Ideas and Challenges for Securing Wireless Implantable Medical Devices: A Review

Implantable medical devices (IMDs) are normally used for monitoring and treating various medical conditions. These days, wireless modules have become an intrinsic part of many modern IMDs. So, doctors can use device programmers wirelessly to configure parameters in the IMDs. However, such a wireless...

Full description

Saved in:
Bibliographic Details
Published inIEEE sensors journal Vol. 17; no. 3; pp. 562 - 576
Main Authors Guanglou Zheng, Shankaran, Rajan, Orgun, Mehmet A., Li Qiao, Saleem, Kashif
Format Journal Article
LanguageEnglish
Published New York IEEE 01.02.2017
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text

Cover

Loading…
Abstract Implantable medical devices (IMDs) are normally used for monitoring and treating various medical conditions. These days, wireless modules have become an intrinsic part of many modern IMDs. So, doctors can use device programmers wirelessly to configure parameters in the IMDs. However, such a wireless technology exposes the IMDs to security attacks. In this paper, we analyze potential threats faced by the IMDs and discuss security solutions proposed in the existing literature to counter these threats. Securing an IMD involves three design tradeoffs that require a careful consideration. The first one is security versus accessibility in an emergency situation. We compare the IMD security schemes in the literature in terms of their merits and disadvantages. The second one is the tradeoff between the security schemes for supporting emergency access and those for supporting normal check-up access to the IMDs. This normal check-up access to the IMDs should avoid extra resource consumptions, which is different from the requirement in the emergency access. The third one is between the requirements of strong security and limited resources. The IMD, as a tiny wireless device used for medical purposes, has very limited resources when compared with a generic wireless sensor device/node. We analyze various schemes that aim to conserve the underlying resources of an IMD and also counter battery denial of service attacks from different perspectives. Based on the literature review, we analyze general concerns in the IMD security design from the system engineering point of view, and discuss possible future research directions.
AbstractList Implantable medical devices (IMDs) are normally used for monitoring and treating various medical conditions. These days, wireless modules have become an intrinsic part of many modern IMDs. So, doctors can use device programmers wirelessly to configure parameters in the IMDs. However, such a wireless technology exposes the IMDs to security attacks. In this paper, we analyze potential threats faced by the IMDs and discuss security solutions proposed in the existing literature to counter these threats. Securing an IMD involves three design tradeoffs that require a careful consideration. The first one is security versus accessibility in an emergency situation. We compare the IMD security schemes in the literature in terms of their merits and disadvantages. The second one is the tradeoff between the security schemes for supporting emergency access and those for supporting normal check-up access to the IMDs. This normal check-up access to the IMDs should avoid extra resource consumptions, which is different from the requirement in the emergency access. The third one is between the requirements of strong security and limited resources. The IMD, as a tiny wireless device used for medical purposes, has very limited resources when compared with a generic wireless sensor device/node. We analyze various schemes that aim to conserve the underlying resources of an IMD and also counter battery denial of service attacks from different perspectives. Based on the literature review, we analyze general concerns in the IMD security design from the system engineering point of view, and discuss possible future research directions.
Author Orgun, Mehmet A.
Saleem, Kashif
Shankaran, Rajan
Guanglou Zheng
Li Qiao
Author_xml – sequence: 1
  surname: Guanglou Zheng
  fullname: Guanglou Zheng
  email: guanglou.zheng@mq.edu.au
  organization: Dept. of Comput., Macquarie Univ., Sydney, NSW, Australia
– sequence: 2
  givenname: Rajan
  surname: Shankaran
  fullname: Shankaran, Rajan
  email: rajan.shankaran@mq.edu.au
  organization: Dept. of Comput., Macquarie Univ., Sydney, NSW, Australia
– sequence: 3
  givenname: Mehmet A.
  surname: Orgun
  fullname: Orgun, Mehmet A.
