The Community for Technology Leaders
RSS Icon
Issue No.05 - Sept.-Oct. (2012 vol.10)
pp: 61-63
Krishna K. Venkatasubramanian , Worcester Polytechnic Institute
Eugene Y. Vasserman , Kansas State University
Oleg Sokolsky , University of Pennsylvania
Insup Lee , University of Pennsylvania
Interoperable medical devices (IMDs) face threats due to the increased attack surface presented by interoperability and the corresponding infrastructure. Introducing networking and coordination functionalities fundamentally alters medical systems' security properties. Understanding the threats is an important first step in eventually designing security solutions for such systems. Part 1 of this two-part article provides an overview of the IMD environment and the attacks that can be mounted on it.
IEEE standards, Medical devices, Computer security, Interoperability, Biomedical equipment, attack vectors, interoperable medical devices, medical devices, computer security, interoperability, Integrated Clinical Environment, ICE, attack model
Krishna K. Venkatasubramanian, Eugene Y. Vasserman, Oleg Sokolsky, Insup Lee, "Security and Interoperable-Medical-Device Systems, Part 1", IEEE Security & Privacy, vol.10, no. 5, pp. 61-63, Sept.-Oct. 2012, doi:10.1109/MSP.2012.128
1. D. Arney et al., “Biomedical Devices and Systems Security,” Proc. 33rd Ann. Int'l Conf. IEEE Eng. in Medicine and Biology Soc. (EMBC 11), IEEE, 2011, pp. 2376–2379.
2. ASTM F2761 - 09 Medical Devices and Medical Systems—Essential Safety Requirements for Equipment Comprising the Patient-Centric Integrated Clinical Environment (ICE)—Part 1: General Requirements and Conceptual Model, ASTM F29.21, ASTM Int'l, 2009.
3. M. Clarke et al., “Developing a Standard for Personal Health Devices Based on 11073,” Proc. 29th Ann. Int'l Conf. IEEE Eng. in Medicine and Biology Soc. (EMBC 07), IEEE, 2007, pp. 6174–6176.
4. “Introduction to HL7 Standards,” Health Level Seven Int'l, 2012;
5. Integrating the Healthcare Enterprise, IHE Int'l, 2012;
6. D. Halperin et al., “Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses,” Proc. 2008 IEEE Symp. Security and Privacy, IEEE, 2008, pp. 129–142.
7. Z. Benenson, E. Blaß, and F.C. Freiling, “Attacker Models for Wireless Sensor Networks,” Information Technology, vol. 52, no. 6, 2010, pp. 320–324.
447 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool