Detecting data manipulation attacks on physiological sensor measurements in wearable medical systems
Recent years have seen the emergence of wearable medical systems (WMS) that have demonstrated great promise for improved health monitoring and overall well-being. Ensuring that these WMS accurately monitor a user’s current health state is crucial. This is especially true in the presence of adversari...
Gespeichert in:
| Veröffentlicht in: | EURASIP Journal on Information Security Jg. 2018; H. 1; S. 1 - 21 |
|---|---|
| Hauptverfasser: | , |
| Format: | Journal Article |
| Sprache: | Englisch |
| Veröffentlicht: |
Cham
Springer International Publishing
29.09.2018
Springer Nature B.V SpringerOpen |
| Schlagworte: | |
| ISSN: | 2510-523X, 1687-4161, 2510-523X, 1687-417X |
| Online-Zugang: | Volltext |
| Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
| Abstract | Recent years have seen the emergence of wearable medical systems (WMS) that have demonstrated great promise for improved health monitoring and overall well-being. Ensuring that these WMS accurately monitor a user’s current health state is crucial. This is especially true in the presence of adversaries who want to mount
data manipulation attacks
on the WMS. The goal of data manipulation attacks is to alter the measurements made by the sensors in the WMS with fictitious data that is plausible but not accurate. Such attacks force clinicians or any decision support system AI, analyzing the WMS data, to make incorrect diagnosis and treatment decisions about the patient’s health.
In this paper, we present an approach to detect data manipulation attacks based on the idea that multiple physiological signals based on the same underlying physiological process (e.g., cardiac process) are inherently related to each other. We capture the commonalities between a “target” sensor measurement and another “reference” sensor measurement (which is trustworthy), by building an
image reconstruction-based classifier
and using this classifier to identify any unilateral changes in the target sensor measurements. This classifier is
user-specific
and needs to be created for every user on whom the WMS is deployed. In order to showcase our idea, we present a case study where we detect data manipulation attacks on electrocardiogram (ECG) sensor measurements in a WMS using blood pressure measurement as reference. We chose ECG and blood pressure—in arterial blood pressure (ABP) form—because both are some of the most commonly measured physiological signals in a WMS environment. Our approach demonstrates promising results with above 98% accuracy in detecting even subtle ECG alterations for both healthy subjects and those with different cardiac ailments. Finally, we show that the approach is general in that it can be used to build a model for detecting data manipulation attacks that alter ABP sensor measurements using the ECG sensor as reference. |
|---|---|
| AbstractList | Recent years have seen the emergence of wearable medical systems (WMS) that have demonstrated great promise for improved health monitoring and overall well-being. Ensuring that these WMS accurately monitor a user’s current health state is crucial. This is especially true in the presence of adversaries who want to mount data manipulation attacks on the WMS. The goal of data manipulation attacks is to alter the measurements made by the sensors in the WMS with fictitious data that is plausible but not accurate. Such attacks force clinicians or any decision support system AI, analyzing the WMS data, to make incorrect diagnosis and treatment decisions about the patient’s health.In this paper, we present an approach to detect data manipulation attacks based on the idea that multiple physiological signals based on the same underlying physiological process (e.g., cardiac process) are inherently related to each other. We capture the commonalities between a “target” sensor measurement and another “reference” sensor measurement (which is trustworthy), by building an image reconstruction-based classifier and using this classifier to identify any unilateral changes in the target sensor measurements. This classifier is user-specific and needs to be created for every user on whom the WMS is deployed. In order to showcase our idea, we present a case study where we detect data manipulation attacks on electrocardiogram (ECG) sensor measurements in a WMS using blood pressure measurement as reference. We chose ECG and blood pressure—in arterial blood pressure (ABP) form—because both are some of the most commonly measured physiological signals in a WMS environment. Our approach demonstrates promising results with above 98% accuracy in detecting even subtle ECG alterations for both healthy subjects and those with different cardiac ailments. Finally, we show