| 研究生: |
許任銘 Hsu, Jen-Ming |
|---|---|
| 論文名稱: |
以積極的網路裝置群安全架構增進病患安全 Gregariously Aggressive Networked Gears (GANG) Security Scheme to Improve Patient Safety |
| 指導教授: |
侯廷偉
Hou, Ting-Wei |
| 共同指導教授: |
鄧維光
Teng, Wei-Guang |
| 學位類別: |
博士 Doctor |
| 系所名稱: |
工學院 - 工程科學系 Department of Engineering Science |
| 論文出版年: | 2018 |
| 畢業學年度: | 106 |
| 語文別: | 英文 |
| 論文頁數: | 94 |
| 中文關鍵詞: | 通訊安全 、植入式醫療裝置 、確定性亂數位元產生器 、協作通訊 、幫派式排程 |
| 外文關鍵詞: | Communication Security, Implantable Medical Device, Deterministic Random Bit Generator, Cooperative Communication, Gang Scheduling |
| 相關次數: | 點閱:98 下載:8 |
| 分享至: |
| 查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
植入式醫療裝置被用以拯救病患的生命,然而不夠安全的通訊設計,將對使用者的生命安全造成威脅。植入式醫療裝置通常存在低運算能力,及無法充電的不利條件。因此其安全性不僅是重要的議題,也要考慮安全機制與節能之間的權衡。
為保護使用植入式醫療裝置的病患安全,本論文提出一個基於生理特徵的新安全架構,以及新提出的積極的網路裝置群的觀念及實作,並使用協作通訊以提升其資料傳輸的效率與可靠度,以保護植入式裝置與醫院資訊系統間的通訊安全。
本論文中提出了一個資料加密及散播的新方法,將植入式裝置與穿戴式裝置串成一幫積極合作的網路裝置群,成員間相互驗證與合作,以提升植入式裝置的電池使用效率並避免攻擊導致資料洩漏或指令竄改。在通訊期間使用生物特徵產生金鑰,以確定性亂數位元產生器演算法提高金鑰的安全強度,並使每個傳送的加密資料,彼此連接成鏈狀。裝置群的成員在指定的時間內對植入式醫療裝置的通訊需求做出反應,以確保與植入式醫療裝置有關的任務都能被這些成員優先處理,並藉以偵測出可能的攻擊行為。最後,透過與現行架構比較、安全分析與實驗,以說明此架構之可行性。
Implantable medical devices (IMDs) are used to save a patient's life. However, insecurely designed IMDs can be life threatening. Usually, IMDs have low computational power and cannot be recharged, which presents adverse conditions for IMDs. Thus, security is not only an important issue but also requires a tradeoff between efficiency and security.
To secure communication between an IMD and the hospital information system, this study proposes a new biometric-based security scheme to protect the safety of patients equipped with IMDs. In addition, the concept of gregariously aggressive networked gears (GANG) is implemented, which uses cooperative communication to enhance the efficiency and reliability of transmission.
Furthermore, this research also proposes a new secure authentication and distribution scheme that links the IMD and wearable devices into a network of GANG. To improve battery life and prevent tampering and disclosure attacks, the members of this network establish mutual authentication and cooperation. During communication, a biometric key generator uses a physiological signal to generate a key, using a deterministic random bit generator (DRBG) to enhance the security strength of the symmetric key. Moreover, it transforms the encrypted data into a chain for communication. The gears of a GANG member should always react within the designated time when communicating with the IMD to ensure its high priority and detect any attack activities.
Finally, through security analyses and experiments, the proposed scheme is demonstrated to be feasible compared with existing schemes.
[1] John Alexander MacWilliam, "Electrical Stimulation of the Heart in Man", British Medical Journal, p.p. 348-350, February 1889, DOI: https://doi.org/10.1136/bmj.1.1468.348
[2] Kriangsiri Malasri and Lan Wang, "Securing Wireless Implantable Devices for Healthcare: Ideas and Challenges", IEEE Communications Magazine, vol. 47, no. 7, p.p. 74-80, July 2009. DOI: https://doi.org/10.1109/MCOM.2009.5183475
[3] Federal Communications Commission, Medical Device Radiocommunications Service (MedRadio), https://www.fcc.gov/wireless/bureau-divisions/broadband-division/medical-device-radiocommunications-service-medradio , (accessed 18.02.11).
