Detecting data manipulation attacks on physiological sensor measurements in wearable medical systems

Recent years have seen the emergence of wearable medical systems (WMS) that have demonstrated great promise for improved health monitoring and overall well-being. Ensuring that these WMS accurately monitor a user’s current health state is crucial. This is especially true in the presence of adversari...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:EURASIP Journal on Information Security Ročník 2018; číslo 1; s. 1 - 21
Hlavní autoři: Cai, Hang, Venkatasubramanian, Krishna K.
Médium: Journal Article
Jazyk:angličtina
Vydáno: Cham Springer International Publishing 29.09.2018
Springer Nature B.V
SpringerOpen
Témata:
ISSN:2510-523X, 1687-4161, 2510-523X, 1687-417X
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Abstract Recent years have seen the emergence of wearable medical systems (WMS) that have demonstrated great promise for improved health monitoring and overall well-being. Ensuring that these WMS accurately monitor a user’s current health state is crucial. This is especially true in the presence of adversaries who want to mount data manipulation attacks on the WMS. The goal of data manipulation attacks is to alter the measurements made by the sensors in the WMS with fictitious data that is plausible but not accurate. Such attacks force clinicians or any decision support system AI, analyzing the WMS data, to make incorrect diagnosis and treatment decisions about the patient’s health. In this paper, we present an approach to detect data manipulation attacks based on the idea that multiple physiological signals based on the same underlying physiological process (e.g., cardiac process) are inherently related to each other. We capture the commonalities between a “target” sensor measurement and another “reference” sensor measurement (which is trustworthy), by building an image reconstruction-based classifier and using this classifier to identify any unilateral changes in the target sensor measurements. This classifier is user-specific and needs to be created for every user on whom the WMS is deployed. In order to showcase our idea, we present a case study where we detect data manipulation attacks on electrocardiogram (ECG) sensor measurements in a WMS using blood pressure measurement as reference. We chose ECG and blood pressure—in arterial blood pressure (ABP) form—because both are some of the most commonly measured physiological signals in a WMS environment. Our approach demonstrates promising results with above 98% accuracy in detecting even subtle ECG alterations for both healthy subjects and those with different cardiac ailments. Finally, we show that the approach is general in that it can be used to build a model for detecting data manipulation attacks that alter ABP sensor measurements using the ECG sensor as reference.
AbstractList Recent years have seen the emergence of wearable medical systems (WMS) that have demonstrated great promise for improved health monitoring and overall well-being. Ensuring that these WMS accurately monitor a user’s current health state is crucial. This is especially true in the presence of adversaries who want to mount data manipulation attacks on the WMS. The goal of data manipulation attacks is to alter the measurements made by the sensors in the WMS with fictitious data that is plausible but not accurate. Such attacks force clinicians or any decision support system AI, analyzing the WMS data, to make incorrect diagnosis and treatment decisions about the patient’s health.In this paper, we present an approach to detect data manipulation attacks based on the idea that multiple physiological signals based on the same underlying physiological process (e.g., cardiac process) are inherently related to each other. We capture the commonalities between a “target” sensor measurement and another “reference” sensor measurement (which is trustworthy), by building an image reconstruction-based classifier and using this classifier to identify any unilateral changes in the target sensor measurements. This classifier is user-specific and needs to be created for every user on whom the WMS is deployed. In order to showcase our idea, we present a case study where we detect data manipulation attacks on electrocardiogram (ECG) sensor measurements in a WMS using blood pressure measurement as reference. We chose ECG and blood pressure—in arterial blood pressure (ABP) form—because both are some of the most commonly measured physiological signals in a WMS environment. Our approach demonstrates promising results with above 98% accuracy in detecting even subtle ECG alterations for both healthy subjects and those with different cardiac ailments. Finally, we show that the approach is general in that it can be used to build a model for detecting data manipulation attacks that alter ABP sensor measurements using the ECG sensor as reference.