that the approach is general in that it can be used to build a model for detecting data manipulation attacks that alter ABP sensor measurements using the ECG sensor as reference. Abstract Recent years have seen the emergence of wearable medical systems (WMS) that have demonstrated great promise for improved health monitoring and overall well-being. Ensuring that these WMS accurately monitor a user’s current health state is crucial. This is especially true in the presence of adversaries who want to mount data manipulation attacks on the WMS. The goal of data manipulation attacks is to alter the measurements made by the sensors in the WMS with fictitious data that is plausible but not accurate. Such attacks force clinicians or any decision support system AI, analyzing the WMS data, to make incorrect diagnosis and treatment decisions about the patient’s health. In this paper, we present an approach to detect data manipulation attacks based on the idea that multiple physiological signals based on the same underlying physiological process (e.g., cardiac process) are inherently related to each other. We capture the commonalities between a “target” sensor measurement and another “reference” sensor measurement (which is trustworthy), by building an image reconstruction-based classifier and using this classifier to identify any unilateral changes in the target sensor measurements. This classifier is user-specific and needs to be created for every user on whom the WMS is deployed. In order to showcase our idea, we present a case study where we detect data manipulation attacks on electrocardiogram (ECG) sensor measurements in a WMS using blood pressure measurement as reference. We chose ECG and blood pressure—in arterial blood pressure (ABP) form—because both are some of the most commonly measured physiological signals in a WMS environment. Our approach demonstrates promising results with above 98% accuracy in detecting even subtle ECG alterations for both healthy subjects and those with different cardiac ailments. Finally, we show that the approach is general in that it can be used to build a model for detecting data manipulation attacks that alter ABP sensor measurements using the ECG sensor as reference. Recent years have seen the emergence of wearable medical systems (WMS) that have demonstrated great promise for improved health monitoring and overall well-being. Ensuring that these WMS accurately monitor a user’s current health state is crucial. This is especially true in the presence of adversaries who want to mount data manipulation attacks on the WMS. The goal of data manipulation attacks is to alter the measurements made by the sensors in the WMS with fictitious data that is plausible but not accurate. Such attacks force clinicians or any decision support system AI, analyzing the WMS data, to make incorrect diagnosis and treatment decisions about the patient’s health. In this paper, we present an approach to detect data manipulation attacks based on the idea that multiple physiological signals based on the same underlying physiological process (e.g., cardiac process) are inherently related to each other. We capture the commonalities between a “target” sensor measurement and another “reference” sensor measurement (which is trustworthy), by building an image reconstruction-based classifier and using this classifier to identify any unilateral changes in the target sensor measurements. This classifier is user-specific and needs to be created for every user on whom the WMS is deployed. In order to showcase our idea, we present a case study where we detect data manipulation attacks on electrocardiogram (ECG) sensor measurements in a WMS using blood pressure measurement as reference. We chose ECG and blood pressure—in arterial blood pressure (ABP) form—because both are some of the most commonly measured physiological signals in a WMS environment. Our approach demonstrates promising results with above 98% accuracy in detecting even subtle ECG alterations for both healthy subjects and those with different cardiac ailments. Finally, we show that the approach is general in that it can be used to build a model for detecting data manipulation attacks that alter ABP sensor measurements using the ECG sensor as reference. |
| ArticleNumber | 13 |
| Author | Cai, Hang Venkatasubramanian, Krishna K. |
| Author_xml | – sequence: 1 givenname: Hang surname: Cai fullname: Cai, Hang organization: Worcester Polytechnic Institute – sequence: 2 givenname: Krishna K. orcidid: 0000-0001-7593-2513 surname: Venkatasubramanian fullname: Venkatasubramanian, Krishna K. email: kven@wpi.edu organization: Worcester Polytechnic Institute |