[4] Federal Communications Commission, Wireless Medical Telemetry Service (WMTS), https://www.fcc.gov/wireless/bureau-divisions/broadband-division/wireless-medical-telemetry-service-wmts , (accessed 18.02.11).
[5] M. Mirowski, Philip R. Reid, Morton M. Mower, Levi Watkins, Vincent L. Gott, James F. Schauble, Alois Langer, M. S. Heilman, Steve A. Kolenik, Robert E. Fischell, and Myron L. Weisfeldt, "Termination of Malignant Ventricular Arrhythmias with an Implanted Automatic Defibrillator in Human Beings", The New England Journal of Medicine, vol. 303, no. 6, p.p. 322-324, August 1980. DOI: https://doi.org/10.1056/NEJM198008073030607
[6] Gerhard Hindricks, Milos Taborsky, Michael Glikson, Ullus Heinrich, Burghard Schumacher, Amos Katz, Johannes Brachmann, Thorsten Lewalter, Andreas Goette, Michael Block, Josef Kautzner, Stefan Sack, Daniela Husser, Christopher Piorkowski, Peter Søgaard, for the IN-TIME study group, "Implant-based Multiparameter Telemonitoring of Patients with Heart Failure (IN-TIME): a Randomised Controlled Trial", The Lancet, vol. 384, no. 9943, p.p. 583-590, August 2014. DOI: https://doi.org/10.1016/S0140-6736(14)61176-4
[7] Mithun Mukherjee, Rakesh Matam, Lei Shu, Leandros Maglaras, Mohamed Amine Ferrag, Nikumani Choudhury and Vikas Kumar, "Security and Privacy in Fog Computing: Challenges", IEEE Access, vol. 5 , p.p. 19293-19304, September 2017. DOI: https://doi.org/10.1109/ACCESS.2017.274942
[8] Carmen Camara, Pedro Peris-Lopez and Juan E.Tapiadora, "Security and Privacy Issues in Implantable Medical Devices: a Comprehensive Survey", Journal of Biomedical Informatics, vol. 55, p.p. 272-289, June 2015. DOI: http://dx.doi.org/10.1016/j.jbi.2015.04.007
[9] Charles R. Thomas Jr, "Safe Delivery of Radiotherapy to Patients with Pacemakers or Cardioverter-Defibrillator Devices", JAMA Oncology, vol 1. no. 5, p.p. 623, Auguest 2015, DOI: https://doi.org/10.1001/jamaoncol.2015.1788
[10] Joseph T. Poterucha, Mark Westberg, Pamela Nerheim and James P. Lovell, "Rituximab-Induced Polymorphic Ventricular Tachycardia", Texas Heart Institute Journal, vol. 37, no. 2, p.p. 218-220, 2010.
[11] Michelle Davies, "Nutritional Screening and Assessment in Cancer-associated Malnutrition", European Journal of Oncology Nursing, vol. 9, no. 2, p.p. S64–S73, 2005. DOI: https://doi.org/10.1016/j.ejon.2005.09.005
[12] Haran Burri and David Senouf, "Remote Monitoring and Follow-up of Pacemakers and Implantable Cardioverter Defibrillators", EP Europace, vol. 11, no. 6, p.p. 701-709, April 2009. DOI: https://doi.org/10.1093/europace/eup110
[13] Christoph Beck, Daniel Masny, Willi Geiselmann, Georg Bretthauer, "Block Cipher Based Security for Severely Resource-constrained Implantable Medical Devices", ISABEL '11 Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies ISABEL '11 Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies, no. 62, October 2011. DOI: https://doi.org/10.1145/2093698.2093760
[14] Kevin Ashton, "That 'Internet of Things' Thing", RFID Journal, 22 June 2009, http://www.rfidjournal.com/articles/view?4986 , (accessed 06.25.2017).
[15] C. Li, A. Raghunathan, and N. K. Jha, “Hijacking an Insulin Pump: Security Attacks and Defenses for a Diabetes Therapy System,” IEEE HealthCom, 2011. DOI: https://doi.org/10.1109/HEALTH.2011.6026732
[16] J. Radcliffe, “Hacking Medical Devices for Fun and Insulin: Breaking the Human SCADA System,” in Black Hat USA, 2011.
