2011 Proceedings IEEE INFOCOM 2011
DOI: 10.1109/infcom.2011.5935179
|View full text |Cite
|
Sign up to set email alerts
|

Biometric-based two-level secure access control for Implantable Medical Devices during emergencies

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
40
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
5
3
1

Relationship

4
5

Authors

Journals

citations
Cited by 86 publications
(40 citation statements)
references
References 8 publications
0
40
0
Order By: Relevance
“…iris, fingerprint) access control [11]. The ultrasonic distance bounding-based security protocol ensures that anyone in the IMD's close proximity can access it in emergencies while the biometric-based scheme allows access to the IMD by matching biometric features.…”
Section: Related Workmentioning
confidence: 99%
“…iris, fingerprint) access control [11]. The ultrasonic distance bounding-based security protocol ensures that anyone in the IMD's close proximity can access it in emergencies while the biometric-based scheme allows access to the IMD by matching biometric features.…”
Section: Related Workmentioning
confidence: 99%
“…Some literatures (e.g. in [17] and [19]) focus on the emergency case. Also since a large dose has a high probability of causing hypoglycemia, doctors and patients try to avoid this from happening.…”
Section: Emergency Situationsmentioning
confidence: 99%
“…It is very effective in nonemergency situations. In another previous work [17], we proposed a novel Biometric-Based two-level Secure Access Control scheme for IMDs when the patient is in emergency situations (such as a coma). Literature [27] proposed a novel patient infusion patterns based access control scheme (PIPAC) for wireless insulin pumps.…”
Section: Related Workmentioning
confidence: 99%
“…With the development of information technology, information security plays an important role in medical system [1,2], communications [3], finance [4], and other fields. Sidechannel analysis [5,6] which focuses on exploiting the implementation or some measurable nonmathematical property of a cryptographic system, was introduced by Kocher et al in 1996.…”
Section: Introductionmentioning
confidence: 99%