| BookMark | eNp9kUFrFTEUhUNpobX2B3Q34Ho0ySTz8pZStRYK3Si4C3du7jzznEmeSR4y_960I1YEXeWSnO_cQ84LdhpiIMauBX8thOnfZNH1nW65MC3nRrbLCbuQWvBWy-7L6R_zObvKec85l4abLdcXzL2jQlh82DUOCjQzBH84TlB8DA2UAvgtN3U8fF2yj1PceYSpyRRyTM1MkI-JZgolNz40PwgSDBPVB7fqllxozi_Z2QhTpqtf5yX7_OH9p5uP7f3D7d3N2_sWldSldQMKA0NnSBKXG3TGmAHlZjNw56iXRg-9ElrxcVQ1_-g4Iow4kgShnVTdJbtbfV2EvT0kP0NabARvny5i2llIxeNEVhokwzVuByTVGzH0AkfoVKewoxGger1avQ4pfj9SLnYfjynU-FYKoYQ0Um-rSqwqTDHnROPvrYLbx27s2o2t3djHbuxSmc1fDPry9OElgZ_-S8qVzHVL2FF6zvRv6Ccmyaie |
| CitedBy_id | crossref_primary_10_1016_j_cie_2020_106854 crossref_primary_10_1016_j_inffus_2020_03_004 crossref_primary_10_1007_s00607_021_00927_9 |
| Cites_doi | 10.1109/CIC.2015.7411064 10.1161/01.CIR.101.23.e215 10.1109/ICSMC.2012.6378098 10.1109/MPRV.2008.16 10.1016/j.imavis.2007.03.004 10.1002/gepi.20211 10.1109/TBME.2003.808805 10.1016/j.pmcj.2011.09.006 10.1109/SP.2013.20 10.3390/s90201282 10.1109/TIE.2010.2070772 10.1016/0169-7439(87)80084-9 10.1109/DCOSS.2016.36 10.1007/978-3-540-36675-1_15 10.1109/ISIE.2007.4374812 10.1016/j.comcom.2008.06.014 10.3109/03091900903150998 10.1007/978-3-319-03005-0_54 10.1109/CNS.2014.6997498 |
| ContentType | Journal Article |
| Copyright | The Author(s) 2018 EURASIP Journal on Information Security is a copyright of Springer, (2018). All Rights Reserved. © 2018. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
| Copyright_xml | – notice: The Author(s) 2018 – notice: EURASIP Journal on Information Security is a copyright of Springer, (2018). All Rights Reserved. © 2018. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
| DBID | C6C AAYXX CITATION 3V. 7SC 7XB 8AL 8FD 8FE 8FG 8FK ABUWG AFKRA ARAPS AZQEC BENPR BGLVJ CCPQU DWQXO GNUQQ HCIFZ JQ2 K7- L7M L~C L~D M0N P5Z P62 PHGZM PHGZT PKEHL PQEST PQGLB PQQKQ PQUKI PRINS Q9U DOA |
| DOI | 10.1186/s13635-018-0082-y |
| DatabaseName | Springer Nature OA Free Journals CrossRef ProQuest Central (Corporate) Computer and Information Systems Abstracts ProQuest Central (purchase pre-March 2016) Computing Database (Alumni Edition) Technology Research Database ProQuest SciTech Collection ProQuest Technology Collection ProQuest Central (Alumni) (purchase pre-March 2016) ProQuest Central (Alumni) ProQuest Central UK/Ireland Advanced Technologies & Computer Science Collection ProQuest Central Essentials ProQuest Central Technology collection ProQuest One Community College ProQuest Central ProQuest Central Student SciTech Premium Collection ProQuest Computer Science Collection Computer Science Database Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional Computing Database Advanced Technologies & Aerospace Database ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Premium ProQuest One Academic (New) ProQuest One Academic Middle East (New) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic (retired) ProQuest One Academic UKI Edition ProQuest Central China ProQuest Central Basic DOAJ Directory of Open Access Journals |
| DatabaseTitle | CrossRef Computer Science Database ProQuest Central Student Technology Collection Technology Research Database Computer and Information Systems Abstracts – Academic ProQuest One Academic Middle East (New) ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Computer Science Collection Computer and Information Systems Abstracts ProQuest Central (Alumni Edition) SciTech Premium Collection ProQuest One Community College ProQuest Central China ProQuest Central ProQuest One Applied & Life Sciences ProQuest Central Korea ProQuest Central (New) Advanced Technologies Database with Aerospace Advanced Technologies & Aerospace Collection ProQuest Computing ProQuest Central Basic ProQuest Computing (Alumni Edition) ProQuest One Academic Eastern Edition ProQuest Technology Collection ProQuest SciTech Collection Computer and Information Systems Abstracts Professional Advanced Technologies & Aerospace Database ProQuest One Academic UKI Edition ProQuest One Academic ProQuest Central (Alumni) ProQuest One Academic (New) |
| DatabaseTitleList | Computer Science Database |
| Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 2 dbid: BENPR name: ProQuest Central url: https://www.proquest.com/central sourceTypes: Aggregation Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering Computer Science |
| EISSN | 2510-523X 1687-417X |
| EndPage | 21 |
| ExternalDocumentID | oai_doaj_org_article_28ce805c9bce4681b61cfa3434c3efaa 10_1186_s13635_018_0082_y |
| GroupedDBID | -A0 .4S .DC 2WC 3V. 4.4 40G 5VS 6KP 8FE 8FG 8R4 8R5 AAKPC ABUWG ACGFS ADBBV ADINQ ADMLS AFKRA AHBYD AHYZX ALMA_UNASSIGNED_HOLDINGS AMKLP ARAPS ARCSS AZQEC BCNDV BENPR BGLVJ BPHCQ C24 C6C CCPQU CS3 DWQXO EDO EIS GNUQQ GROUPED_DOAJ HCIFZ HZ~ K6V K7- KQ8 M0N M~E OK1 P62 PQQKQ PROAC Q2X RHU SEG TR2 TUS U2A AAYXX CITATION OVT 7SC 7XB 8AL 8FD 8FK JQ2 L7M L~C L~D PHGZM PHGZT PKEHL PQEST PQGLB PQUKI PRINS Q9U |
| ID | FETCH-LOGICAL-c425t-dbc18ab38e2e027cd888bc277b0dde6285b641540ff4808fd0ccafcfe2a15d243 |