[17] David Goldman, “A Hacker Can Give You a Fatal Overdose, 2013,” http://money.cnn.com/2015/06/10/technology/drug-pump-hack/ , (accessed 18.04.28).
[18] Barnaby Jack, “Implantable Medical Devices: Hacking Humans,” 2013, https://en.wikipedia.org/wiki/Barnaby Jack#cite note-medcity-11, (accessed 18.04.28).
[19] ICS Security, "Hacking Implantable Medical Devices, 2014," http://resources.infosecinstitute.com/hcking-implantable-medical-devices/#gref (accessed 18.04.28).
[20] E. Marin, D. Singel´ee, B. Yang, I. Verbauwhede, and B. Preneel, “On the feasibility of cryptography for a Wireless Insulin Pump System,” Proceedings of the Sixth ACM Conference on Data and Application Security and Privacy, p.p. 113-120, ser. CODASPY ’16, 2016, DOI: https://doi.org/10.1145/2857705.2857746 .
[21] U.S. Food and Drug Administration, “Two Safety Communications on the Cybersecurity Vulnerabilities of two Hospira Infusion Pump Systems,” https://www.reuters.com/article/us-hospira-fda-cybersecurity-idUSKCN0Q52GJ20150731, (accessed 18.07.18).
[22] U.S. Food and Drug Administration, "Firmware Update to Address Cybersecurity Vulnerabilities Identified in Abbott's (formerly St. Jude Medical's) Implantable Cardiac Pacemakers: FDA Safety Communication.", https://www.fda.gov/MedicalDevices/Safety/AlertsandNotices/ucm573669.htm , 2017, (accessed 18.04.28).
[23] Flavio Bonomi, Rodolfo Milito, Jiang Zhu and Sateesh Addepalli, ”Fog Computing and Its Role in the Internet of Things”, MCC '12 Proceedings of the first edition of the MCC workshop on Mobile cloud computing, p.p. 13-16, August 2012. DOI: https://doi.org/10.1145/2342509.2342513
[24] M. Aazam and E. N. Huh, "Fog Computing: The Cloud-IoT/IoE Middleware Paradigm," IEEE Potentials, vol. 35, no. 3, pp. 40-44, May-June 2016. DOI: https://doi.org/10.1109/MPOT.2015.2456213
[25] Xavi Masip-Bruin, Eva Marín-Tordera, Ghazal Tashakor, Admela Jukan and Guang-Jie Ren, "Foggy Clouds and Cloudy Fogs: a Real Need for Coordinated Management of Fog-to-Cloud Computing Systems", IEEE Wireless Communications, vol. 23, no. 5, p.p. 120-128, November 2016. DOI: https://doi.org/10.1109/MWC.2016.7721750
[26] National Institute of Standards and Technology, "SP 800-90A Rev. 1 - Recommendation for Random Number Generation Using Deterministic Random Bit Generators", 2015, https://csrc.nist.gov/publications/detail/sp/800-90a/rev-1/final , (accessed 18.04.30).
[27] Claude E. Shannon, "Communication Theory of Secrecy Systems", Bell System Technical Journal, vol. 28, no. 4, p.p.656-715, 1949. DOI: https://doi.org/10.1002/j.1538-7305.1949.tb00928.x
[28] National Institute of Standards and Technology, "Advanced Encryption Standard (AES)", November 2001. https://nvlpubs.nist.gov/nistpubs/fips/nist.fips.197.pdf , (accessed 18.05.05).
[29] Saied Hosseini-Khayat, "A Lightweight Security Protocol for Ultra-Low Power ASIC Implementation for Wireless Implantable Medical Devices," 2011 5th International Symposium on Medical Information and Communication Technology, Montreux, p.p. 6-9, 2011. DOI: https://doi.org/10.1109/ISMICT.2011.5759785
[30] National Institute of Standards and Technology, "Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths", November 2015. https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-131Ar1.pdf , (accessed 18.05.05).
