Ideas and Challenges for Securing Wireless Implantable Medical Devices: A Review
Implantable medical devices (IMDs) are normally used for monitoring and treating various medical conditions. These days, wireless modules have become an intrinsic part of many modern IMDs. So, doctors can use device programmers wirelessly to configure parameters in the IMDs. However, such a wireless...
Saved in:
Published in | IEEE sensors journal Vol. 17; no. 3; pp. 562 - 576 |
---|---|
Main Authors | , , , , |
Format | Journal Article |
Language | English |
Published |
New York
IEEE
01.02.2017
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Implantable medical devices (IMDs) are normally used for monitoring and treating various medical conditions. These days, wireless modules have become an intrinsic part of many modern IMDs. So, doctors can use device programmers wirelessly to configure parameters in the IMDs. However, such a wireless technology exposes the IMDs to security attacks. In this paper, we analyze potential threats faced by the IMDs and discuss security solutions proposed in the existing literature to counter these threats. Securing an IMD involves three design tradeoffs that require a careful consideration. The first one is security versus accessibility in an emergency situation. We compare the IMD security schemes in the literature in terms of their merits and disadvantages. The second one is the tradeoff between the security schemes for supporting emergency access and those for supporting normal check-up access to the IMDs. This normal check-up access to the IMDs should avoid extra resource consumptions, which is different from the requirement in the emergency access. The third one is between the requirements of strong security and limited resources. The IMD, as a tiny wireless device used for medical purposes, has very limited resources when compared with a generic wireless sensor device/node. We analyze various schemes that aim to conserve the underlying resources of an IMD and also counter battery denial of service attacks from different perspectives. Based on the literature review, we analyze general concerns in the IMD security design from the system engineering point of view, and discuss possible future research directions. |
---|---|
AbstractList | Implantable medical devices (IMDs) are normally used for monitoring and treating various medical conditions. These days, wireless modules have become an intrinsic part of many modern IMDs. So, doctors can use device programmers wirelessly to configure parameters in the IMDs. However, such a wireless technology exposes the IMDs to security attacks. In this paper, we analyze potential threats faced by the IMDs and discuss security solutions proposed in the existing literature to counter these threats. Securing an IMD involves three design tradeoffs that require a careful consideration. The first one is security versus accessibility in an emergency situation. We compare the IMD security schemes in the literature in terms of their merits and disadvantages. The second one is the tradeoff between the security schemes for supporting emergency access and those for supporting normal check-up access to the IMDs. This normal check-up access to the IMDs should avoid extra resource consumptions, which is different from the requirement in the emergency access. The third one is between the requirements of strong security and limited resources. The IMD, as a tiny wireless device used for medical purposes, has very limited resources when compared with a generic wireless sensor device/node. We analyze various schemes that aim to conserve the underlying resources of an IMD and also counter battery denial of service attacks from different perspectives. Based on the literature review, we analyze general concerns in the IMD security design from the system engineering point of view, and discuss possible future research directions. |
Author | Orgun, Mehmet A. Saleem, Kashif Shankaran, Rajan Guanglou Zheng Li Qiao |
Author_xml | – sequence: 1 surname: Guanglou Zheng fullname: Guanglou Zheng email: guanglou.zheng@mq.edu.au organization: Dept. of Comput., Macquarie Univ., Sydney, NSW, Australia – sequence: 2 givenname: Rajan surname: Shankaran fullname: Shankaran, Rajan email: rajan.shankaran@mq.edu.au organization: Dept. of Comput., Macquarie Univ., Sydney, NSW, Australia – sequence: 3 givenname: Mehmet A. surname: Orgun fullname: Orgun, Mehmet A. email: mehmet.orgun@mq.edu.au organization: Dept. of Comput., Macquarie Univ., Sydney, NSW, Australia – sequence: 4 surname: Li Qiao fullname: Li Qiao email: l.qiao@adfa.edu.au organization: Sch. of Eng. & IT, Univ. of New South Wales, Canberra, ACT, Australia – sequence: 5 givenname: Kashif surname: Saleem fullname: Saleem, Kashif email: ksaleem@ksu.edu.sa organization: Center of Excellence in Inf. Assurance, King Saud Univ., Riyadh, Saudi Arabia |
BookMark | eNp9kMtOwzAQRS1UJNrCByA2llin-JHEMbuqFCjiJVoJdpFjT4qr1Cl2CuLvSdSKBQtWcxf3zGjOAPVc7QChU0pGlBJ5cTefPo4YoemIpZxLwQ9QnyZJFlERZ70ucxLFXLwdoUEIK0KoFInoo-eZARWwcgZP3lVVgVtCwGXt8Rz01lu3xK_WQwUh4Nl6UynXqKIC_ADGalXhK_i0GsIlHuOXNsLXMTosVRXgZD-HaHE9XUxuo_unm9lkfB9pJnkTqVKSUmglC1FqSAsjZQFpxqXRQICVkpkkE0wxxpSROhaKmjhOhdYsIe2HQ3S-W7vx9ccWQpOv6q137cWcZi0pY5GStiV2Le3rEDyUubaNamztGq9slVOSd_byzl7e2cv39lqS_iE33q6V__6XOdsxFgB--0KkLCMx_wHEZnym |
CODEN | ISJEAZ |
CitedBy_id | crossref_primary_10_1007_s11277_024_10954_2 crossref_primary_10_1109_JMEMS_2024_3418580 crossref_primary_10_3390_sym11020141 crossref_primary_10_1109_JIOT_2017_2708042 crossref_primary_10_1016_j_scs_2020_102552 crossref_primary_10_1002_smll_202403899 crossref_primary_10_1109_TBCAS_2022_3222011 crossref_primary_10_1002_spy2_409 crossref_primary_10_1007_s00450_021_00427_3 crossref_primary_10_1016_j_tele_2017_08_005 crossref_primary_10_1016_j_jnca_2018_01_009 crossref_primary_10_3390_ijerph18189668 crossref_primary_10_3390_s21248383 crossref_primary_10_1109_ACCESS_2019_2911424 crossref_primary_10_1109_JBHI_2018_2864796 crossref_primary_10_1007_s10916_019_1489_9 crossref_primary_10_1109_TMC_2021_3096384 crossref_primary_10_1155_2018_7579161 crossref_primary_10_1109_ACCESS_2019_2960617 crossref_primary_10_1109_ACCESS_2022_3181630 crossref_primary_10_3390_en13041008 crossref_primary_10_1016_j_device_2023_100092 crossref_primary_10_1109_JSEN_2018_2846358 crossref_primary_10_1088_1361_648X_aaf14d crossref_primary_10_1109_ACCESS_2020_3015686 crossref_primary_10_1109_COMST_2018_2878035 crossref_primary_10_1109_ACCESS_2018_2805919 crossref_primary_10_3390_s18072008 crossref_primary_10_3390_electronics11040610 crossref_primary_10_1016_j_ijmedinf_2021_104415 crossref_primary_10_1145_3436817 crossref_primary_10_1149_2162_8777_abcdfd crossref_primary_10_1109_ACCESS_2020_2984376 crossref_primary_10_1109_TAP_2018_2801346 crossref_primary_10_1109_TII_2018_2825345 crossref_primary_10_1145_3703154 crossref_primary_10_1109_ACCESS_2019_2910029 crossref_primary_10_1016_j_mser_2022_100681 crossref_primary_10_1109_TAP_2024_3349782 crossref_primary_10_1109_ACCESS_2018_2850659 |