| IEDL.DBID | C24 |
| ISICitedReferencesCount | 7 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000446252500001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 2510-523X 1687-4161 |
| IngestDate | Fri Oct 03 12:52:32 EDT 2025 Sat Oct 11 05:46:10 EDT 2025 Sat Nov 29 03:33:01 EST 2025 Tue Nov 18 21:05:11 EST 2025 Fri Feb 21 02:32:16 EST 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 1 |
| Keywords | Wearable medical systems Data-centric attack detection Data manipulation attacks |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c425t-dbc18ab38e2e027cd888bc277b0dde6285b641540ff4808fd0ccafcfe2a15d243 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ORCID | 0000-0001-7593-2513 |
| OpenAccessLink | https://link.springer.com/10.1186/s13635-018-0082-y |
| PQID | 2114128259 |
| PQPubID | 237294 |
| PageCount | 21 |
| ParticipantIDs | doaj_primary_oai_doaj_org_article_28ce805c9bce4681b61cfa3434c3efaa proquest_journals_2114128259 crossref_primary_10_1186_s13635_018_0082_y crossref_citationtrail_10_1186_s13635_018_0082_y springer_journals_10_1186_s13635_018_0082_y |
| PublicationCentury | 2000 |
| PublicationDate | 2018-09-29 |
| PublicationDateYYYYMMDD | 2018-09-29 |
| PublicationDate_xml | – month: 09 year: 2018 text: 2018-09-29 day: 29 |
| PublicationDecade | 2010 |
| PublicationPlace | Cham |
| PublicationPlace_xml | – name: Cham – name: New York |
| PublicationTitle | EURASIP Journal on Information Security |
| PublicationTitleAbbrev | EURASIP J. on Info. Security |
| PublicationYear | 2018 |
| Publisher | Springer International Publishing Springer Nature B.V SpringerOpen |
| Publisher_xml | – name: Springer International Publishing – name: Springer Nature B.V – name: SpringerOpen |
| References | Halperin, Kohno, Heydt-Benjamin, Fu, Maisel (CR2) 2008; 7 Kermani, Zhang, Raghunathan, Jha (CR1) 2013 Taghikhaki, Sharifi (CR18) 2008 Zink, Brüser, Winnersbach, Napp, Leonhardt, Marx, Schauerte, Mischke (CR39) 2015; 2015 Li, Raghunathan, Jha (CR3) 2011 McSharry, Clifford, Tarassenko, Smith (CR34) 2003; 50 CR13 CR12 Cai, Venkatasubramanian (CR16) 2016 Galzarano, Fortino, Liotta (CR27) 2012 CR11 Shin, Son, Park, Kwon, Kim (CR7) 2016 Lu, Yang, Taylor, Stein (CR36) 2009; 33 Dean, Flowers, Hodel, Roth, Castro, Zhou, Moreira, Ahmed, Rifki, Grantham, Bittle, Brunsch (CR9) 2007 Hajibegloo, Javadi (CR19) 2012 Jiang (CR21) 2009; 9 Duk-Jin, Prabhakaran (CR23) 2011; 7 Chen, Kher, Somani (CR22) 2006 Park, Son, Shin, Kim, Kim (CR6) 2016 Kim, Suk, Prabhakaran (CR25) 2012 Brown, Patel, Plenefisch, Moghimi, Eisenbarth, Shue, Venkatasubramanian (CR4) 2016 Kune, Backes, Clark, Kramer, Reynolds, Fu, Kim, Xu (CR5) 2013 Velez, White, Motsinger, Bush, Ritchie, Williams, Moore (CR33) 2007; 31 Hester, Peters, Yun, Peterson, Skinner, Golla, Storer, Hearndon, Freeman, Lord, Halter, Kotz, Sorber (CR14) 2014 Cai, Venkatasubramanian, Qiu, Xu, Yung, Zhang (CR15) 2015 CR29 CR28 Martín-Yebra (CR38) 2015 Uluagac, Subramanian, Beyah (CR8) 2014 Mahapatro, Khilar (CR24) 2013; 5 CR26 Nabar, Banerjee, Gupta, Poovendran (CR35) 2011 Goldberger, Amaral, Glass, Hausdorff, Ivanov, Mark, Mietus, Moody, Peng, Stanley (CR17) 2000; 101 Dean, Castro, Flowers, Roth, Ahmed, Hodel, Grantham, Bittle, Brunsch (CR10) 2011; 58 Krishnan, Dutt, Chan, Anantharaman, Acharya, Suri, Spaan, Krishnan (CR30) 2007 Lin, Wu, Li, Zhang, Zhang, Zhang (CR37) 2014 Lee, Choi (CR20) 2008; 31 Wold, Esbensen, Geladi (CR31) 1987; 2 Malagón-Borja, Fuentes (CR32) 2009; 27 D. R. Velez (82_CR33) 2007; 31 K. Duk-Jin (82_CR23) 2011; 7 S. Nabar (82_CR35) 2011 D. Halperin (82_CR2) 2008; 7 G. Lu (82_CR36) 2009; 33 A. Martín-Yebra (82_CR38) 2015 82_CR26 82_CR29 S. M Krishnan (82_CR30) 2007 82_CR28 H. Cai (82_CR15) 2015 R. N. Dean (82_CR9) 2007 N. Brown (82_CR4) 2016 M. Hajibegloo (82_CR19) 2012 J. Chen (82_CR22) 2006 S. Wold (82_CR31) 1987; 2 P. Jiang (82_CR21) 2009; 9 A. Mahapatro (82_CR24) 2013; 5 H. Shin (82_CR7) 2016 Z. Taghikhaki (82_CR18) 2008 M. M. Kermani (82_CR1) 2013 D Kim (82_CR25) 2012 W. H. Lin (82_CR37) 2014 C. Li (82_CR3) 2011 Y. Park (82_CR6) 2016 H. Cai (82_CR16) 2016 M. D. Zink (82_CR39) 2015; 2015 J Hester (82_CR14) 2014 S. Galzarano (82_CR27) 2012 A. S. Uluagac (82_CR8) 2014 A. L. Goldberger (82_CR17) 2000; 101 L. Malagón-Borja (82_CR32) 2009; 27 D. F. Kune (82_CR5) 2013 82_CR12 82_CR11 P. E. McSharry (82_CR34) 2003; 50 R. N. Dean (82_CR10) 2011; 58 M. -H. Lee (82_CR20) 2008; 31 82_CR13 |