[31] Elaine Barker, "Recommendation for Key Management, Part 1: General", NIST Special Publication 800-57 Part 1 Revision 1, January 2016. DOI: http://dx.doi.org/10.6028/NIST.SP.800-57pt1r4
[32] Ingo Deutschmann, Peder Nordström and Linus Nilsson, "Continuous Authentication Using Behavioral Biometrics", IT Professional, vol. 15, no. 4, p.p. 12-15, June 2013. DOI: https://doi.org/10.1109/MITP.2013.50
[33] Jen-Ming Hsu, Tzu-Chiang Chiang, Yao-Chang Yu, Wei-Guang Teng, and Ting-Wei Hou, “A New Energy Efficient and Reliable MedRadio Scheme Based on Cooperative Communication for Implanted Medical Devices”, International Journal of Distributed Sensor Networks, vol. 11, no. 2, 2015, DOI: http://dx.doi.org/10.1155/2015/239597
[34] Aria Nosratinia, Todd E. Hunter and Ahmadreza Hedayat, "Cooperative Communication in Wireless Networks", IEEE Communications Magazine, vol. 42, no. 10, p.p. 74-80, October 2004. DOI: https://doi.org/10.1109/MCOM.2004.1341264
[35] Su-E Kuo, Hui-San Lai, Jen-Ming Hsu, Yao-Chang Yu, Dong-Zhe Zheng and Ting-Wei Hou, "A Clinical Nutritional Information System with Personalized Nutrition Assessment", Computer Methods and Programs in Biomedicine, vol. 155, p.p. 209-216, March 2018, https://doi.org/10.1016/j.cmpb.2017.10.029
[36] Skevos Sideris, Stefanos Archontakis, Polychronis Dilaveris, Konstantinos A. Gatzoulis, Konstantinos Trachanas, Ilias Sotiropoulos, Petros Arsenos, Dimitrios Tousoulis and Ioannis Kallikazaros, "Leadless Cardiac Pacemakers: Current Status of a Modern Approach in Pacing", Hellenic Journal of Cardiology, May 2017, DOI: https://doi.org/10.1016/j.hjc.2017.05.004
[37] Roderick Tung, Peter Zimetbaum and Mark E. Josephson, “A Critical Appraisal of Implantable Cardioverter-Defibrillator Therapy for the Prevention of Sudden Cardiac Death”, Journal of the American College of Cardiology, vol. 52, no. 14, p.p. 1111-1121, September 2008, DOI: https://doi.org/10.1016/j.jacc.2008.05.058
[38] D. Yao, E. Jakubowitz, S. Ettinger, C. Plaass, C. Stukenborg-Colsman and K. Daniilidis,"Foot Drop Treatment by Implantation of a Neuroprosthesis", Operative Orthopädie und Traumatologie, p.p. 1-12, May 2017, DOI: https://doi.org/10.1007/s00064-017-0494-8
[39] Wei-Ming Chen, Herming Chiueh, Tsan-Jieh Chen, Chia-Lun Ho, Chi Jeng, Ming-Dou Ker, Chun-Yu Lin, Ya-Chun Huang, Chia-Wei Chou, Yu-Lin Wang, Fu-Zen Shaw, Yu-Hsing Huang, Chia-Hsiang Yang, Tsun-Yuan Fan, Ming-Seng Cheng, Yue-Loong Hsin, Sheng-Fu Liang and Chung-Yu Wu, "A Fully Integrated 8-Channel Closed-Loop Neural-Prosthetic CMOS SoC for Real-Time Epileptic Seizure Control", IEEE Journal of Solid-State Circuits, vol. 49, no. 1, p.p. 232-247, October 2013, DOI: https://doi.org/10.1109/JSSC.2013.2284346
[40] Ellis Meng and Tuan Hoang, "Micro- and Nano-Fabricated Implantable Drug-Delivery Systems", Therapeutic Delivery, vol. 3, no. 12, p.p. 1457-1467, December 2012, DOI: http://dx.doi.org/10.4155/tde.12.132
[41] M.J. Pekka Raatikainen, David O. Arnar, Bela Merkely, A. John Camm, and Gerhard Hindricks, "Access to and Clinical Use of Cardiac Implantable Electronic Devices and Interventional Electrophysiological Procedures in the European Society of Cardiology Countries: 2016 Report from the European Heart Rhythm Association", EP Europace, vol. 18, no. suppl_3, p.p. iii1-iii79, August 2016. DOI: https://doi.org/10.1093/europace/euw244
