Security Threats and Cryptographic Protocols for Medical Wearables

نویسندگان

چکیده

In the past few years, use of several medical devices is increasing. This paper will pay attention to a device developed get measures temperature diabetic foot. These wearables usually do not have cryptographic protocols guarantee data security. study analyzes existing security in these devices, and simulate malware propagation taking into account vulnerabilities lack highly-constrained interconnected devices. A simulation spreading network made by 10 15 individuals with 6 34 sensors each one, respectively, included this study. To avoid such attacks, lightweight protocol could be satisfactory solution. Considering quick development quantum computers, current been compromised.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security proofs of cryptographic protocols

We live in time of computers and scientific and technological progress but this time is also marked with many attacks on big Internet companies. So with expand of Internet people start to protect information that they exchange through Internet. In the Internet world it is necessary for systems as Internet banking, Internet shopping or e-commerce to secure private information that are transferre...

متن کامل

On the Security Effectiveness of Cryptographic Protocols

We introduce the notion of security effectiveness, illustrate its use in the context of cryptographic protocol analysis, and argue that it requires analysis of protocol property dependencies. We provide examples to show that, without dependency analysis, the use of some logics for cryptographic protocol analysis yields results that are inconsistent or unrealistic in practice. We identify severa...

متن کامل

Provable Security for Cryptographic Protocols: Exact Analysis and Engineering Applications

We develop an approach to deriving concrete engineering advice for cryptographic protocols from provablesecurity-style proofs of security. The approach is illustrated with a simple, yet useful protocol. The proof is novel and is the first published proof that provides an exact relationship between a high-level protocol and multiple cryptographic primitives.

متن کامل

Universally Composable Security: A New Paradigm for Cryptographic Protocols

We present a general framework for representing cryptographic protocols and analyzing their security. The framework allows specifying the security requirements of practically any cryptographic task in a unified and systematic way. Furthermore, in this framework the security of protocols is preserved under a general protocol composition operation, called universal composition. The proposed frame...

متن کامل

A Principle for Cryptographic Protocols Beyond Security, Less Parameters

Almost cryptographic protocols are presented with security arguments. None of them, however, did explain why a protocol should like this, not like that. The reason is that there are short of any principles for designing and analyzing cryptographic protocols. In this paper, we put forth such a principle beyond security, called Less Parameters, which says that the involved parameters should be re...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Mathematics

سال: 2022

ISSN: ['2227-7390']

DOI: https://doi.org/10.3390/math10060886