Search For:

Displaying 1-9 out of 9 total
BioSec: A Biometric Based Approach for Securing Communication in Wireless Networks of Biosensors Implanted in the Human Body
Found in: Parallel Processing Workshops, International Conference on
By Sriram Cherukuri, Krishna K Venkatasubramanian, Sandeep K S Gupta
Issue Date:October 2003
pp. 432
Advances in microelectronics, material science and wireless technology have led to the development of sensors that can be used for accurate monitoring of inaccessible environments. Health monitoring, telemedicine, military and environmental monitoring are ...
 
Functional Alarms for Systems of Interoperable Medical Devices
Found in: 2014 IEEE 15th International Symposium on High-Assurance Systems Engineering (HASE)
By Krishna K. Venkatasubramanian,Eugene Y. Vasserman,Oleg Sokolsky,Insup Lee
Issue Date:January 2014
pp. 247-248
Alarms are essential for medical systems in order to ensure patient safety during deteriorating clinical situations and inevitable device malfunction. As medical devices are connected together to become interoperable, alarms become crucial part in making t...
 
Security and Interoperable-Medical-Device Systems, Part 2: Failures, Consequences, and Classification
Found in: IEEE Security & Privacy
By Eugene Y. Vasserman,Krishna K. Venkatasubramanian,Oleg Sokolsky,Insup Lee
Issue Date:November 2012
pp. 70-73
Interoperable medical devices (IMDs) face threats due to the increased attack surface presented by interoperability and the corresponding infrastructure. Introducing networking and coordination functionalities fundamentally alters medical systems' security...
 
Security and Interoperable-Medical-Device Systems, Part 1
Found in: IEEE Security & Privacy
By Krishna K. Venkatasubramanian,Eugene Y. Vasserman,Oleg Sokolsky,Insup Lee
Issue Date:September 2012
pp. 61-63
Interoperable medical devices (IMDs) face threats due to the increased attack surface presented by interoperability and the corresponding infrastructure. Introducing networking and coordination functionalities fundamentally alters medical systems' security...
 
CAAC -- An Adaptive and Proactive Access Control Approach for Emergencies in Smart Infrastructures
Found in: ACM Transactions on Autonomous and Adaptive Systems (TAAS)
By Krishna K. Venkatasubramanian, Sandeep K. S. Gupta, Tridib Mukherjee
Issue Date:January 2014
pp. 1-18
The article presents an access control model called Criticality Aware Access Control (CAAC) for criticality (emergency) management in smart infrastructures. Criticalities are consequences of events which take a system (in our case, a smart infrastructure) ...
     
Physiological value-based efficient usable security solutions for body sensor networks
Found in: ACM Transactions on Sensor Networks (TOSN)
By Krishna K. Venkatasubramanian, Sandeep K. S. Gupta
Issue Date:July 2010
pp. 1-36
A Body Sensor Network (BSN) is a network of economically powered, wireless, wearable, and implanted health monitoring sensors, designed to continually collect and communicate health information from the host they are deployed on. Due to the sensitive natur...
     
Analyzing and defending against web-based malware
Found in: ACM Computing Surveys (CSUR)
By Andrew G. West, Insup Lee, Jian Chang, Krishna K. Venkatasubramanian
Issue Date:August 2013
pp. 1-35
Web-based malware is a growing threat to today's Internet security. Attacks of this type are prevalent and lead to serious security consequences. Millions of malicious URLs are used as distribution channels to propagate malware all over the Web. After bein...
     
HMM-based characterization of channel behavior for networked control systems
Found in: Proceedings of the 1st international conference on High Confidence Networked Systems (HiCoNS '12)
By Insup Lee, Krishna K. Venkatasubramanian, Chinwendu Enyioha, George J. Pappas, Jian Chang, Shreyas Sundaram
Issue Date:April 2012
pp. 11-20
We study the problem of characterizing the behavior of lossy and data corrupting communication channels in a networked control setting, where the channel's behavior exhibits temporal correlation. We propose a behavior characterization mechanism based on a ...
     
Reputation-based networked control with data-corrupting channels
Found in: Proceedings of the 14th international conference on Hybrid systems: computation and control (HSCC '11)
By Chinwendu Enyioha, George J. Pappas, Insup Lee, Jian Chang, Krishna K. Venkatasubramanian, Shreyas Sundaram
Issue Date:April 2011
pp. 291-300
We examine the problem of reliable networked control when the communication channel between the controller and the actuator periodically drops packets and is faulty (i.e., corrupts/alters data). We first examine the use of a standard triple modular redunda...
     
 1