[42] M.J. Pekka Raatikainen, David O. Arnar, Katja Zeppenfeld, Jose Luis Merino, Karl-Heinz Kuck, and Gerhardt Hindricks "Current Trends in the Use of Cardiac Implantable Electronic Devices and Interventional Electrophysiological Procedures in the European Society of Cardiology Member Countries: 2015 Report from the European Heart Rhythm Association", EP Europace, vol. 17, no. suppl_4, p.p. iv1-iv72, August 2015. DOI: https://doi.org/10.1093/europace/euv265
[43] M.J. Pekka Raatikainen, David O. Arnar, Katja Zeppenfeld, Jose Luis Merino, Francisco Levya, Gerhardt Hindriks, and Karl-Heinz Kuck, "Statistics on the Use of Cardiac Electronic Devices and Electrophysiological Procedures in the European Society of Cardiology Countries: 2014 Report from the European Heart Rhythm Association", EP Europace, vol. 17, no. suppl_1, p.p. i1-i75, January 2015. DOI: http://dx.doi.org/10.1093/europace/euu300
[44] Bruce L. Wilkoff, Angelo Auricchio, Josep Brugada, Martin Cowie, Kenneth A. Ellenbogen, Anne M. Gillis, David L. Hayes, Jonathan G. Howlett, Josef Kautzner, Charles J. Love, John M. Morgan, Silvia G. Priori, Dwight W. Reynolds, Mark H. Schoenfeld, Panos E. Vardas, "HRS/EHRA Expert Consensus on the Monitoring of Cardiovascular Implantable Electronic Devices (CIEDs): Description of Techniques, Indications, Personnel, Frequency and Ethical Considerations: Developed in Partnership with the Heart Rhythm Society (HRS) and the European Heart Rhythm Association (EHRA); and in Collaboration with the American College of Cardiology (ACC), the American Heart Association (AHA), the European Society of Cardiology (ESC), the Heart Failure Association of ESC (HFA), and the Heart Failure Society of America (HFSA). Endorsed by the Heart Rhythm Society, the European Heart Rhythm Association (a registered branch of the ESC), the American College of Cardiology, the American Heart Association.", EP Europace, vol.10, no. 6, p.p. 707-725, June 2008, DOI: https://doi.org/10.1093/europace/eun122
[45] Furman, S., Parker, B., & Escher, D. J., Trans-Telephone Pacemaker Clinic. The Journal of Thoracic and Cardiovascular Surgery, vol. 61, no. 5, p.p. 827–834, May 1971.
[46] Colin Movsowitz and Suneet Mittal, "Remote Patient Management Using Implantable Devices", Journal of Interventional Cardiac Electrophysiology, vol. 31, no. 1, p.p. 81-90, June 2011. DOI: https://doi.org/10.1007/s10840-011-9548-2
[47] IEEE Standard for Information technology-- Local and Metropolitan Area Networks-- Specific Requirements-- Part 15.1a: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Wireless Personal Area Networks (WPAN), IEEE Std 802.15.1-2005 (Revision of IEEE Std 802.15.1-2002), pp.1-700, June 14 2005. DOI: https://doi.org/10.1109/IEEESTD.2005.96290
[48] IEEE Standard for Low-Rate Wireless Networks, IEEE Std 802.15.4-2015 (Revision of IEEE Std 802.15.4-2011), pp.1-709, April 22 2016. DOI: https://doi.org/10.1109/IEEESTD.2016.7460875
[49] IEEE Standard for Local and Metropolitan Area Networks - Part 15.6: Wireless Body Area Networks," IEEE Std 802.15.6-2012 , pp.1-271, Feb. 29 2012. DOI: https://doi.org/10.1109/IEEESTD.2012.6161600
[50] Mohsen A. M. El-Bendary, "Developing Security Tools of WSN and WBAN Networks Applications", Springer Japan, p.p. 11, 2015. ISBN: 978-4-431-55068-6, 978-4-431-55069-3
[51] Maulin Patel and Jianfeng Wang, "Applications, Challenges, and Prospective in Emerging Body Area Networking Technologies", IEEE Wireless Communications, vol. 17, no. 1, pp. 80-88, February 2010. DOI: https://doi.org/10.1109/MWC.2010.5416354
[52] Aria Nosratinia, Todd E. Hunter and Ahmadreza Hedayat, "Cooperative Communication in Wireless Networks", IEEE Communications Magazine, vol. 42, no. 10, pp. 74-80, Oct. 2004. DOI: https://doi.org/10.1109/MCOM.2004.1341264