Recent years have seen the emergence of wearable medical systems (WMS) that have demonstrated great promise for improved health monitoring and overall well-being. Ensuring that these WMS accurately monitor a user’s current health state is crucial. This is especially true in the presence of adversaries who want to mount data manipulation attacks on the WMS. The goal of data manipulation attacks is to alter the measurements made by the sensors in the WMS with fictitious data that is plausible but not accurate. Such attacks force clinicians or any decision support system AI, analyzing the WMS data, to make incorrect diagnosis and treatment decisions about the patient’s health. In this paper, we present an approach to detect data manipulation attacks based on the idea that multiple physiological signals based on the same underlying physiological process (e.g., cardiac process) are inherently related to each other. We capture the commonalities between a “target” sensor measurement and another “reference” sensor measurement (which is trustworthy), by building an image reconstruction-based classifier and using this classifier to identify any unilateral changes in the target sensor measurements. This classifier is user-specific and needs to be created for every user on whom the WMS is deployed. In order to showcase our idea, we present a case study where we detect data manipulation attacks on electrocardiogram (ECG) sensor measurements in a WMS using blood pressure measurement as reference. We chose ECG and blood pressure—in arterial blood pressure (ABP) form—because both are some of the most commonly measured physiological signals in a WMS environment. Our approach demonstrates promising results with above 98% accuracy in detecting even subtle ECG alterations for both healthy subjects and those with different cardiac ailments. Finally, we show that the approach is general in that it can be used to build a model for detecting data manipulation attacks that alter ABP sensor measurements using the ECG sensor as reference.
Abstract Recent years have seen the emergence of wearable medical systems (WMS) that have demonstrated great promise for improved health monitoring and overall well-being. Ensuring that these WMS accurately monitor a user’s current health state is crucial. This is especially true in the presence of adversaries who want to mount data manipulation attacks on the WMS. The goal of data manipulation attacks is to alter the measurements made by the sensors in the WMS with fictitious data that is plausible but not accurate. Such attacks force clinicians or any decision support system AI, analyzing the WMS data, to make incorrect diagnosis and treatment decisions about the patient’s health. In this paper, we present an approach to detect data manipulation attacks based on the idea that multiple physiological signals based on the same underlying physiological process (e.g., cardiac process) are inherently related to each other. We capture the commonalities between a “target” sensor measurement and another “reference” sensor measurement (which is trustworthy), by building an image reconstruction-based classifier and using this classifier to identify any unilateral changes in the target sensor measurements. This classifier is user-specific and needs to be created for every user on whom the WMS is deployed. In order to showcase our idea, we present a case study where we detect data manipulation attacks on electrocardiogram (ECG) sensor measurements in a WMS using blood pressure measurement as reference. We chose ECG and blood pressure—in arterial blood pressure (ABP) form—because both are some of the most commonly measured physiological signals in a WMS environment. Our approach demonstrates promising results with above 98% accuracy in detecting even subtle ECG alterations for both healthy subjects and those with different cardiac ailments. Finally, we show that the approach is general in that it can be used to build a model for detecting data manipulation attacks that alter ABP sensor measurements using the ECG sensor as reference.
ArticleNumber 13
Author Cai, Hang
Venkatasubramanian, Krishna K.
Author_xml – sequence: 1
  givenname: Hang
  surname: Cai
  fullname: Cai, Hang
  organization: Worcester Polytechnic Institute
– sequence: 2
  givenname: Krishna K.
  orcidid: 0000-0001-7593-2513
  surname: Venkatasubramanian
  fullname: Venkatasubramanian, Krishna K.