| References_xml | – start-page: 216 year: 2014 end-page: 229 ident: CR14 article-title: Amulet: an energy-efficient, multi-application wearable platform publication-title: 14th ACM Conference on Embedded Network Sensor Systems (SenSys ’16) – start-page: 150 year: 2011 end-page: 156 ident: CR3 article-title: Hijacking an insulin pump: security attacks and defenses for a diabetes therapy system publication-title: 2011 IEEE 13th International Conference on e-Health Networking, Applications and Services, Columbia, MO – start-page: 301 year: 2014 end-page: 309 ident: CR8 article-title: Sensory channel threats to cyber physical systems: a wake-up call publication-title: 2014 IEEE Conference on Communications and Network Security, San Francisco, CA – start-page: 1 year: 2008 end-page: 6 ident: CR18 article-title: A trust-based distributed data fault detection algorithm for wireless sensor networks publication-title: 2008 11th International Conference on Computer and Information Technology, Khulna, Bangladesh – start-page: 929 year: 2015 end-page: 932 ident: CR38 article-title: Studying heart rate variability from ballistocardiography acquired by force platform: comparison with conventional ECG publication-title: 2015 Computing in Cardiology Conference (CinC), Nice, France doi: 10.1109/CIC.2015.7411064 – volume: 101 start-page: 215 issue: 23 year: 2000 end-page: 220 ident: CR17 article-title: PhysioBank, PhysioToolkit, and PhysioNet: components of a new research resource for complex physiologic signals publication-title: Circulation doi: 10.1161/01.CIR.101.23.e215 – ident: CR12 – start-page: 2377 year: 2012 end-page: 2382 ident: CR27 article-title: Embedded self-healing layer for detecting and recovering sensor faults in body sensor networks publication-title: 2012 IEEE International Conference on Systems, Man, and Cybernetics (SMC), Seoul, South Korea doi: 10.1109/ICSMC.2012.6378098 – volume: 7 start-page: 30 issue: 1 year: 2008 end-page: 39 ident: CR2 article-title: Security and privacy for implantable medical devices publication-title: IEEE Pervasive Comput doi: 10.1109/MPRV.2008.16 – start-page: 65 year: 2006 end-page: 72 ident: CR22 article-title: Distributed fault detection of wireless sensor networks publication-title: 2006 workshop on Dependability issues in wireless ad hoc networks and sensor networks (DIWANS ’06) – volume: 27 start-page: 2 issue: 1 year: 2009 end-page: 9 ident: CR32 article-title: Object detection using image reconstruction with PCA publication-title: Image Vis. Comput doi: 10.1016/j.imavis.2007.03.004 – volume: 31 start-page: 306 issue: 4 year: 2007 end-page: 315 ident: CR33 article-title: A balanced accuracy function for epistasis modeling in imbalanced datasets using multifactor dimensionality reduction publication-title: Genet. Epidemiol doi: 10.1002/gepi.20211 – volume: 50 start-page: 289 issue: 3 year: 2003 end-page: 294 ident: CR34 article-title: A dynamical model for generating synthetic electrocardiogram signals publication-title: IEEE Trans. Biomed. Eng doi: 10.1109/TBME.2003.808805 – ident: CR29 – volume: 7 start-page: 727 issue: 6 year: 2011 end-page: 745 ident: CR23 article-title: Motion fault detection and isolation in body sensor networks publication-title: Pervasive Mob. Comput doi: 10.1016/j.pmcj.2011.09.006 – start-page: 145 year: 2013 end-page: 159 ident: CR5 article-title: Ghost talk: mitigating EMI signal injection attacks against analog sensors publication-title: 2013 IEEE Symposium on Security and Privacy, Berkeley, CA doi: 10.1109/SP.2013.20 – volume: 9 start-page: 1282 issue: 2 year: 2009 end-page: 1294 ident: CR21 article-title: A new method for node fault detection in wireless sensor networks publication-title: Sensors doi: 10.3390/s90201282 – start-page: 1 year: 2011 end-page: 6 ident: CR35 article-title: GEM-REM: Generative model-driven resource efficient ECG monitoring in body sensor networks publication-title: 2011 International Conference on Body Sensor Networks, Dallas, TX – start-page: 213 year: 2014 end-page: 215 ident: CR37 article-title: Comparison of heart rate variability from PPG with that from ECG publication-title: The International Conference on Health Informatics. IFMBE Proceedings – volume: 58 start-page: 2591 issue: 7 year: 2011 end-page: 2596 ident: CR10 article-title: A characterization of the performance of a MEMS gyroscope in acoustically harsh environments publication-title: IEEE Trans. Ind. Electron doi: 10.1109/TIE.2010.2070772 – year: 2016 ident: CR6 article-title: This Ain’t Your Dose: Sensor Spoofing Attack on Medical Infusion Pump publication-title: 10th Usenix Workshop on Offensive Technologies (WOOT’16), Autin, TX – volume: 2 start-page: 37 issue: 1-3 year: 1987 end-page: 52 ident: CR31 article-title: Principal component analysis publication-title: Chemometr. Intell. Lab. Syst doi: 10.1016/0169-7439(87)80084-9 – year: 2016 ident: CR4 article-title: Poster: SCREAM: sensory channel remote execution attack methods publication-title: 25th Usenix Security Symposium, Austin, TX, 2016 – volume: 2015 start-page: 10 year: 2015 ident: CR39 article-title: Heartbeat cycle length detection by a ballistocardiographic sensor in atrial fibrillation and sinus rhythm