Cites_doi | 10.1007/s10623-005-6343-z 10.1109/INFCOM.2011.5934987 10.1145/990680.990707 10.1145/2541228.2555313 10.1109/BMEI.2012.6513198 10.1145/2508859.2516658 10.1145/1366230.1366272 10.1109/TBME.2013.2264539 10.1109/TITB.2009.2037617 10.1145/1027802.1027882 10.1109/TBCAS.2013.2245664 10.1109/GLOCOM.2010.5685228 10.1109/ACCESS.2015.2445336 10.1109/INFCOM.2011.5935179 10.4204/EPTCS.165.2 10.1007/3-540-45661-9_5 10.1016/j.jbi.2015.04.007 10.1145/2517300.2517307 10.1145/2744769.2744928 10.1145/319709.319714 10.1145/1753326.1753462 10.1109/WPMC.2014.7014892 10.1109/MPRV.2008.16 10.1016/j.clsr.2006.03.004 10.1109/JSEN.2010.2085042 10.1016/S1386-5056(00)00112-X 10.1109/JSEN.2013.2259621 10.1201/9781482276800 10.1109/PIMRC.2015.7343648 10.1155/2014/543051 10.1007/s10916-013-9984-x 10.1109/4.278352 10.1371/journal.pone.0148376 10.1145/2043164.2018438 10.1145/1210268.1210272 10.1145/2857705.2857746 10.1016/j.csi.2009.04.005 10.1109/ICC.2014.6883392 10.1109/IEMBS.2010.5627952 10.1109/TITB.2011.2154363 10.1145/1653662.1653712 10.1109/TCSI.2012.2209297 10.1093/europace/eut301 10.1145/1516046.1516055 10.1109/BIOCAS.2006.4600332 10.1109/TIFS.2006.873653 10.1007/11967668_24 10.1109/ISMICT.2011.5759785 10.1109/TITB.2008.926434 10.1109/MSP.2013.2261691 10.1109/JBHI.2016.2546300 10.1145/2093698.2093760 10.1109/TITB.2007.906101 10.1109/JPROC.2014.2322103 10.1145/2228360.2228364 |
ContentType | Journal Article |
Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2017 |
Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2017 |
DBID | 97E RIA RIE AAYXX CITATION 7SP 7U5 8FD L7M |
DOI | 10.1109/JSEN.2016.2633973 |
DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005–Present IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef Electronics & Communications Abstracts Solid State and Superconductivity Abstracts Technology Research Database Advanced Technologies Database with Aerospace |
DatabaseTitle | CrossRef Solid State and Superconductivity Abstracts Technology Research Database Advanced Technologies Database with Aerospace Electronics & Communications Abstracts |
DatabaseTitleList | Solid State and Superconductivity Abstracts |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Geography Engineering |
EISSN | 1558-1748 |
EndPage | 576 |
ExternalDocumentID | 10_1109_JSEN_2016_2633973 7762804 |
Genre | orig-research |
GrantInformation_xml | – fundername: Macquarie University Research Excellence Scholarship funderid: 10.13039/501100001230 – fundername: Deanship of Scientific Research at King Saud University, Riyadh, Saudi Arabia, for funding this work through the international research group grantid: IRG14-07B funderid: 10.13039/501100004686 |
GroupedDBID | -~X 0R~ 29I 4.4 5GY 6IK 97E AAJGR AARMG AASAJ AAWTH ABAZT ABQJQ ABVLG ACGFO ACGFS ACIWK AENEX AGQYO AHBIQ AJQPL AKJIK AKQYR ALMA_UNASSIGNED_HOLDINGS ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ CS3 EBS EJD F5P HZ~ IFIPE IPLJI JAVBF LAI M43 O9- OCL P2P RIA RIE RNS TWZ AAYXX CITATION RIG 7SP 7U5 8FD L7M |
ID | FETCH-LOGICAL-c293t-af90f7ca9b7fce6bd99be6839dce0e2f92d5872a222ad9c47a1d4467cc250633 |
IEDL.DBID | RIE |
ISSN | 1530-437X |
IngestDate | Mon Jun 30 05:38:30 EDT 2025 Tue Jul 01 03:36:36 EDT 2025 Thu Apr 24 22:52:30 EDT 2025 Wed Aug 27 03:06:20 EDT 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 3 |
