2014
DOI: 10.1007/978-3-662-44966-0_34
|View full text |Cite
|
Sign up to set email alerts
|

Detection of Active Attacks on Wireless IMDs Using Proxy Device and Localization Information

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 12 publications
0
2
0
Order By: Relevance
“…Anomaly detection is a security approach for the detection of outliers, i.e., events that do not conform to the normal typical pattern (as learned by representative normal cases from the analyzed population). Darji and Trivedi [13]propose a similar solution using a proxy device which creates a signature of the authorized external device based on several features, such as arrival time difference, received time of transmission, phase of arrival, and angle of arrival; these features are estimated via triangulation techniques. The proxy device uses anomaly detection of these characteristics and tends to detect incidents of unauthorized connections.…”
Section: B Security Mechanisms For Icdsmentioning
confidence: 99%
See 1 more Smart Citation
“…Anomaly detection is a security approach for the detection of outliers, i.e., events that do not conform to the normal typical pattern (as learned by representative normal cases from the analyzed population). Darji and Trivedi [13]propose a similar solution using a proxy device which creates a signature of the authorized external device based on several features, such as arrival time difference, received time of transmission, phase of arrival, and angle of arrival; these features are estimated via triangulation techniques. The proxy device uses anomaly detection of these characteristics and tends to detect incidents of unauthorized connections.…”
Section: B Security Mechanisms For Icdsmentioning
confidence: 99%
“…We were able to identify previous academic studies that deal with protecting CIEDs from illegitimate intrusions, such as connecting to the CIED at prohibited times or from unauthorized locations, using illegitimate devices such as improvised antenna [13]. However, we were unable to find any prior work or existing solutions aimed at the problem of abusing or attacking a legitimate programmer device in order to attack the CIED.…”
Section: Introductionmentioning
confidence: 99%