[53] Qian Zhang, Juncheng Jia and Jin Zhang, "Cooperative Relay to Improve Diversity In Cognitive Radio Networks", IEEE Communications Magazine, vol. 47, no. 2, pp. 111-117, February 2009. DOI: https://doi.org/10.1109/MCOM.2009.4785388
[54] Shyamnath Gollakota, Haitham Hassanieh, Benjamin Ransford, Dina Katabi and Kevin Fu "They Can Hear Your Heartbeats: Non-Invasive Security for Implantable Medical Devices", SIGCOMM '11 Proceedings of the ACM SIGCOMM 2011 conference, p.p. 2-13. DOI: SIGCOMM '11 Proceedings of the ACM SIGCOMM 2011 conference
[55] Fengyuan Xu, Zhengrui Qin, Chiu C. Tan, Baosheng Wang and Qun Li, "IMDGuard: Securing Implantable Medical Devices with the External Wearable Guardian," 2011 Proceedings IEEE INFOCOM, Shanghai, 2011, pp. 1862-1870. DOI: https://doi.org/10.1109/INFCOM.2011.5934987
[56] Chunxiao Li, A. Raghunathan and N. K. Jha, "Hijacking an Insulin Pump: Security Attacks and Defenses for a Diabetes Therapy System," 2011 IEEE 13th International Conference on e-Health Networking, Applications and Services, Columbia, MO, 2011, pp. 150-156. DOI: https://doi.org/10.1109/HEALTH.2011.6026732
[57] Shyamnath Gollakota, Haitham Al Hassanieh, Ben Ransford, Dina Katabi and Kevin Fu, "They Can Hear Your Heartbeats: Non-Invasive Security for Implantable Medical Devices", Proceedings of the ACM SIGCOMM 2011 conference, vol. 41, no. 4, p.p. 2-13, August 2011. DOI: https://doi.org/10.1145/2018436.2018438
[58] Wonsuk Choi , In Seok Kim and Dong Hoon Lee, "E2PKA: An Energy-Efficient and PV-Based Key Agreement Scheme for Body Area Networks", Wireless Personal Communications: An International Journal, vol.97 no.1, p.p.977-998, November 2017. DOI: https://doi.org/10.1007/s11277-017-4547-y
[59] Krishna K. Venkatasubramanian, Eugene Y. Vasserman, Oleg Sokolsky, and Insup Lee, "Security and Interoperable Medical Device Systems: Part 1", IEEE Security & Privacy, vol.10, no. 5, p.p. 61-63, 2012. DOI: https://dx.doi.org/10.1109%2FMSP.2012.128
[60] Eduard Marin, Dave Singelée, Flavio D. Garcia, Tom Chothia, Rik Willems and Bart Preneel, “On the (in)security of the Latest Generation Implantable Cardiac Defibrillators and How to Secure Them”, ACSAC '16 Proceedings of the 32nd Annual Conference on Computer Security Applications, p.p. 226-236, December 2016.
[61] Michael Rushanan, Aviel D. Rubin, Denis Foo Kune and Colleen M. Swanson, "SoK: Security and Privacy in Implantable Medical Devices and Body Area Networks", 2014 IEEE Symposium on Security and Privacy (SP), May 2014, DOI: http://dx.doi.org/10.1109/SP.2014.40
[62] Foteini Agrafioti, "ECG in Biometric Recognition: Time Dependency and Application Challenges", Doctor of Philosophy Graduate Department of Electrical and Computer Engineering University of Toronto, 2011.
[63] S. Zahra Fatemian, Foteini Agrafioti and Dimitrios Hatzinakos, "HeartID: Cardiac Biometric Recognition", Theory Applications and Systems (BTAS), 2010 Fourth IEEE International Conference on Biometrics, September 2010, DOI: http://dx.doi.org/10.1109/BTAS.2010.5634493
[64] Foteini AGRAFIOTI, Francis Minhthang BUI, Dimitrios Hatzinakos, System and Method for Enabling Continuous or Instantaneous Identity Recognition Based on Physiological Biometric Signals, WIPO Patent No. WO2012151680 A1. Geneva, Switzerland: World Intellectual Property Organization. Chicago, November 2012, http://www.google.com/patents/WO2012151680A1?cl=en (accessed 04.30.2017).
