Abstract

In summary, this short book has provided a brief introduction to the new research area of security and privacy in the field of implantable medical devices (IMDs) by presenting two sides of the problem, namely, IMDs and embedded security. The book has four chapters written by international leaders in the field of implantable medical devices. These chapters introduce the latest advances and research problems in the area of IMDs. The first chapter is from an industry leader in the field of implantable devices for continuous glucose monitoring. Their subcutaneous system for glucose sampling is described in the chapter and the whole monitoring system is presented, including a palm device that wirelessly connects the sensors. This provides the first clear example in the book of a system that is already on the market and that presents a potential vulnerability for malicious attacks (the wireless connection between the handheld reader of the physician and the sensory device wore by the patient). The next two chapters are from scientists in two leading academic institutions (one in the United States and the other in Europe). These chapters present more advanced research results from the scientific literature concerning the monitoring of several metabolites (molecules related to metabolic states) for different applications in both unhealthy and healthy patients. These chapters show two different systems, recently published in the literature, that contain more than one sensor and that, therefore, could monitor several metabolites simultaneously. In both cases, the sensory device is a subcutaneous implant that is remotely connected with a device located externally with respect to the body. Therefore, a potential eavesdropping or impersonation vulnerability arises again, although reduced due to the short-range communication. The removability of the external device raises authentication and privacy concerns. The last chapter dedicated to implantable medical devices focuses on a new approach that is currently under development in regenerative medicine: the possibility of inserting in the body a bioreactor that might regenerate damaged tissue directly in the body region of interest. Of course, the future development of this extremely fascinating approach to regenerating human organs foresees the introduction of sensors and actuators that allow a deeper and closer control of bioreactors. Again, remote sensing and control of a bioreactor requires a reliable and secure channel for data communication and operation commands. Hopefully these four examples provide a background on the possibilities of IMDs, as well as the potential vulnerabilities and motivations for a malicious attack.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.