publication-title: BioMed Res. Int – start-page: 531 year: 2015 end-page: 539 ident: CR15 article-title: Detecting malicious temporal alterations of ECG signals in body sensor networks publication-title: Network and System Security. NSS 2015. Lecture Notes in Computer Science – start-page: 127 year: 2016 end-page: 135 ident: CR16 article-title: Detecting signal injection attack-based morphological alterations of ECG measurements publication-title: 2016 International Conference on Distributed Computing in Sensor Systems (DCOSS), Washington, DC doi: 10.1109/DCOSS.2016.36 – start-page: 339 year: 2007 end-page: 339 ident: CR30 article-title: Phase space analysis for cardiovascular signals publication-title: Advances in Cardiac Signal Processing doi: 10.1007/978-3-540-36675-1_15 – start-page: 203 year: 2013 end-page: 208 ident: CR1 article-title: Emerging frontiers in embedded security publication-title: 26th International Conference on VLSI Design and 2013 12th International Conference on Embedded Systems, Pune, India – start-page: 1435 year: 2007 end-page: 1440 ident: CR9 article-title: On the degradation of MEMS gyroscope performance in the presence of high power acoustic noise publication-title: 2007 IEEE International Symposium on Industrial Electronics, Vigo, Spain doi: 10.1109/ISIE.2007.4374812 – ident: CR13 – ident: CR11 – year: 2016 ident: CR7 article-title: Sampling race: bypassing timing-based analog active sensor spoofing detection on analog-digital systems publication-title: 10th Usenix Workshop on Offensive Technologies (WOOTŠ16), Autin, TX – volume: 31 start-page: 3469 issue: 14 year: 2008 end-page: 3475 ident: CR20 article-title: Fault detection of wireless sensor networks publication-title: Comput. Commun doi: 10.1016/j.comcom.2008.06.014 – volume: 5 start-page: 252 year: 2013 end-page: 259 ident: CR24 article-title: Fault diagnosis in body sensor networks publication-title: Int. J. Comput. Inf. Syst. Ind. Manag. Appl. (IJCISIM) – ident: CR28 – ident: CR26 – start-page: 62 year: 2012 end-page: 66 ident: CR19 article-title: Fast fault detection in wireless sensor networks publication-title: 2012 Second International Conference on Digital Information and Communication Technology and it’s Applications (DICTAP), Bangkok, Thailand – start-page: 5234 year: 2012 end-page: 5237 ident: CR25 article-title: Fault detection and isolation in motion monitoring system publication-title: 2012 Annual International Conference of the IEEE Engineering in Medicine and Biology Society, San Diego, CA – volume: 33 start-page: 634 issue: 8 year: 2009 end-page: 641 ident: CR36 article-title: A comparison of photoplethysmography and ECG recording to analyse heart rate variability in healthy subjects publication-title: J. Med. Eng. Technol doi: 10.3109/03091900903150998 – start-page: 62 volume-title: 2012 Second International Conference on Digital Information and Communication Technology and it’s Applications (DICTAP), Bangkok, Thailand year: 2012 ident: 82_CR19 – volume: 2 start-page: 37 issue: 1-3 year: 1987 ident: 82_CR31 publication-title: Chemometr. Intell. Lab. Syst doi: 10.1016/0169-7439(87)80084-9 – start-page: 145 volume-title: 2013 IEEE Symposium on Security and Privacy, Berkeley, CA year: 2013 ident: 82_CR5 doi: 10.1109/SP.2013.20 – start-page: 216 volume-title: 14th ACM Conference on Embedded Network Sensor Systems (SenSys ’16) year: 2014 ident: 82_CR14 – start-page: 127 volume-title: 2016 International Conference on Distributed Computing in Sensor Systems (DCOSS), Washington, DC year: 2016 ident: 82_CR16 doi: 10.1109/DCOSS.2016.36 – volume: 27 start-page: 2 issue: 1 year: 2009 ident: 82_CR32 publication-title: Image Vis. Comput doi: 10.1016/j.imavis.2007.03.004 – start-page: 1435 volume-title: 2007 IEEE International Symposium on Industrial Electronics, Vigo, Spain year: 2007 ident: 82_CR9 doi: 10.1109/ISIE.2007.4374812 – start-page: 339 volume-title: Advances in Cardiac Signal Processing year: 2007 ident: 82_CR30 doi: 10.1007/978-3-540-36675-1_15 – start-page: 1 volume-title: 2008 11th International Conference on Computer and Information Technology, Khulna, Bangladesh year: 2008 ident: 82_CR18 – start-page: 213 volume-title: The International Conference on Health Informatics. IFMBE Proceedings year: 2014 ident: 82_CR37 doi: 10.1007/978-3-319-03005-0_54 – volume: 9 start-page: 1282 issue: 2 year: 2009 ident: 82_CR21 publication-title: Sensors doi: 10.3390/s90201282 – volume-title: 10th Usenix Workshop on Offensive Technologies (WOOT’16), Autin, TX year: 2016 ident: 82_CR6 – ident: 82_CR29 – volume: 33 start-page: 634 issue: 8 year: 2009 ident: 82_CR36 publication-title: J. Med. Eng. Technol doi: 10.3109/03091900903150998 – volume: 2015 start-page: 10 year: 2015 ident: 82_CR39 publication-title: BioMed Res. Int – start-page: 1 volume-title: 