Abstract:Existing mobile agent-enabled anomaly detection schemes have not considered temporal behavior for their correct functioning and detection of temporal anomalies. This study employs a holistic system approach to design an Enhanced mobile Agent-enabled Anomaly Detection System (EAADS) by designing two new algorithms. The proposed algorithms are not only important for the completeness of the EAADS, but also for the detection of the anomalies caused by the delayed arrival of the in situ verification results. The fo… Show more
“…3. The model is used to identify two types of requirements: Safety and Liveness [22]. Safety requirement refers to the behavior of the system that must not happen; whereby, liveness requirement means a system behavior that will eventually happen.…”
Section: Algorithm 1: Detection Of An External Command and Its Classimentioning
confidence: 99%
“…This range specifies the most common values of energy (in joules) used by ICD for therapies [18]. The values are taken as 25, 28, 20,32,22,18,23,30,40,25,21,19,30,25,26,35. The calculations for the sample mean are performed on these values.…”
Section: Algorithm 1: Detection Of An External Command and Its Classimentioning
Contemporary healthcare has witnessed a wide deployment of Implantable Cardioverter Defibrillators (ICDs), which have the capability to be controlled remotely, making them equally accessible from both home and hospitals. The therapeutic benefits of ICDs seem to outweigh potential security concerns, yet overlooking the presence of malicious attacks cannot be justified. This study investigates the scenario where an adversary falsifies a controller command and sends instructions to issue high electric shocks in succession. We propose a novel security hardening mechanism to protect data communications between ICD and controller from malicious data manipulations. Our proposed method verifies the correctness of an external command with respect to the history of heart rhythms. The proposed method is evaluated using real data. Multi-aspect analyses show the effectiveness of the proposed scheme.
“…3. The model is used to identify two types of requirements: Safety and Liveness [22]. Safety requirement refers to the behavior of the system that must not happen; whereby, liveness requirement means a system behavior that will eventually happen.…”
Section: Algorithm 1: Detection Of An External Command and Its Classimentioning
confidence: 99%
“…This range specifies the most common values of energy (in joules) used by ICD for therapies [18]. The values are taken as 25, 28, 20,32,22,18,23,30,40,25,21,19,30,25,26,35. The calculations for the sample mean are performed on these values.…”
Section: Algorithm 1: Detection Of An External Command and Its Classimentioning
Contemporary healthcare has witnessed a wide deployment of Implantable Cardioverter Defibrillators (ICDs), which have the capability to be controlled remotely, making them equally accessible from both home and hospitals. The therapeutic benefits of ICDs seem to outweigh potential security concerns, yet overlooking the presence of malicious attacks cannot be justified. This study investigates the scenario where an adversary falsifies a controller command and sends instructions to issue high electric shocks in succession. We propose a novel security hardening mechanism to protect data communications between ICD and controller from malicious data manipulations. Our proposed method verifies the correctness of an external command with respect to the history of heart rhythms. The proposed method is evaluated using real data. Multi-aspect analyses show the effectiveness of the proposed scheme.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.