TY - GEN
T1 - Towards trustworthy medical devices and body area networks
AU - Zhang, Meng
AU - Raghunathan, Anand
AU - Jha, Niraj K.
PY - 2013
Y1 - 2013
N2 - Implantable and wearable medical devices (IWMDs) are commonly used for diagnosing, monitoring, and treating various medical conditions. A general trend in IWMDs is towards increased functional complexity, software programmability, and connectivity to body area networks (BANs). However, as medical devices become more "intelligent," they also become less trustworthy - less reliable and more vulnerable to malicious attacks. Various shortcomings - hardware failures, software errors, wireless attacks, malware and software exploits, and side-channel attacks - could undermine the trustworthiness of IWMDs and BANs. The trustworthiness of IWMDs must be addressed aggressively and proactively due to the potential for catastrophic consequences. While some recent efforts address the defense of IWMDs against specific security attacks, a holistic strategy that considers all concerns and types of threats is required. This paper discusses trustworthiness concerns in IWMDs and BANs through a comprehensive identification and analysis of potential threats and, for each threat, provides a discussion of the merits and inadequacies of current solutions.
AB - Implantable and wearable medical devices (IWMDs) are commonly used for diagnosing, monitoring, and treating various medical conditions. A general trend in IWMDs is towards increased functional complexity, software programmability, and connectivity to body area networks (BANs). However, as medical devices become more "intelligent," they also become less trustworthy - less reliable and more vulnerable to malicious attacks. Various shortcomings - hardware failures, software errors, wireless attacks, malware and software exploits, and side-channel attacks - could undermine the trustworthiness of IWMDs and BANs. The trustworthiness of IWMDs must be addressed aggressively and proactively due to the potential for catastrophic consequences. While some recent efforts address the defense of IWMDs against specific security attacks, a holistic strategy that considers all concerns and types of threats is required. This paper discusses trustworthiness concerns in IWMDs and BANs through a comprehensive identification and analysis of potential threats and, for each threat, provides a discussion of the merits and inadequacies of current solutions.
UR - http://www.scopus.com/inward/record.url?scp=84879854202&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84879854202&partnerID=8YFLogxK
U2 - 10.1145/2463209.2488751
DO - 10.1145/2463209.2488751
M3 - Conference contribution
AN - SCOPUS:84879854202
SN - 9781450320719
T3 - Proceedings - Design Automation Conference
BT - Proceedings of the 50th Annual Design Automation Conference, DAC 2013
T2 - 50th Annual Design Automation Conference, DAC 2013
Y2 - 29 May 2013 through 7 June 2013
ER -