  email: mehmet.orgun@mq.edu.au
  organization: Dept. of Comput., Macquarie Univ., Sydney, NSW, Australia
– sequence: 4
  surname: Li Qiao
  fullname: Li Qiao
  email: l.qiao@adfa.edu.au
  organization: Sch. of Eng. & IT, Univ. of New South Wales, Canberra, ACT, Australia
– sequence: 5
  givenname: Kashif
  surname: Saleem
  fullname: Saleem, Kashif
  email: ksaleem@ksu.edu.sa
  organization: Center of Excellence in Inf. Assurance, King Saud Univ., Riyadh, Saudi Arabia
BookMark eNp9kMtOwzAQRS1UJNrCByA2llin-JHEMbuqFCjiJVoJdpFjT4qr1Cl2CuLvSdSKBQtWcxf3zGjOAPVc7QChU0pGlBJ5cTefPo4YoemIpZxLwQ9QnyZJFlERZ70ucxLFXLwdoUEIK0KoFInoo-eZARWwcgZP3lVVgVtCwGXt8Rz01lu3xK_WQwUh4Nl6UynXqKIC_ADGalXhK_i0GsIlHuOXNsLXMTosVRXgZD-HaHE9XUxuo_unm9lkfB9pJnkTqVKSUmglC1FqSAsjZQFpxqXRQICVkpkkE0wxxpSROhaKmjhOhdYsIe2HQ3S-W7vx9ccWQpOv6q137cWcZi0pY5GStiV2Le3rEDyUubaNamztGq9slVOSd_byzl7e2cv39lqS_iE33q6V__6XOdsxFgB--0KkLCMx_wHEZnym
CODEN ISJEAZ
CitedBy_id crossref_primary_10_1007_s11277_024_10954_2
crossref_primary_10_1109_JMEMS_2024_3418580
crossref_primary_10_3390_sym11020141
crossref_primary_10_1109_JIOT_2017_2708042
crossref_primary_10_1016_j_scs_2020_102552
crossref_primary_10_1002_smll_202403899
crossref_primary_10_1109_TBCAS_2022_3222011
crossref_primary_10_1002_spy2_409
crossref_primary_10_1007_s00450_021_00427_3
crossref_primary_10_1016_j_tele_2017_08_005
crossref_primary_10_1016_j_jnca_2018_01_009
crossref_primary_10_3390_ijerph18189668
crossref_primary_10_3390_s21248383
crossref_primary_10_1109_ACCESS_2019_2911424
crossref_primary_10_1109_JBHI_2018_2864796
crossref_primary_10_1007_s10916_019_1489_9
crossref_primary_10_1109_TMC_2021_3096384
crossref_primary_10_1155_2018_7579161
crossref_primary_10_1109_ACCESS_2019_2960617
crossref_primary_10_1109_ACCESS_2022_3181630
crossref_primary_10_3390_en13041008
crossref_primary_10_1016_j_device_2023_100092
crossref_primary_10_1109_JSEN_2018_2846358
crossref_primary_10_1088_1361_648X_aaf14d
crossref_primary_10_1109_ACCESS_2020_3015686
crossref_primary_10_1109_COMST_2018_2878035
crossref_primary_10_1109_ACCESS_2018_2805919
crossref_primary_10_3390_s18072008
crossref_primary_10_3390_electronics11040610
crossref_primary_10_1016_j_ijmedinf_2021_104415
crossref_primary_10_1145_3436817
crossref_primary_10_1149_2162_8777_abcdfd
crossref_primary_10_1109_ACCESS_2020_2984376
crossref_primary_10_1109_TAP_2018_2801346
crossref_primary_10_1109_TII_2018_2825345
crossref_primary_10_1145_3703154
crossref_primary_10_1109_ACCESS_2019_2910029
crossref_primary_10_1016_j_mser_2022_100681
crossref_primary_10_1109_TAP_2024_3349782
crossref_primary_10_1109_ACCESS_2018_2850659
Cites_doi 10.1007/s10623-005-6343-z
10.1109/INFCOM.2011.5934987
10.1145/990680.990707
10.1145/2541228.2555313
10.1109/BMEI.2012.6513198
10.1145/2508859.2516658
10.1145/1366230.1366272
10.1109/TBME.2013.2264539
10.1109/TITB.2009.2037617
10.1145/1027802.1027882
10.1109/TBCAS.2013.2245664
10.1109/GLOCOM.2010.5685228
10.1109/ACCESS.2015.2445336
10.1109/INFCOM.2011.5935179
10.4204/EPTCS.165.2
10.1007/3-540-45661-9_5
10.1016/j.jbi.2015.04.007
10.1145/2517300.2517307
10.1145/2744769.2744928
10.1145/319709.319714
10.1145/1753326.1753462
10.1109/WPMC.2014.7014892
10.1109/MPRV.2008.16
10.1016/j.clsr.2006.03.004
10.1109/JSEN.2010.2085042
10.1016/S1386-5056(00)00112-X
10.1109/JSEN.2013.2259621
10.1201/9781482276800
10.1109/PIMRC.2015.7343648
10.1155/2014/543051
10.1007/s10916-013-9984-x
10.1109/4.278352
10.1371/journal.pone.0148376
10.1145/2043164.2018438
10.1145/1210268.1210272
10.1145/2857705.2857746
10.1016/j.csi.2009.04.005