[65] Rachel Nuwer, Wristband Unlocks Your Devices With your Heartbeat, New Scientist,3 September 2013, https://www.newscientist.com/article/dn24141-wristband-unlocks-your-devices-with-your-heartbeat/ (accessed 04.30.2017)
[66] Gabrielle Pickard Whitehead, Your Heart Beat Will Now Identify You for Secure Credit Card Use, The Street, 24 March 2015, https://www.thestreet.com/story/13088566/1/your-heart-beat-will-now-identify-you-for-secure-credit-card-use.html (accessed 04.30.2017)
[67] X. Hei and X. Du, "Biometric-Based Two-Level Secure Access Control for Implantable Medical Devices During Emergencies", 2011 Proceedings IEEE INFOCOM, p.p. 346-350, June 2011. DOI: https://doi.org/10.1109/INFCOM.2011.5935179
[68] Nourhene Ellouze, Mohamed Allouche, Habib Ben Ahmed, Sliim Rekhis and Noureddine Boudriga, "Securing Implantable Cardiac Medical Devices: Use of Radio Frequency Energy Harvesting", TrustED '13 Proceedings of the 3rd international workshop on Trustworthy embedded devices, p.p. 35-45, November 2013. DOI: https://doi.org/10.1145/2517300.2517307
[69] Joshua S. Richman, J. Randall Moorman, “Physiological Time-Series Analysis Using Approximate Entropy and Sample Entropy”, American Journal of Physiology - Heart and Circulatory Physiology, vol. 278, no. 6, p.p. H2039-H2049, 2000.
[70] Elaine Barker and John Kelsey, “Recommendation for Random Number Generation Using Deterministic Random Bit Generators”, NIST Special Publication 800-90A Revision 1, June 2015.
[71] Guanglou Zheng, Gengfa Fang, Rajan Shankaran and Mehmet A. Orgun, "Encryption for Implantable Medical Devices Using Modified One-Time Pads", IEEE Access, vol. 3, p.p. 825-836, June 2015. DOI: https://doi.org/10.1109/ACCESS.2015.2445336
[72] GILBERT S. VERNAM (1919) U.S. Patent No. US1310719A. WASHINGTON. D. c. UNITED STATES PATENT OFFICE. https://patents.google.com/patent/US1310719#citedBy , (accessed 18.05.05)
[73] N. Haller, C. Metz, P. Nesser and M. Straw, "A One-Time Password System", Request for Comments: 2289, Network Working Group, Internet Engineering Task Force, February 1998. https://tools.ietf.org/html/rfc2289 , (accessed 18.05.05)
[74] Dan Shumow and Niels Ferguson, "On the Possibility of a Back Door in the NIST SP800-90 Dual Ec Prng", CRYPTO 2007. https://rump2007.cr.yp.to/15-shumow.pdf , (accessed 18.04.30).
[75] Leo Dorrendorf, Zvi Gutterman and Benny Pinkas, "Cryptanalysis of the Random Number Generator of the Windows Operating System", ACM Transactions on Information and System Security, vol. 13, no. 1, October 2009. DOI: https://doi.org/10.1145/1609956.1609966
[76] Wolfgang Killmann and Werner Schindler, A proposal for: Functionality Classes and Evaluation Methodology for True (Physical) Random Number Generators, Bundesamt für Sicherheit in der Informationstechnik, 2011. https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Interpretationen/AIS_31_Functionality_classes_evaluation_methodology_for_true_RNG_e.pdf , (accessed 18.05.13).
[77] National Institute of Standards and Technology, "Secure Hash Standard (SHS)", August 2015. https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf , (accessed 18.05.05).
[78] National Institute of Standards and Technology, "The Keyed-Hash Message Authentication Code (HMAC)", July 2008. https://nvlpubs.nist.gov/nistpubs/fips/nist.fips.198-1.pdf , (accessed 18.05.05).
[79] Dror G. Feitelson, Anat Batat, Gabriel Benhanokh and Marc A. Volovic, "The ParPar System: A Software MPP", High Performance Cluster Computing, vol. 1, p.p. 754-770, December 1998.
[80] Dror G. Feitelson and Morris A. Jette, "Improved Utilization and Responsiveness with Gang Scheduling", IPPS '97 Proceedings of the Job Scheduling Strategies for Parallel Processing, p.p. 238-261, 1997.
