The blocker tag: selective blocking of RFID tags for consumer privacy
Proceedings of the 10th ACM conference on Computer and communications security
An RFID Distance Bounding Protocol
SECURECOMM '05 Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks
Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses
IEEE Pervasive Computing
Design and implementation of a secure wireless mote-based medical sensor network
UbiComp '08 Proceedings of the 10th international conference on Ubiquitous computing
Minimalist cryptography for low-cost RFID tags (extended abstract)
SCN'04 Proceedings of the 4th international conference on Security in Communication Networks
Some methods for privacy in RFID communication
ESAS'04 Proceedings of the First European conference on Security in Ad-hoc and Sensor Networks
Update: Radiation sensor fine-tunes cancer treatments
IEEE Spectrum
A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health
IEEE Communications Magazine
RFID security and privacy: a research survey
IEEE Journal on Selected Areas in Communications
Hi-index | 0.25 |
Implantable devices hold great potential for pervasive healthcare, enabling the identification, monitoring, and treatment of patients regardless of their location. To realize this goal, these devices must be able to communicate wirelessly with external devices. However, wireless communication presents many vulnerabilities: an attacker can eavesdrop on transmitted information, use implanted devices to track patients, or spoof an implanted device. An attacker even has the potential to cause direct physical harm to a patient, either by forcibly removing an implanted device from the patient or by maliciously sending commands that affect the operation of an implanted device. Addressing these security threats is crucial for implantable devices due to their permanent nature, but it is difficult because of the severe resource constraints facing such devices. This article details the threats that face wireless implantable devices, surveys the work addressing these threats, and identifies open issues for future research.