This paper is published in Volume-7, Issue-3, 2021
Area
Medical Electronics
Author
Sahana, Sindhu Rajendran, Vibha Narayan R., Rahul Pinny
Org/Univ
RV College of Engineering, Bengaluru, Karnataka, India
Keywords
IMD, Security, Attack Vector, Encryption
Citations
IEEE
Sahana, Sindhu Rajendran, Vibha Narayan R., Rahul Pinny. A Study to Investigate the security issues in IMD, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.
APA
Sahana, Sindhu Rajendran, Vibha Narayan R., Rahul Pinny (2021). A Study to Investigate the security issues in IMD. International Journal of Advance Research, Ideas and Innovations in Technology, 7(3) www.IJARIIT.com.
MLA
Sahana, Sindhu Rajendran, Vibha Narayan R., Rahul Pinny. "A Study to Investigate the security issues in IMD." International Journal of Advance Research, Ideas and Innovations in Technology 7.3 (2021). www.IJARIIT.com.
Sahana, Sindhu Rajendran, Vibha Narayan R., Rahul Pinny. A Study to Investigate the security issues in IMD, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.
APA
Sahana, Sindhu Rajendran, Vibha Narayan R., Rahul Pinny (2021). A Study to Investigate the security issues in IMD. International Journal of Advance Research, Ideas and Innovations in Technology, 7(3) www.IJARIIT.com.
MLA
Sahana, Sindhu Rajendran, Vibha Narayan R., Rahul Pinny. "A Study to Investigate the security issues in IMD." International Journal of Advance Research, Ideas and Innovations in Technology 7.3 (2021). www.IJARIIT.com.
Abstract
With the ever-growing rise in smart devices and their applications in most sectors, there is a need for security as the information is transmitted using a wireless medium of transmission. One of the most profound health care devices is the implantable medical devices used for monitoring and control of vital organs such as neural systems, heart, and cochlear implants. Although IMDs provide quick and cost-effective diagnostic features to the patients there exist some design constraints and software threats that need attention. There is a chance of leakage of confidential data pertaining to the person with IMD by attackers, thereby manipulating the parameters of the devices causing the patient’s life to be at high risk. In our paper, the different types of IMDs and their constraints are addressed. As the emphasis is on the security aspects of these devices, their requirements, the attack vectors, the type of attacks encountered, and the protection mechanisms implemented to date are also discussed.