2011 International Conference on Body Sensor Networks, Dallas, TX year: 2011 ident: 82_CR35 – ident: 82_CR11 – start-page: 531 volume-title: Network and System Security. NSS 2015. Lecture Notes in Computer Science year: 2015 ident: 82_CR15 – start-page: 929 volume-title: 2015 Computing in Cardiology Conference (CinC), Nice, France year: 2015 ident: 82_CR38 doi: 10.1109/CIC.2015.7411064 – volume: 50 start-page: 289 issue: 3 year: 2003 ident: 82_CR34 publication-title: IEEE Trans. Biomed. Eng doi: 10.1109/TBME.2003.808805 – start-page: 203 volume-title: 26th International Conference on VLSI Design and 2013 12th International Conference on Embedded Systems, Pune, India year: 2013 ident: 82_CR1 – volume: 7 start-page: 30 issue: 1 year: 2008 ident: 82_CR2 publication-title: IEEE Pervasive Comput doi: 10.1109/MPRV.2008.16 – volume-title: 25th Usenix Security Symposium, Austin, TX, 2016 year: 2016 ident: 82_CR4 – ident: 82_CR13 – volume: 31 start-page: 3469 issue: 14 year: 2008 ident: 82_CR20 publication-title: Comput. Commun doi: 10.1016/j.comcom.2008.06.014 – volume: 7 start-page: 727 issue: 6 year: 2011 ident: 82_CR23 publication-title: Pervasive Mob. Comput doi: 10.1016/j.pmcj.2011.09.006 – volume: 5 start-page: 252 year: 2013 ident: 82_CR24 publication-title: Int. J. Comput. Inf. Syst. Ind. Manag. Appl. (IJCISIM) – volume: 101 start-page: 215 issue: 23 year: 2000 ident: 82_CR17 publication-title: Circulation doi: 10.1161/01.CIR.101.23.e215 – start-page: 5234 volume-title: 2012 Annual International Conference of the IEEE Engineering in Medicine and Biology Society, San Diego, CA year: 2012 ident: 82_CR25 – ident: 82_CR26 – start-page: 150 volume-title: 2011 IEEE 13th International Conference on e-Health Networking, Applications and Services, Columbia, MO year: 2011 ident: 82_CR3 – volume: 58 start-page: 2591 issue: 7 year: 2011 ident: 82_CR10 publication-title: IEEE Trans. Ind. Electron doi: 10.1109/TIE.2010.2070772 – start-page: 2377 volume-title: 2012 IEEE International Conference on Systems, Man, and Cybernetics (SMC), Seoul, South Korea year: 2012 ident: 82_CR27 doi: 10.1109/ICSMC.2012.6378098 – start-page: 65 volume-title: 2006 workshop on Dependability issues in wireless ad hoc networks and sensor networks (DIWANS ’06) year: 2006 ident: 82_CR22 – volume-title: 10th Usenix Workshop on Offensive Technologies (WOOTŠ16), Autin, TX year: 2016 ident: 82_CR7 – ident: 82_CR28 – volume: 31 start-page: 306 issue: 4 year: 2007 ident: 82_CR33 publication-title: Genet. Epidemiol doi: 10.1002/gepi.20211 – ident: 82_CR12 – start-page: 301 volume-title: 2014 IEEE Conference on Communications and Network Security, San Francisco, CA year: 2014 ident: 82_CR8 doi: 10.1109/CNS.2014.6997498 |
| SSID | ssj0002808905 ssj0064073 |
| Score | 2.126294 |
| Snippet | Recent years have seen the emergence of wearable medical systems (WMS) that have demonstrated great promise for improved health monitoring and overall... Abstract Recent years have seen the emergence of wearable medical systems (WMS) that have demonstrated great promise for improved health monitoring and overall... |
| SourceID | doaj proquest crossref springer |
| SourceType | Open Website Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 1 |
| SubjectTerms | Blood pressure Classifiers Communications Engineering Data manipulation attacks Data-centric attack detection Decision analysis Electrocardiography Engineering Health Image reconstruction Medical electronics Medical imaging Networks Physiology Pressure measurement Security Science and Technology Sensors Signal processing Signal,Image and Speech Processing Support systems Systems and Data Security Trustworthiness Wearable medical systems Wearable technology |
| SummonAdditionalLinks | – databaseName: DOAJ Directory of Open Access Journals dbid: DOA link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1LT8MwDI7QxIELb8RgoBw4gaKlSdqmR14TBzRxALRb1KSpNMQ2tBbQ_j1O2u6BBFy4VW1SRbYT-7NjG6EzV9ImiwJJTBoDQImoIBoMcZJTzbXIQlu5Bp7v435fDgbJw1KrL3cnrCoPXBGuy6SxkoYm0caKCIysKDB5ygUXhts89aYRWD1LYOrFu4yoTOjcEHbRKl7HNAMZdYuAg6IFGC2J04FktqKVfPH-FYvzW5DU657eNtqsjUZ8WS12B63Z8S7aahoy4Hp_7qHsxrqYAPwDu5uf2NW2aPpz4bQsXT49hkfvzmhOPVwAkp1M8WjhLSzwcIw_YQ-4vCo8qmI5uCr6XOyjp97t4_UdqdsoEAMbsiSZNoFMNZeWWQChJgPQqw2LY03hbHMplDoCNS5ongsgW55R4GpucsvSIMyY4AeoNZ6M7SHCYZoYQy3lDKY45CaYZhkLDI95aKO0jWhDRmXqGuOu1cWr8lhDRqqivALKK0d5NWuj8_mUt6rAxm-Drxxv5gNdbWz_AiRG1RKj_pKYNuo0nFX1hi0U4GARuDzepI0uGm4vPv-4oqP_WNEx2mBeFhPCkg5qldN3e4LWzUc5LKanXrK_ANES_L8 priority: 102 providerName: Directory of Open Access Journals – databaseName: Computer Science Database dbid: K7- link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3Nb9UwDI9gcODChwDxYKAcOIGi5atpeprYYEICTRwA7RY1Toomsfe2125o__3sNt3TkNiFW9UmbVTbsX92bDP2lkraJKe8gLZGgOKkFRENcdHJaKJNVZ5cAz-_1oeH_uio-VYcbn05VjnvieNGnVZAPvIdBCpWUaJls3t6JqhrFEVXSwuNu-ye0loRn3-pBWEsh7JDtnsJZCrvdnplULsidvaCFJ-4vKGKxor9N8zMvyKjo8I5ePS_S33MHhZTk3-YeOMJu5OXT1n6mClsgF_kdDiUU_mLuYUXb4eBUu45Xo4ej3lj5D2C3dWan2wcij0_XvI_KCaUesVPpnAPn-pC98_Yj4NP3_c_i9JpQQDK7CBSBOXbaHzWGXEqJMTFEXRdR4nbH2VZRoea3squs176LkkkfAdd1q2qkrbmOdtarpb5BeNV2wDILI3GKQTurI46aQWmNlV27YLJ-acHKGXIqRvG7zDCEe_CRKeAdApEp3C5YO-up5xONThuG7xHlLweSOWzxxur9a9QpDFoD9nLCpoI2Tq03J2CrjXWWDC5a3GR2zNlQ5HpPmzIumDvZ97YPP7nil7e_rJX7IEeebIRutlmW8P6PL9m9-FiOO7Xb0aGvgKLIf63 priority: 102 providerName: ProQuest |