10.1109/ICC.2014.6883392
10.1109/IEMBS.2010.5627952
10.1109/TITB.2011.2154363
10.1145/1653662.1653712
10.1109/TCSI.2012.2209297
10.1093/europace/eut301
10.1145/1516046.1516055
10.1109/BIOCAS.2006.4600332
10.1109/TIFS.2006.873653
10.1007/11967668_24
10.1109/ISMICT.2011.5759785
10.1109/TITB.2008.926434
10.1109/MSP.2013.2261691
10.1109/JBHI.2016.2546300
10.1145/2093698.2093760
10.1109/TITB.2007.906101
10.1109/JPROC.2014.2322103
10.1145/2228360.2228364
ContentType Journal Article
Copyright Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2017
Copyright_xml – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2017
DBID 97E
RIA
RIE
AAYXX
CITATION
7SP
7U5
8FD
L7M
DOI 10.1109/JSEN.2016.2633973
DatabaseName IEEE All-Society Periodicals Package (ASPP) 2005–Present
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Electronic Library (IEL)
CrossRef
Electronics & Communications Abstracts
Solid State and Superconductivity Abstracts
Technology Research Database
Advanced Technologies Database with Aerospace
DatabaseTitle CrossRef
Solid State and Superconductivity Abstracts
Technology Research Database
Advanced Technologies Database with Aerospace
Electronics & Communications Abstracts
DatabaseTitleList
Solid State and Superconductivity Abstracts
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Geography
Engineering
EISSN 1558-1748
EndPage 576
ExternalDocumentID 10_1109_JSEN_2016_2633973
7762804
Genre orig-research
GrantInformation_xml – fundername: Macquarie University Research Excellence Scholarship
  funderid: 10.13039/501100001230
– fundername: Deanship of Scientific Research at King Saud University, Riyadh, Saudi Arabia, for funding this work through the international research group
  grantid: IRG14-07B
  funderid: 10.13039/501100004686
GroupedDBID -~X
0R~
29I
4.4
5GY
6IK
97E
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABQJQ
ABVLG
ACGFO
ACGFS
ACIWK
AENEX
AGQYO
AHBIQ
AJQPL
AKJIK
AKQYR
ALMA_UNASSIGNED_HOLDINGS
ATWAV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CS3
EBS
EJD
F5P
HZ~
IFIPE
IPLJI
JAVBF
LAI
M43
O9-
OCL
P2P
RIA
RIE
RNS
TWZ
AAYXX
CITATION
RIG
7SP
7U5
8FD
L7M
ID FETCH-LOGICAL-c293t-af90f7ca9b7fce6bd99be6839dce0e2f92d5872a222ad9c47a1d4467cc250633
IEDL.DBID RIE
ISSN 1530-437X
IngestDate Mon Jun 30 05:38:30 EDT 2025
Tue Jul 01 03:36:36 EDT 2025
Thu Apr 24 22:52:30 EDT 2025
Wed Aug 27 03:06:20 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 3
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c293t-af90f7ca9b7fce6bd99be6839dce0e2f92d5872a222ad9c47a1d4467cc250633
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0002-7873-1562
PQID 1858794760
PQPubID 75733
PageCount 15
ParticipantIDs proquest_journals_1858794760
ieee_primary_7762804
crossref_citationtrail_10_1109_JSEN_2016_2633973
crossref_primary_10_1109_JSEN_2016_2633973
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2017-02-01
PublicationDateYYYYMMDD 2017-02-01
PublicationDate_xml – month: 02
  year: 2017
  text: 2017-02-01
  day: 01
PublicationDecade 2010
PublicationPlace New York
PublicationPlace_xml – name: New York
PublicationTitle IEEE sensors journal
PublicationTitleAbbrev JSEN
PublicationYear 2017
Publisher IEEE
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References ref13
ref56
ref12
ref15
ref58
ref14
ref52
ref11
ref54
halperin (ref3) 2008
ref17
ref16
kolata (ref36) 2013
ref19
berger (ref42) 2008
ref18
rivest (ref65) 1998
schechter (ref10) 2010
(ref26) 2016
ref51
ref50
ott (ref43) 2010
ref48
ref47
(ref25) 2016
ref41
ref44
bao (ref37) 2008; 12
ref49
ref8
ref9
ref6