[81] Hubertus Franke, Pratap Pattnaik and Larry Rudolph, "Gang Scheduling for Highly Efficient Distributed Multiprocessor Systems", Frontiers of Massively Parallel Computing, 1996. Proceedings Frontiers '96., Sixth Symposium on the, Annapolis, MA, USA, pp. 4-12, August 2002. DOI: https://doi.org/10.1109/FMPC.1996.558056
[82] Atsushi Hori, Hiroshi Tezuka, Yutaka Ishikawa, Noriyuki Soda, Hiroki Konaka and Munenori Maeda, "Implementation of Gang-Scheduling on Workstation Cluster", Job Scheduling Strategies for Parallel Processing, vol. 1162, p.p. 126-139, 1996. DOI: https://doi.org/10.1007/BFb0022291
[83] John K. Ousterhout, "Scheduling Techniques for Concurrent Systems", Proceedings of the 3rd International Conference on Distributed Computing Systems, p.p. 22-30, 1982.
[84] Dror G. Feitelson and Larry Rudolph, "Distributed Hierarchical Control for Parallel Processing," Computer, vol. 23, no. 5, pp. 65-77, May 1990. DOI: https://doi.org/10.1109/2.53356
[85] Hubertus Franke, Pratap Pattnaik and Larry Rudolph, "Gang Scheduling for Highly Efficient, Distributed Multiprocessor Systems," Frontiers of Massively Parallel Computing, 1996. Proceedings Frontiers '96., Sixth Symposium on the, Annapolis, MA, USA, pp. 4-12, 1996. DOI: http://doi.org/10.1109/FMPC.1996.558056
[86] Sanaz Rahimi Moosavi, Tuan Nguyen Gia, Ethiopia Nigussie, Amir M. Rahmani, Seppo Virtanen, Hannu Tenhunen and Jouni Isoaho, “End-to-End Security Scheme for Mobility Enabled Healthcare Internet of Things”, Future Generation Computer Systems, vol. 64, p.p. 108-124, February 2016, DOI: http://dx.doi.org/10.1016/j.future.2016.02.0200167-739X/
[87] E. Rescorla and N. Modadugu, “Datagram Transport Layer Security Version 1.2”, Internet Engineering Task Force (IETF) Request for Comments: 6347, January 2012, https://tools.ietf.org/html/rfc6347 , (accessed 18.05.05)
[88] Guanglou Zheng, Gengfa Fang, Mehmet A. Orgun, Rajan Shankaran and Eryk Dutkiewicz, "Securing Wireless Medical Implants Using an ECG-Based Secret Data Sharing Scheme," 2014 14th International Symposium on Communications and Information Technologies (ISCIT), p.p. 373-377, January 2014. DOI: https://doi.org/10.1109/ISCIT.2014.7011935
[89] ARI Juels and Madhu Sudan, “A Fuzzy Vault Scheme”, Designs, Codes and Cryptography, vol. 38, no. 237, p.p. 237-257, 2016. DOI: https://doi.org/10.1007/s10623-005-6343-z
[90] Masoud Rostami, Ari Juels and Farinaz Koushanfar, "Heart-to-Heart (H2H): Authentication for Implanted Medical Devices", Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, p.p. 1099-1112, November 2013. DOI: https://doi.org/10.1145/2508859.2516658
[91] National Institute of Standards and Technology, "SP 800-22 Rev. 1a - A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications", April 2010, https://nvlpubs.nist.gov/nistpubs/legacy/sp/nistspecialpublication800-22r1a.pdf , (accessed 18.06.17).
[92] Jen-Ming Hsu, Yao-Chang Yu, Ting-Wei Hou, Wei-Guang Teng, Tzu-Chiang Chiang and Ming-Chang Yang, “A Multi-Constraint Scheme with Authorized Mechanism for the Patient Safety”, Journal of Medical Systems, vol. 40, no. 123, April 2016, DOI:
http://dx.doi.org/10.1007/s10916-016-0479-4
[93] Marc Stevens and Dan Shumow, "Speeding up Detection of SHA-1 Collision Attacks Using Unavoidable Attack Conditions", Proceedings of the 26th USENIX Security Symposium, August 2017.
[94] Namhi Kang, Jiye Park, Hyeokjin Kwon and Souhwan Jung, "ESSE: Efficient Secure Session Establishment for Internet-Integrated Wireless Sensor Networks", International Journal of Distributed Sensor Networks, vol. 11, no. 8, August 2015, DOI: https://doi.org/10.1155/2015/393754