| Title | Detecting data manipulation attacks on physiological sensor measurements in wearable medical systems |
| URI | https://link.springer.com/article/10.1186/s13635-018-0082-y https://www.proquest.com/docview/2114128259 https://doaj.org/article/28ce805c9bce4681b61cfa3434c3efaa |
| Volume | 2018 |
| WOSCitedRecordID | wos000446252500001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAON databaseName: DOAJ Directory of Open Access Journals customDbUrl: eissn: 2510-523X dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0002808905 issn: 2510-523X databaseCode: DOA dateStart: 20070101 isFulltext: true titleUrlDefault: https://www.doaj.org/ providerName: Directory of Open Access Journals – providerCode: PRVHPJ databaseName: ROAD: Directory of Open Access Scholarly Resources customDbUrl: eissn: 2510-523X dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0002808905 issn: 2510-523X databaseCode: M~E dateStart: 20070101 isFulltext: true titleUrlDefault: https://road.issn.org providerName: ISSN International Centre – providerCode: PRVAVX databaseName: SpringerLink Open Access Journals customDbUrl: eissn: 2510-523X dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0002808905 issn: 2510-523X databaseCode: C24 dateStart: 20071201 isFulltext: true titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22 providerName: Springer Nature |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3dTxQxEJ_IxwM-gKLEQ7j0wSdNY7ft7nYfBY-QqJeLUUN8abbdLoHAHbldNLzwtzPtdg8xaAIvTbPb3TTTmXZ-M50ZgDc-pU2VJYraMkeAkjFJDSritGZGGFmlrjMN_Picj8fq6KiYxDjupr_t3rskw04dxFpl75tE4OGI0FdRf27RqyVYSRNVeLbejyEOp8FaxFTBFjqwd1SJ6M689zd3DqSQt_-OsvmXfzQcOwcbj5rwM1iPWib50LHFc3jippuw0VdwIFGgN-HpH-kIX0D10XmXAvaJvzhKfGqMvrwXKdvWh-MT7AZrSL9pkgaB8GxOzm-NjQ05mZLfKEI-LIucd64g0uWMbl7C94PRt_1DGqswUIvy3NLK2ESVRijHHWJYWyFmNpbnuWG4NfoITJOhFiBZXUskfV0xZIra1o6XSVpxKbZgeTqbuldA0rKwljkmOH7igZ_khlc8sSIXqcvKAbB-KbSNKcp9pYwzHaCKynRHU4001Z6m-moAbxefXHT5Of43eM-v72KgT60dHszmxzpKqubKOsVSWxjrZIZafZbYuhRSSCtcXeIkd3ru0FHeG40wWiY-DLgYwLueG25f_3NG2w8a_RrWeGCngvJiB5bb-aXbhVX7qz1p5kNY2RuNJ1-HQRyGwbiA7aecYvvleoTtJP15AwmpCXw |
| linkProvider | Springer Nature |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Lb9QwEB6VggQXCgLUhRZ8gAvIqmM7iXNAVaFUrXZZcSioNxM_girR3bIJVPun-I3M5NFVkeitB25RYlt2_HnG34w9A_CSQtqELDHclzkSlExo7nAjzivhlNMhjZ1p4Mskn07NyUnxaQ1-D3dh6FjlIBNbQR3mnmzkO0hUdEIXLYvd8x-cskaRd3VIodHBYhyXF0jZ6rdH-zi_r6Q8-HD8_pD3WQW4R3w2PDifmNIpE2VETuYDckDnZZ47gUudbhS6DLWaFlWljTBVEDjIyldRlkkapFbY7i24rZXJKVb_OOfE6TJcq8QVesdpYrKdOlGozZGrG06Kli-vqL42Q8CVbe1fnthWwR1s_G-_5gHc77fSbK_D_kNYi7NHEPYjuUVwhIwOvzIK7zGkKGNl01BIAYaPrUVnEPysRjI_X7CzlcG0ZqczdoGDoqtl7KxzZ7Eu7nX9GD7fyMCewPpsPoubwNKy8F5EoSRWIfKqpZNBJl7lKo1ZOQIxTLL1fZh1yvbx3bZ0y2S2w4VFXFjChV2O4PVllfMuxsh1hd8Rci4LUnjw9sV88c320sZK46MRqS-cjzpDZpIlviqVVtqrWJXYya0BSbaXWbVdwWgEbwYsrj7_s0dPr2_sBdw9PP44sZOj6fgZ3JPteii4LLZgvVn8jNtwx_9qTuvF83YxMfh60xD9Axn2Xh8 |
| linkToPdf | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Lb9QwELZKQYgLDwFiSwEf4AKy1rEdxzkgBCwrqlarPQCquJj4hSrR3XYTqPav8euYyaOrItFbD9yixLbs-BuPvxl7hpDnGNIm6MwwXxVAUDRXzMFGnCXupFMhj51p4MtBMZuZw8NyvkV-D3dh8FjlsCa2C3VYerSRj4GoqAwvWpbj1B-LmE-mb05OGWaQQk_rkE6jg8h-XJ8Bfatf701grl8IMf3w6f1H1mcYYB6w2rDgfGYqJ00UEfiZD8AHnRdF4TiIPd4udBo0nOIpKcNNChwGnHyKosryIJSEdq-R6wVwTCR-8_wr8jsNcou8oXeiZkaP60yCZgfebhgqXba-oAbbbAEXtrh_eWVbZTe98z__prvkdr_Fpm87mbhHtuLiPgmTiO4SGC3FQ7EUw34Mqcto1TQYaoDCY2vpGRQCrYHkL1f0eGNIrenRgp7BoPDKGT3u3Fy0i4ddPyCfr2RgD8n2YrmIjwjNq9J7HrkUUAVJrRJOBJF5Wcg86mpE-DDh1vfh1zELyA_b0jCjbYcRCxixiBG7HpGX51VOutgjlxV-hyg6L4hhw9sXy9V3269CVhgfDc996XxUGhiLznyqpJLKy5gq6OTugCrbr2W13UBqRF4NuNx8_mePdi5v7Bm5Cci0B3uz_cfklmhFo2Si3CXbzepnfEJu-F_NUb162soVJd-uGqF_AN7dZ0Q |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Detecting+data+manipulation+attacks+on+physiological+sensor+measurements+in+wearable+medical+systems&rft.jtitle=EURASIP+Journal+on+Information+Security&rft.au=Cai%2C+Hang&rft.au=Venkatasubramanian%2C+Krishna+K.&rft.date=2018-09-29&rft.pub=Springer+International+Publishing&rft.eissn=2510-523X&rft.volume=2018&rft.issue=1&rft_id=info:doi/10.1186%2Fs13635-018-0082-y&rft.externalDocID=10_1186_s13635_018_0082_y |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2510-523X&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2510-523X&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2510-523X&client=summon |