radcliffe (ref5) 2011; 2011
ref40
cranor (ref55) 2005
(ref24) 2016
ref75
ref31
denning (ref7) 2008
mccarthy (ref45) 2008
ref74
ref30
ref33
ref32
(ref70) 2016
ref2
ref1
ref39
(ref34) 2014
ref38
(ref21) 2016
lee (ref59) 2011; 15
lee (ref57) 2008; 12
stoll (ref72) 1999
ref71
ref73
corndorf (ref46) 2011
ref68
ref67
ref69
ref64
ref20
ref63
ref66
ref22
(ref23) 2016
(ref35) 2015
juels (ref53) 1999
ref28
ref27
ref29
ref60
ref62
ref61
li (ref4) 2011
References_xml – ident: ref52
  doi: 10.1007/s10623-005-6343-z
– ident: ref13
  doi: 10.1109/INFCOM.2011.5934987
– ident: ref48
  doi: 10.1145/990680.990707
– ident: ref71
  doi: 10.1145/2541228.2555313
– year: 2011
  ident: ref46
  article-title: Secure telemetric link
– ident: ref38
  doi: 10.1109/BMEI.2012.6513198
– year: 2014
  ident: ref34
  publication-title: Content of Premarket Submissions for Management of Cybersecurity in Medical Devices Guidance for Industry and Food and Drug Administration Staff
– ident: ref15
  doi: 10.1145/2508859.2516658
– ident: ref61
  doi: 10.1145/1366230.1366272
– ident: ref32
  doi: 10.1109/TBME.2013.2264539
– ident: ref49
  doi: 10.1109/TITB.2009.2037617
– year: 2005
  ident: ref55
  publication-title: Security and Usability Designing Secure Systems that People Can Use
– start-page: 129
  year: 2008
  ident: ref3
  article-title: Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses
  publication-title: Proc IEEE Symp Secur Privacy
– ident: ref74
  doi: 10.1145/1027802.1027882
– ident: ref14
  doi: 10.1109/TBCAS.2013.2245664
– ident: ref28
  doi: 10.1109/GLOCOM.2010.5685228
– ident: ref17
  doi: 10.1109/ACCESS.2015.2445336
– start-page: 5:1
  year: 2008
  ident: ref7
  article-title: Absence makes the heart grow fonder: New directions for implantable medical device security
  publication-title: Proc 3rd Conf Hot Topics in Security
– ident: ref12
  doi: 10.1109/INFCOM.2011.5935179
– ident: ref27
  doi: 10.4204/EPTCS.165.2
– year: 2016
  ident: ref26
  publication-title: Carelink Remote Monitoring Network
– year: 2016
  ident: ref70
  publication-title: Medtronic Recharger Charging System User Manual
– ident: ref63
  doi: 10.1007/3-540-45661-9_5
– volume: 2011
  start-page: 1
  year: 2011
  ident: ref5
  article-title: Hacking medical devices for fun and insulin: Breaking the human SCADA system
  publication-title: Proc Black Hat Conf Present Slides
– year: 2015
  ident: ref35
  publication-title: Vulnerabilities of Hospira Lifecare PCA3 and PCA5 Infusion Pump Systems FDA Safety Communication
– ident: ref20
  doi: 10.1016/j.jbi.2015.04.007
– year: 2016
  ident: ref21
  publication-title: The STRIDE Threat Model
– ident: ref67
  doi: 10.1145/2517300.2517307
– ident: ref54
  doi: 10.1145/2744769.2744928
– start-page: 28
  year: 1999
  ident: ref53
  article-title: A fuzzy commitment scheme
  publication-title: Proc 6th ACM Conf Comput Commun Secur
  doi: 10.1145/319709.319714
– ident: ref9
  doi: 10.1145/1753326.1753462
– year: 2008
  ident: ref42
  article-title: Medical implant device with RFID tag and method of identification of device
– year: 2010
  ident: ref10
  article-title: Security that is meant to be skin deep: Using ultraviolet micropigmentation to store emergency-access keys for implantable medical devices
– ident: ref50
  doi: 10.1109/WPMC.2014.7014892
– year: 2010
  ident: ref43
  publication-title: The Evolution of Bluetooth in Wireless Medical Devices
– ident: ref1
  doi: 10.1109/MPRV.2008.16
– year: 2016
  ident: ref25
  publication-title: What is Insulin Pump Therapy and How Does it Work?
