{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,8]],"date-time":"2024-08-08T19:59:26Z","timestamp":1723147166990},"reference-count":85,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2017,10,1]],"date-time":"2017-10-01T00:00:00Z","timestamp":1506816000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/100008982","name":"Qatar National Research Fund (a member of Qatar Foundation)","doi-asserted-by":"publisher","award":["NPRP 8-408-2-172"],"id":[{"id":"10.13039\/100008982","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2017,10]]},"DOI":"10.1109\/jiot.2017.2708042","type":"journal-article","created":{"date-parts":[[2017,5,25]],"date-time":"2017-05-25T18:14:22Z","timestamp":1495736062000},"page":"1272-1283","source":"Crossref","is-referenced-by-count":52,"title":["Access Control Schemes for Implantable Medical Devices: A Survey"],"prefix":"10.1109","volume":"4","author":[{"ORCID":"http:\/\/orcid.org\/0000-0003-2325-5009","authenticated-orcid":false,"given":"Longfei","family":"Wu","sequence":"first","affiliation":[]},{"given":"Xiaojiang","family":"Du","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-8972-8094","authenticated-orcid":false,"given":"Mohsen","family":"Guizani","sequence":"additional","affiliation":[]},{"given":"Amr","family":"Mohamed","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/543051"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-016-0705-2"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.3390\/s141222619"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1145\/2463183.2463191"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-009-0273-0"},{"key":"ref77","article-title":"Secure remote reprogramming of implantable medical devices","author":"marin","year":"2014"},{"key":"ref74","year":"2017","journal-title":"Medtronic MyCareLink Patient Monitor"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/2426656.2426691"},{"key":"ref75","year":"2017","journal-title":"Biotronik Home Monitoring"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/2632951.2635944"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1007\/11853565_29"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1145\/2517300.2517307"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516658"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2015.2496151"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.4544608"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2006.1632652"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653712"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2744928"},{"key":"ref35","first-page":"5","article-title":"Body area network security: Robust key establishment using human body channel","author":"chang","year":"2012","journal-title":"Proc of USENIX HealthSec"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2016.2546300"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2255593"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180418"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2010.5416350"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.11"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2463209.2488750"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.97"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6567031"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462174"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1155\/2015\/101287"},{"key":"ref29","first-page":"2455","article-title":"Physiological signal based entity authentication for body area sensor networks and mobile healthcare systems","author":"bao","year":"2005","journal-title":"Proc IEEE Conf Eng Med Biol"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2012.6289252"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2011.5928953"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1155\/2016\/1493290"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2012.2209297"},{"key":"ref1","year":"2013","journal-title":"Implantable Medical Devices Market—U S Industry Analysis Size Share Trends Growth and Forecast 2012–2018"},{"key":"ref20","year":"2014","journal-title":"FDA Content of Premarket Submissions for Management of Cybersecurity in Medical Devices"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1587\/transcom.E93.B.854"},{"key":"ref21","year":"2016","journal-title":"(2016) Postmarket management of cybersecurity in medical devices"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753462"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5935179"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TITB.2009.2037617"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICPPW.2003.1240399"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/CAMAD.2015.7390497"},{"key":"ref51","first-page":"8","article-title":"Using bowel sounds to create a forensically-aware insulin pump system","author":"henry","year":"2013","journal-title":"Proc USENIX HealthTech"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2011.83"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.21"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866319"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0071384"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1364\/OE.18.010762"},{"key":"ref54","article-title":"A new symmetric cryptosystem of body area sensor networks for telemedicine","author":"bao","year":"2005","journal-title":"Proc 6th Asian–Pacific Conf on Med and Biol Eng"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2014.2370045"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6567115"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2228360.2228364"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2322103"},{"key":"ref40","article-title":"Absence makes the heart grow fonder: New directions for implantable medical device security","author":"denning","year":"2008","journal-title":"Proc USENIX HotSec"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CC.2015.7084383"},{"key":"ref13","first-page":"129","article-title":"Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses","author":"halperin","year":"2008","journal-title":"Proc IEEE S & P"},{"key":"ref14","first-page":"150","article-title":"Hijacking an insulin pump: Security attacks and defenses for a diabetes therapy system","author":"li","year":"2011","journal-title":"Proc IEEE Healthcom"},{"key":"ref15","article-title":"Hacking medical devices for fun and insulin: Breaking the human SCADA system","author":"radcliffe","year":"2011","journal-title":"Proc Black Hat USA"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2014.6883666"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2857705.2857746"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2005.861196"},{"key":"ref17","author":"jack","year":"2013","journal-title":"Implantable Medical Devices Hacking Humans"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2008.319"},{"key":"ref18","author":"goldman","year":"2013","journal-title":"A Hacker Can Give You a Fatal Overdose"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2001.918059"},{"key":"ref19","year":"2015","journal-title":"Two Safety Communications on the Cybersecurity Vulnerabilities of Two Hospira Infusion Pump Systems"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/ICHI.2014.12"},{"key":"ref4","year":"2015","journal-title":"Wireless Power Supplier WiTricity Expands Medical-Industry Footprint"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2013.2259621"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2015.04.007"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.40"},{"key":"ref85","first-page":"51","article-title":"Designing efficient routing protocol for heterogeneous sensor networks","author":"du","year":"2005","journal-title":"Proc 24th IEEE Int Perform Comput Commun Conf"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2016.2633973"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.4108\/icst.mobihealth.2014.257411"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TBCAS.2013.2245664"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2521727"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848214"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/CIT\/IUCC\/DASC\/PICOM.2015.316"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2010.5685228"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/2422966.2422975"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/2018436.2018438"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5934987"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/IPSN.2016.7460726"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2014.6883392"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/8059894\/07933942.pdf?arnumber=7933942","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:40:21Z","timestamp":1642005621000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7933942\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10]]},"references-count":85,"journal-issue":{"issue":"5"},"URL":"http:\/\/dx.doi.org\/10.1109\/jiot.2017.2708042","relation":{},"ISSN":["2327-4662"],"issn-type":[{"value":"2327-4662","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,10]]}}}