Securing Legacy Mobile Medical Devices
نویسندگان
چکیده
Millions of people use mobile medical devices—more every day. But our understanding of device security and privacy for such devices is incomplete. Man-inthe-middle attacks can be performed on typical Bluetooth-enabled mobile medical devices, compromising the privacy and safety of patients. In response, we developed the Personal Security Device, a portable device to improve security for mobile medical systems. This device requires no changes to either the medical device or its monitoring software, and offers protection for millions of existing devices. We evaluate our defense mechanism to show that it adds insignificant overhead and analyze its robustness against various attacks.
منابع مشابه
Increasing Trustworthiness of Face Authentication in Mobile Devices by Modeling Gesture Behavior and Location Using Neural Networks
Personal mobile devices currently have access to a significant portion of their user’s private sensitive data and are increasingly used for processing mobile payments. Consequently, securing access to these mobile devices is a requirement for securing access to the sensitive data and potentially costly services. Face authentication is one of the promising biometrics-based user authentication me...
متن کاملSecuring AODV routing protocol against the black hole attack using Firefly algorithm
Mobile ad hoc networks are networks composed of wireless devices to create a network with the ability for self-organization. These networks are designed as a new generation of computer networks to satisfy some specific requirements and with features different from wired networks. These networks have no fixed communication infrastructure and for communication with other nodes the intermediate no...
متن کاملSecuring mobile devices: malware mitigation methods
Malware on mobile handsets has always been a point of concern for its users. With the widespread adoption of smartphones and tablets and the emergence of centralized application markets it started to represent a significant threat. This situation has led to the development of defence methods for securing mobile devices coming from operating system developers, antivirus vendors and security rese...
متن کاملSecurity of Telemedical Applications over the Internet using Programmable Cellular Automata
As the increasing number of telemedical applications over the Internet using mobile devices (PDAs, Tablet PC, various medical devices, and so on), for access of medical data in terms of telemedicine and remote patient telemonitoring, the necessity of new powerful encryption techniques becomes a crucial issue. In this paper is presented a fully functional software encryption system based on a co...
متن کاملProtecting Applications and Devices in Nomadic Business Environments
This paper presents a pragmatic approach to protect the integrity of execution of an application in a nomadic business environment. Applications run in such contexts are based on the federation of appliances collaborating through direct communication as well as through the distribution of mobile pieces of code. Securing the operation of an application means protecting mobile code since executio...
متن کامل