– ident: ref33
  doi: 10.1016/j.clsr.2006.03.004
– ident: ref69
  doi: 10.1109/JSEN.2010.2085042
– ident: ref73
  doi: 10.1016/S1386-5056(00)00112-X
– ident: ref30
  doi: 10.1109/JSEN.2013.2259621
– year: 1999
  ident: ref72
  publication-title: Product Design Methods and Practices
  doi: 10.1201/9781482276800
– year: 2016
  ident: ref24
  publication-title: InterStim and InterStim II Neurostimulation Devices Used for Sacral Nerve Stimulation
– ident: ref51
  doi: 10.1109/PIMRC.2015.7343648
– ident: ref56
  doi: 10.1155/2014/543051
– ident: ref75
  doi: 10.1007/s10916-013-9984-x
– ident: ref64
  doi: 10.1109/4.278352
– ident: ref22
  doi: 10.1371/journal.pone.0148376
– ident: ref11
  doi: 10.1145/2043164.2018438
– start-page: 150
  year: 2011
  ident: ref4
  article-title: Hijacking an insulin pump: Security attacks and defenses for a diabetes therapy system
  publication-title: Proc 13th IEEE Int Conf e-Health Netw Appl Services (Healthcom)
– ident: ref62
  doi: 10.1145/1210268.1210272
– start-page: 1
  year: 1998
  ident: ref65
  article-title: The RC6TM block cipher
  publication-title: Proc 1st Advanced Encryption Standard (AES) Conf
– year: 2008
  ident: ref45
  publication-title: Headphones May Hinder Pacemakers
– ident: ref6
  doi: 10.1145/2857705.2857746
– ident: ref58
  doi: 10.1016/j.csi.2009.04.005
– ident: ref16
  doi: 10.1109/ICC.2014.6883392
– ident: ref68
  doi: 10.1109/IEMBS.2010.5627952
– year: 2016
  ident: ref23
  publication-title: What is a Pacemaker?
– volume: 15
  start-page: 550
  year: 2011
  ident: ref59
  article-title: A novel key management solution for reinforcing compliance with HIPAA privacy/security regulations
  publication-title: IEEE Trans Inf Technol Biomed
  doi: 10.1109/TITB.2011.2154363
– ident: ref8
  doi: 10.1145/1653662.1653712
– ident: ref31
  doi: 10.1109/TCSI.2012.2209297
– ident: ref29
  doi: 10.1093/europace/eut301
– ident: ref2
  doi: 10.1145/1516046.1516055
– ident: ref44
  doi: 10.1109/BIOCAS.2006.4600332
– ident: ref39
  doi: 10.1109/TIFS.2006.873653
– ident: ref47
  doi: 10.1007/11967668_24
– ident: ref60
  doi: 10.1109/ISMICT.2011.5759785
– volume: 12
  start-page: 772
  year: 2008
  ident: ref37
  article-title: Using the timing information of heartbeats as an entity identifier to secure body sensor network
  publication-title: IEEE Trans Inf Technol Biomed
  doi: 10.1109/TITB.2008.926434
– ident: ref40
  doi: 10.1109/MSP.2013.2261691
– ident: ref41
  doi: 10.1109/JBHI.2016.2546300
– year: 2013
  ident: ref36
  publication-title: Of Fact Fiction and Cheney's Defibrillator
– ident: ref66
  doi: 10.1145/2093698.2093760
– volume: 12
  start-page: 34
  year: 2008
  ident: ref57
  article-title: A cryptographic key management solution for HIPAA privacy/security regulations
  publication-title: IEEE Trans Inf Technol Biomed
  doi: 10.1109/TITB.2007.906101
– ident: ref19
  doi: 10.1109/JPROC.2014.2322103
– ident: ref18
  doi: 10.1145/2228360.2228364
SSID ssj0019757
Score 2.3942466
Snippet Implantable medical devices (IMDs) are normally used for monitoring and treating various medical conditions. These days, wireless modules have become an...
