMDs suffer from limited resources, such as the energy supply, processing power, and storage space. This renders security schemes a critical feature for implementation. A certain balance between security and efficiency must be attained in each IMD for a satisfactory and safe functioning.Therefore, we intend throughout our work to design effective security schemes to defend these IMDs. Our goal is to create or accommodate security approaches for the specific case of any IMD. We want to ensure for any IMD-user a high efficiency from the IMD to improve his health, while guaranteeing a safe use.Our plans are to decrease the computational complexity of security algorithms and authentication protocols to fit on any IMD. We also want to explore biometric features for better and safer use. We investigate all the possible scenarios (regular or urgent) to guarantee for the patient a reliable device.
ISBN: 9781085598422Subjects--Topical Terms:
559429
Information technology.
Subjects--Index Terms:
Health related issues
Effective Security Schemes for Wireless Implantable Medical Devices.
LDR
:02993nam a2200397 4500
001
951824
005
20200821052203.5
008
200914s2019 ||||||||||||||||| ||eng d
020
$a
9781085598422
035
$a
(MiAaPQ)AAI13812822
035
$a
AAI13812822
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
Belkhouja, Taha.
$3
1241308
245
1 0
$a
Effective Security Schemes for Wireless Implantable Medical Devices.
260
1
$a
Ann Arbor :
$b
ProQuest Dissertations & Theses,
$c
2019
300
$a
84 p.
500
$a
Source: Masters Abstracts International, Volume: 81-03.
500
$a
Advisor: Sorour, Sameh.
502
$a
Thesis (M.S.)--University of Idaho, 2019.
506
$a
This item must not be sold to any third party vendors.
506
$a
This item must not be added to any third party search indexes.
520
$a
Healthcare remote devices are recognized as a promising technology for treating health related issues. Among them are the wireless Implantable Medical Devices (IMDs): These electronic devices are manufactured to treat, monitor, support or replace defected vital organs while being implanted in the human body. Thus, they play a critical role in healing and even saving lives. Current IMDs research trends concentrate on their medical reliability. However, deploying wireless technology in such applications without considering security measures may offer adversaries an easy way to compromise them. Many malicious attacks on these devices can directly affect the patient's health in a lethal way. Using insecure wireless channels for these devices offers adversaries easy ways to steal the patient's private data and hijack these systems. On the other hand, IMDs suffer from limited resources, such as the energy supply, processing power, and storage space. This renders security schemes a critical feature for implementation. A certain balance between security and efficiency must be attained in each IMD for a satisfactory and safe functioning.Therefore, we intend throughout our work to design effective security schemes to defend these IMDs. Our goal is to create or accommodate security approaches for the specific case of any IMD. We want to ensure for any IMD-user a high efficiency from the IMD to improve his health, while guaranteeing a safe use.Our plans are to decrease the computational complexity of security algorithms and authentication protocols to fit on any IMD. We also want to explore biometric features for better and safer use. We investigate all the possible scenarios (regular or urgent) to guarantee for the patient a reliable device.
590
$a
School code: 0089.
650
4
$a
Information technology.
$3
559429
650
4
$a
Electrical engineering.
$3
596380
650
4
$a
Public health.
$3
560998
650
4
$a
Biomedical engineering.
$3
588770
650
4
$a
Health sciences.
$3
1179212
653
$a
Health related issues
653
$a
Implantable Medical Devices
653
$a
Security measures
653
$a
Patient's private data
690
$a
0489
690
$a
0544
690
$a
0566
690
$a
0541
690
$a
0573
710
2
$a
University of Idaho.
$b
Electrical and Computer Engineering.
$3
1213889
773
0
$t
Masters Abstracts International
$g
81-03.
790
$a
0089
791
$a
M.S.
792
$a
2019
793
$a
English
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=13812822
based on 0 review(s)
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login