  email: kven@wpi.edu
  organization: Worcester Polytechnic Institute
BookMark eNp9kUFrFTEUhUNpobX2B3Q34Ho0ySTz8pZStRYK3Si4C3du7jzznEmeSR4y_960I1YEXeWSnO_cQ84LdhpiIMauBX8thOnfZNH1nW65MC3nRrbLCbuQWvBWy-7L6R_zObvKec85l4abLdcXzL2jQlh82DUOCjQzBH84TlB8DA2UAvgtN3U8fF2yj1PceYSpyRRyTM1MkI-JZgolNz40PwgSDBPVB7fqllxozi_Z2QhTpqtf5yX7_OH9p5uP7f3D7d3N2_sWldSldQMKA0NnSBKXG3TGmAHlZjNw56iXRg-9ElrxcVQ1_-g4Iow4kgShnVTdJbtbfV2EvT0kP0NabARvny5i2llIxeNEVhokwzVuByTVGzH0AkfoVKewoxGger1avQ4pfj9SLnYfjynU-FYKoYQ0Um-rSqwqTDHnROPvrYLbx27s2o2t3djHbuxSmc1fDPry9OElgZ_-S8qVzHVL2FF6zvRv6Ccmyaie
CitedBy_id crossref_primary_10_1016_j_cie_2020_106854
crossref_primary_10_1016_j_inffus_2020_03_004
crossref_primary_10_1007_s00607_021_00927_9
Cites_doi 10.1109/CIC.2015.7411064
10.1161/01.CIR.101.23.e215
10.1109/ICSMC.2012.6378098
10.1109/MPRV.2008.16
10.1016/j.imavis.2007.03.004
10.1002/gepi.20211
10.1109/TBME.2003.808805
10.1016/j.pmcj.2011.09.006
10.1109/SP.2013.20
10.3390/s90201282
10.1109/TIE.2010.2070772
10.1016/0169-7439(87)80084-9
10.1109/DCOSS.2016.36
10.1007/978-3-540-36675-1_15
10.1109/ISIE.2007.4374812
10.1016/j.comcom.2008.06.014
10.3109/03091900903150998
10.1007/978-3-319-03005-0_54
10.1109/CNS.2014.6997498
ContentType Journal Article
Copyright The Author(s) 2018
EURASIP Journal on Information Security is a copyright of Springer, (2018). All Rights Reserved. © 2018. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Copyright_xml – notice: The Author(s) 2018
– notice: EURASIP Journal on Information Security is a copyright of Springer, (2018). All Rights Reserved. © 2018. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
DBID C6C
AAYXX
CITATION
3V.
7SC
7XB
8AL
8FD
8FE
8FG
8FK
ABUWG
AFKRA
ARAPS
AZQEC
BENPR
BGLVJ
CCPQU
DWQXO
GNUQQ
HCIFZ
JQ2
K7-
L7M
L~C
L~D
M0N
P5Z
P62
PHGZM
PHGZT
PKEHL
PQEST
PQGLB
PQQKQ
PQUKI
PRINS
Q9U
DOA
DOI 10.1186/s13635-018-0082-y
DatabaseName Springer Nature OA Free Journals
CrossRef
ProQuest Central (Corporate)
Computer and Information Systems Abstracts
ProQuest Central (purchase pre-March 2016)
Computing Database (Alumni Edition)
Technology Research Database
ProQuest SciTech Collection
ProQuest Technology Collection
ProQuest Central (Alumni) (purchase pre-March 2016)
ProQuest Central (Alumni)
ProQuest Central UK/Ireland
Advanced Technologies & Computer Science Collection
ProQuest Central Essentials - QC
ProQuest Central
Technology Collection
ProQuest One Community College
ProQuest Central Korea
ProQuest Central Student
SciTech Premium Collection
ProQuest Computer Science Collection
Computer Science Database
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
Computing Database
Advanced Technologies & Aerospace Database
ProQuest Advanced Technologies & Aerospace Collection
Proquest Central Premium
ProQuest One Academic (New)
ProQuest One Academic Middle East (New)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Applied & Life Sciences
ProQuest One Academic (retired)
ProQuest One Academic UKI Edition
ProQuest Central China
ProQuest Central Basic
DOAJ Directory of Open Access Journals
DatabaseTitle CrossRef
Computer Science Database
ProQuest Central Student
Technology Collection
Technology Research Database
Computer and Information Systems Abstracts – Academic
ProQuest One Academic Middle East (New)
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
ProQuest Central (Alumni Edition)
SciTech Premium Collection
ProQuest One Community College
ProQuest Central China
ProQuest Central
ProQuest One Applied & Life Sciences
ProQuest Central Korea
ProQuest Central (New)
Advanced Technologies Database with Aerospace
Advanced Technologies & Aerospace Collection
ProQuest Computing
ProQuest Central Basic
ProQuest Computing (Alumni Edition)
ProQuest One Academic Eastern Edition
ProQuest Technology Collection
ProQuest SciTech Collection
Computer and Information Systems Abstracts Professional
Advanced Technologies & Aerospace Database
ProQuest One Academic UKI Edition
ProQuest One Academic
ProQuest Central (Alumni)
ProQuest One Academic (New)
DatabaseTitleList Computer Science Database


Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
– sequence: 2
  dbid: BENPR
  name: ProQuest Central
  url: https://www.proquest.com/central
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Computer Science
EISSN 2510-523X
1687-417X
EndPage 21
ExternalDocumentID oai_doaj_org_article_28ce805c9bce4681b61cfa3434c3efaa
10_1186_s13635_018_0082_y
GroupedDBID -A0
.4S
.DC
2WC
3V.