SourceID proquest
crossref
ieee
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 562
SubjectTerms Biomedical monitoring
Communication system security
Denial of service attacks
Electronic implants
Emergencies
Implantable medical devices (IMDs)
Insulin
key distribution
Literature reviews
Medical equipment
Monitoring
Physicians
Security
security design
Threat evaluation
Tradeoffs
Wireless communication
wireless security
Wireless sensor networks
Title Ideas and Challenges for Securing Wireless Implantable Medical Devices: A Review
URI https://ieeexplore.ieee.org/document/7762804
https://www.proquest.com/docview/1858794760
Volume 17
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LSwMxEB6qF_Xgo1WsVsnBk7jbdbubbLyVqlTBIlihtyWvVbBUse1Bf72TbLr4QrzlkEDIJDPfZGa-ATgyJo0ZpTrQUqVBorUIRKJYwDopZbYFUqZsvfPNgPbvk-tROqrBSVULY4xxyWcmtEMXy9fPam6_ytoMX25myT-X0HEra7WqiAFnjtUTH3AUJB028hHM04i3r-8uBjaJi4Yx7aD97XyxQa6pyg9N7MzL5QbcLDZWZpU8hfOZDNX7N87G_-58E9Y9ziTd8mJsQc1M6rD2iX2wDiu-AfrjWwNur7QRUyImmvQW7VWmBAEt8R_yD8TmyY5RLxJLKIzysDVXxMd5yLlxGueMdEkZbdiG4eXFsNcPfLOFQKHFnwWi4FHBlOCSFcpQqTmXhiJ80spEJi54rNOMxQLxhNBcJUycanQlmVIIovBYd2B58jwxu0B4oajSiUGHt0i4EJJyIaW1ihGCsUw3IVqcfq48EbnthzHOnUMS8dwKLLcCy73AmnBcLXkpWTj-mtywAqgm-rNvQmsh4ty_02mOaCVDjcRotPf7qn1Yja0hd3naLVievc7NAcKQmTx09-8DvUjYsw
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwzV1LbxMxEB5V5VA4FGhBhBbwAS5Im7rOrr1G4lD1oaSPCIkg5Wb5MQsSVVqRRFX7V_pX-HGMvU7ES9wqcduDvdJ6vp35xvMCeI1YCSVlKILzVVGGYAtbelWoXiVVHIFU-1jvfDaU_U_l8bgar8DtshYGEVPyGXbjY4rlhws_j1dlO4r-3JqXOYXyBK-vyEGbvh8ckDTfCHF0ONrvF3mGQOHJkM0K22jeKG-1U41H6YLWDiWxguCRo2i0CFWthCUzaYP2pbK7gTwk5T1xAxlvO0m_3yOaUYm2OGwZotAqtREljcGLsqfGOWS6y_XO8cfDYcwak11Br9Cq94vRS1Nc_lD9yZ4dPYTvi5No01i-ducz1_U3vzWJ_E-P6hGsZx7N9lrgP4YVnGzAg5-6K27AWh7w_uV6Ez4MAtops5PA9hfjY6aMCDvLAYfPLOYBn5PeZ7FhMuEt1pSxHMdiB5g06ju2x9poyhMY3cXXPYXVycUEnwHTjZc-lEgOfVNqa53U1rlo9TmRzTp0gC-EbXxutB7nfZyb5HBxbSI-TMSHyfjowNvllsu2y8i_Fm9GeS8XZlF3YHuBKJP10NQQG6tJ4yrJn_991ytY64_OTs3pYHiyBfdFJC0pJ30bVmff5viCKNfMvUzQZ2DuGD8_ACGlNzc
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Ideas+and+Challenges+for+Securing+Wireless+Implantable+Medical+Devices%3A+A+Review&rft.jtitle=IEEE+sensors+journal&rft.au=Zheng%2C+Guanglou&rft.au=Shankaran%2C+Rajan&rft.au=Orgun%2C+Mehmet+A.&rft.au=Qiao%2C+Li&rft.date=2017-02-01&rft.issn=1530-437X&rft.eissn=1558-1748&rft.volume=17&rft.issue=3&rft.spage=562&rft.epage=576&rft_id=info:doi/10.1109%2FJSEN.2016.2633973&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_JSEN_2016_2633973
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1530-437X&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1530-437X&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1530-437X&client=summon