Language | English |
License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c293t-af90f7ca9b7fce6bd99be6839dce0e2f92d5872a222ad9c47a1d4467cc250633 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ORCID | 0000-0002-7873-1562 |
PQID | 1858794760 |
PQPubID | 75733 |
PageCount | 15 |
ParticipantIDs | proquest_journals_1858794760 ieee_primary_7762804 crossref_citationtrail_10_1109_JSEN_2016_2633973 crossref_primary_10_1109_JSEN_2016_2633973 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2017-02-01 |
PublicationDateYYYYMMDD | 2017-02-01 |
PublicationDate_xml | – month: 02 year: 2017 text: 2017-02-01 day: 01 |
PublicationDecade | 2010 |
PublicationPlace | New York |
PublicationPlace_xml | – name: New York |
PublicationTitle | IEEE sensors journal |
PublicationTitleAbbrev | JSEN |
PublicationYear | 2017 |
Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
References | ref13 ref56 ref12 ref15 ref58 ref14 ref52 ref11 ref54 halperin (ref3) 2008 ref17 ref16 kolata (ref36) 2013 ref19 berger (ref42) 2008 ref18 rivest (ref65) 1998 schechter (ref10) 2010 (ref26) 2016 ref51 ref50 ott (ref43) 2010 ref48 ref47 (ref25) 2016 ref41 ref44 bao (ref37) 2008; 12 ref49 ref8 ref9 ref6 radcliffe (ref5) 2011; 2011 ref40 cranor (ref55) 2005 (ref24) 2016 ref75 ref31 denning (ref7) 2008 mccarthy (ref45) 2008 ref74 ref30 ref33 ref32 (ref70) 2016 ref2 ref1 ref39 (ref34) 2014 ref38 (ref21) 2016 lee (ref59) 2011; 15 lee (ref57) 2008; 12 stoll (ref72) 1999 ref71 ref73 corndorf (ref46) 2011 ref68 ref67 ref69 ref64 ref20 ref63 ref66 ref22 (ref23) 2016 (ref35) 2015 juels (ref53) 1999 ref28 ref27 ref29 ref60 ref62 ref61 li (ref4) 2011 |
References_xml | – ident: ref52 doi: 10.1007/s10623-005-6343-z – ident: ref13 doi: 10.1109/INFCOM.2011.5934987 – ident: ref48 doi: 10.1145/990680.990707 – ident: ref71 doi: 10.1145/2541228.2555313 – year: 2011 ident: ref46 article-title: Secure telemetric link – ident: ref38 doi: 10.1109/BMEI.2012.6513198 – year: 2014 ident: ref34 publication-title: Content of Premarket Submissions for Management of Cybersecurity in Medical Devices Guidance for Industry and Food and Drug Administration Staff – ident: ref15 doi: 10.1145/2508859.2516658 – ident: ref61 doi: 10.1145/1366230.1366272 – ident: ref32 doi: 10.1109/TBME.2013.2264539 – ident: ref49 doi: 10.1109/TITB.2009.2037617 – year: 2005 ident: ref55 publication-title: Security and Usability Designing Secure Systems that People Can Use – start-page: 129 year: 2008 ident: ref3 article-title: Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses publication-title: Proc IEEE Symp Secur Privacy – ident: ref74 doi: 10.1145/1027802.1027882 – ident: ref14 doi: 10.1109/TBCAS.2013.2245664 – ident: ref28 doi: 10.1109/GLOCOM.2010.5685228 – ident: ref17 doi: 10.1109/ACCESS.2015.2445336 – start-page: 5:1 year: 2008 ident: ref7 article-title: Absence makes the heart grow fonder: New directions for implantable medical device security publication-title: Proc 3rd Conf Hot Topics in Security – ident: ref12 doi: 10.1109/INFCOM.2011.5935179 – ident: ref27 doi: 10.4204/EPTCS.165.2 – year: 2016 ident: ref26 publication-title: Carelink Remote Monitoring Network – year: 2016 ident: ref70 publication-title: Medtronic Recharger Charging System User Manual – ident: ref63 doi: 10.1007/3-540-45661-9_5 – volume: 2011 start-page: 1 year: 2011 ident: ref5 article-title: Hacking medical devices for fun and insulin: Breaking the human SCADA system publication-title: Proc Black Hat Conf Present Slides – year: 2015 ident: ref35 publication-title: Vulnerabilities of Hospira Lifecare PCA3 and PCA5 Infusion Pump Systems FDA Safety Communication – ident: ref20 doi: 10.1016/j.jbi.2015.04.007 – year: 2016 ident: ref21 publication-title: The STRIDE Threat Model – ident: ref67 doi: 10.1145/2517300.2517307 – ident: ref54 doi: 10.1145/2744769.2744928 – start-page: 28 year: 1999 ident: ref53 article-title: A fuzzy commitment scheme publication-title: Proc 6th ACM Conf Comput Commun Secur doi: 10.1145/319709.319714 – ident: ref9 doi: 10.1145/1753326.1753462 – year: 2008 ident: ref42 article-title: Medical implant device with RFID tag and method of identification of device – year: 2010 ident: ref10 article-title: Security that is meant to be skin deep: Using ultraviolet micropigmentation to store emergency-access keys for implantable medical devices – ident: ref50 doi: 10.1109/WPMC.2014.7014892 – year: 2010 ident: ref43 publication-title: The Evolution of Bluetooth in Wireless Medical Devices – ident: ref1 doi: 10.1109/MPRV.2008.16 – year: 2016 ident: ref25 publication-title: What is Insulin Pump Therapy and How Does it Work? – ident: ref33 doi: 10.1016/j.clsr.2006.03.004 – ident: ref69 doi: 10.1109/JSEN.2010.2085042 – ident: ref73 doi: 10.1016/S1386-5056(00)00112-X – ident: ref30 doi: 10.1109/JSEN.2013.2259621 – year: 1999 ident: ref72 publication-title: Product Design Methods and Practices doi: 10.1201/9781482276800 – year: 2016 ident: ref24 publication-title: InterStim and InterStim II Neurostimulation Devices Used for Sacral Nerve Stimulation – ident: ref51 doi: 10.1109/PIMRC.2015.7343648 – ident: ref56 doi: 10.1155/2014/543051 – ident: ref75 doi: 10.1007/s10916-013-9984-x – ident: ref64 doi: 10.1109/4.278352 – ident: ref22 doi: 10.1371/journal.pone.0148376 – ident: ref11 doi: 10.1145/2043164.2018438 – start-page: 150 year: 2011 ident: ref4 article-title: Hijacking an insulin pump: Security attacks and defenses for a diabetes therapy system publication-title: Proc 13th IEEE Int Conf e-Health Netw Appl Services (Healthcom) – ident: ref62 doi: 10.1145/1210268.1210272 – start-page: 1 year: 1998 ident: ref65 article-title: The RC6TM block cipher publication-title: Proc 1st Advanced Encryption Standard (AES) Conf – year: 2008 ident: ref45 publication-title: Headphones May Hinder Pacemakers – ident: ref6 doi: 10.1145/2857705.2857746 – ident: ref58 doi: 10.1016/j.csi.2009.04.005 – ident: ref16 doi: 10.1109/ICC.2014.6883392 – ident: ref68 doi: 10.1109/IEMBS.2010.5627952 – year: 2016 ident: ref23 publication-title: What is a Pacemaker? – volume: 15 start-page: 550 year: 2011 ident: ref59 article-title: A novel key management solution for reinforcing compliance with HIPAA privacy/security regulations publication-title: IEEE Trans Inf Technol Biomed doi: 10.1109/TITB.2011.2154363 – ident: ref8 doi: 10.1145/1653662.1653712 – ident: ref31 doi: 10.1109/TCSI.2012.2209297 – ident: ref29 doi: 10.1093/europace/eut301 – ident: ref2 doi: 10.1145/1516046.1516055 – ident: ref44 doi: 10.1109/BIOCAS.2006.4600332 – ident: ref39 doi: 10.1109/TIFS.2006.873653 – ident: ref47 doi: 10.1007/11967668_24 – ident: ref60 doi: 10.1109/ISMICT.2011.5759785 – volume: 12 start-page: 772 year: 2008 ident: ref37 article-title: Using the timing information of heartbeats as an entity identifier to secure body sensor network publication-title: IEEE Trans Inf Technol Biomed doi: 10.1109/TITB.2008.926434 – ident: ref40 doi: 10.1109/MSP.2013.2261691 – ident: ref41 doi: 10.1109/JBHI.2016.2546300 – year: 2013 ident: ref36 publication-title: Of Fact Fiction and Cheney's Defibrillator – ident: ref66 doi: 10.1145/2093698.2093760 – volume: 12 start-page: 34 year: 2008 ident: ref57 article-title: A cryptographic key management solution for HIPAA privacy/security regulations publication-title: IEEE Trans Inf Technol Biomed doi: 10.1109/TITB.2007.906101 – ident: ref19 doi: 10.1109/JPROC.2014.2322103 – ident: ref18 doi: 10.1145/2228360.2228364 |
SSID | ssj0019757 |
Score | 2.3942466 |
Snippet | Implantable medical devices (IMDs) are normally used for monitoring and treating various medical conditions. These days, wireless modules have become an... |
SourceID | proquest crossref ieee |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 562 |
SubjectTerms | Biomedical monitoring Communication system security Denial of service attacks Electronic implants Emergencies Implantable medical devices (IMDs) Insulin key distribution Literature reviews Medical equipment Monitoring Physicians Security security design Threat evaluation Tradeoffs Wireless communication wireless security Wireless sensor networks |
Title | Ideas and Challenges for Securing Wireless Implantable Medical Devices: A Review |
URI | https://ieeexplore.ieee.org/document/7762804 https://www.proquest.com/docview/1858794760 |
Volume | 17 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LSwMxEB6qF_Xgo1WsVsnBk7jbdbubbLyVqlTBIlihtyWvVbBUse1Bf72TbLr4QrzlkEDIJDPfZGa-ATgyJo0ZpTrQUqVBorUIRKJYwDopZbYFUqZsvfPNgPbvk-tROqrBSVULY4xxyWcmtEMXy9fPam6_ytoMX25myT-X0HEra7WqiAFnjtUTH3AUJB028hHM04i3r-8uBjaJi4Yx7aD97XyxQa6pyg9N7MzL5QbcLDZWZpU8hfOZDNX7N87G_-58E9Y9ziTd8mJsQc1M6rD2iX2wDiu-AfrjWwNur7QRUyImmvQW7VWmBAEt8R_yD8TmyY5RLxJLKIzysDVXxMd5yLlxGueMdEkZbdiG4eXFsNcPfLOFQKHFnwWi4FHBlOCSFcpQqTmXhiJ80spEJi54rNOMxQLxhNBcJUycanQlmVIIovBYd2B58jwxu0B4oajSiUGHt0i4EJJyIaW1ihGCsUw3IVqcfq48EbnthzHOnUMS8dwKLLcCy73AmnBcLXkpWTj-mtywAqgm-rNvQmsh4ty_02mOaCVDjcRotPf7qn1Yja0hd3naLVievc7NAcKQmTx09-8DvUjYsw |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwzV1LbxMxEB5V5VA4FGhBhBbwAS5Im7rOrr1G4lD1oaSPCIkg5Wb5MQsSVVqRRFX7V_pX-HGMvU7ES9wqcduDvdJ6vp35xvMCeI1YCSVlKILzVVGGYAtbelWoXiVVHIFU-1jvfDaU_U_l8bgar8DtshYGEVPyGXbjY4rlhws_j1dlO4r-3JqXOYXyBK-vyEGbvh8ckDTfCHF0ONrvF3mGQOHJkM0K22jeKG-1U41H6YLWDiWxguCRo2i0CFWthCUzaYP2pbK7gTwk5T1xAxlvO0m_3yOaUYm2OGwZotAqtREljcGLsqfGOWS6y_XO8cfDYcwak11Br9Cq94vRS1Nc_lD9yZ4dPYTvi5No01i-ducz1_U3vzWJ_E-P6hGsZx7N9lrgP4YVnGzAg5-6K27AWh7w_uV6Ez4MAtops5PA9hfjY6aMCDvLAYfPLOYBn5PeZ7FhMuEt1pSxHMdiB5g06ju2x9poyhMY3cXXPYXVycUEnwHTjZc-lEgOfVNqa53U1rlo9TmRzTp0gC-EbXxutB7nfZyb5HBxbSI-TMSHyfjowNvllsu2y8i_Fm9GeS8XZlF3YHuBKJP10NQQG6tJ4yrJn_991ytY64_OTs3pYHiyBfdFJC0pJ30bVmff5viCKNfMvUzQZ2DuGD8_ACGlNzc |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Ideas+and+Challenges+for+Securing+Wireless+Implantable+Medical+Devices%3A+A+Review&rft.jtitle=IEEE+sensors+journal&rft.au=Zheng%2C+Guanglou&rft.au=Shankaran%2C+Rajan&rft.au=Orgun%2C+Mehmet+A.&rft.au=Qiao%2C+Li&rft.date=2017-02-01&rft.issn=1530-437X&rft.eissn=1558-1748&rft.volume=17&rft.issue=3&rft.spage=562&rft.epage=576&rft_id=info:doi/10.1109%2FJSEN.2016.2633973&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_JSEN_2016_2633973 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1530-437X&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1530-437X&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1530-437X&client=summon |