Authentication for implanted medical devices


Discuss the following:

Review the below:

Heart-to-Heart (H2H): Authentication for Implanted Medical Devices by Masoud Rostami, Ari Juels and Farinaz Koushanfar

ContexIoT: Towards Providing Contextual Integrity to Appified IoT Platforms by Yunhan Jack Jia, Qi Alfred Chen, Shiqi Wang , Amir Rahmati, Earlence Fernandes, Z. Morley Mao, Atul Prakash

Q1: Explains the problems inherent with existing implantable medical devices, and how a hacker can potentially take control of a device and cause harm to a patient. Post an analysis of the article in 600 words or less, making sure to thoroughly explore the security holes that the proposed H2H system is supposed to plug. How would the ability to gather data differ (either positively or negatively) when physical contact is needed with the patient's body as opposed to current radio-based communication? Would the benefits outweigh the inconvenience?

Q2: The IoT platform is becoming more popular, with more manufacturers providing "web-enabled" devices. From door locks, to baby monitors, to refrigerators, to lights, HVAC systems, security systems, etc. The list goes on and on. With it comes inherent security risk. Read this article and provide your thoughts with an analysis of 600 words or less.

Solution Preview :

Prepared by a verified Expert
Other Subject: Authentication for implanted medical devices
Reference No:- TGS01947878

Now Priced at $25 (50% Discount)

Recommended (96%)

Rated (4.8/5)