4.4
40G
5VS
6KP
8FE
8FG
8R4
8R5
AAKPC
ABUWG
ACGFS
ADBBV
ADINQ
ADMLS
AFKRA
AHBYD
AHYZX
ALMA_UNASSIGNED_HOLDINGS
AMKLP
ARAPS
ARCSS
AZQEC
BCNDV
BENPR
BGLVJ
BPHCQ
C24
C6C
CCPQU
CS3
DWQXO
EDO
EIS
GNUQQ
GROUPED_DOAJ
HCIFZ
HZ~
K6V
K7-
KQ8
M0N
M~E
OK1
P62
PQQKQ
PROAC
Q2X
RHU
SEG
TR2
TUS
U2A
AAYXX
CITATION
OVT
7SC
7XB
8AL
8FD
8FK
JQ2
L7M
L~C
L~D
PHGZM
PHGZT
PKEHL
PQEST
PQGLB
PQUKI
PRINS
Q9U
ID FETCH-LOGICAL-c425t-dbc18ab38e2e027cd888bc277b0dde6285b641540ff4808fd0ccafcfe2a15d243
IEDL.DBID K7-
ISICitedReferencesCount 7
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000446252500001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 2510-523X
1687-4161
IngestDate Fri Oct 03 12:52:32 EDT 2025
Sat Oct 11 05:46:10 EDT 2025
Sat Nov 29 03:33:01 EST 2025
Tue Nov 18 21:05:11 EST 2025
Fri Feb 21 02:32:16 EST 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 1
Keywords Wearable medical systems
Data-centric attack detection
Data manipulation attacks
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c425t-dbc18ab38e2e027cd888bc277b0dde6285b641540ff4808fd0ccafcfe2a15d243
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0001-7593-2513
OpenAccessLink https://link.springer.com/10.1186/s13635-018-0082-y
PQID 2114128259
PQPubID 237294
PageCount 21
ParticipantIDs doaj_primary_oai_doaj_org_article_28ce805c9bce4681b61cfa3434c3efaa
proquest_journals_2114128259
crossref_primary_10_1186_s13635_018_0082_y
crossref_citationtrail_10_1186_s13635_018_0082_y
springer_journals_10_1186_s13635_018_0082_y
PublicationCentury 2000
PublicationDate 2018-09-29
PublicationDateYYYYMMDD 2018-09-29
PublicationDate_xml – month: 09
  year: 2018
  text: 2018-09-29
  day: 29
PublicationDecade 2010
PublicationPlace Cham
PublicationPlace_xml – name: Cham
– name: New York
PublicationTitle EURASIP Journal on Information Security
PublicationTitleAbbrev EURASIP J. on Info. Security
PublicationYear 2018
Publisher Springer International Publishing
Springer Nature B.V
SpringerOpen
Publisher_xml – name: Springer International Publishing
– name: Springer Nature B.V
– name: SpringerOpen
References Halperin, Kohno, Heydt-Benjamin, Fu, Maisel (CR2) 2008; 7
Kermani, Zhang, Raghunathan, Jha (CR1) 2013
Taghikhaki, Sharifi (CR18) 2008
Zink, Brüser, Winnersbach, Napp, Leonhardt, Marx, Schauerte, Mischke (CR39) 2015; 2015
Li, Raghunathan, Jha (CR3) 2011
McSharry, Clifford, Tarassenko, Smith (CR34) 2003; 50
CR13
CR12
Cai, Venkatasubramanian (CR16) 2016
Galzarano, Fortino, Liotta (CR27) 2012
CR11
Shin, Son, Park, Kwon, Kim (CR7) 2016
Lu, Yang, Taylor, Stein (CR36) 2009; 33
Dean, Flowers, Hodel, Roth, Castro, Zhou, Moreira, Ahmed, Rifki, Grantham, Bittle, Brunsch (CR9) 2007
Hajibegloo, Javadi (CR19) 2012
Jiang (CR21) 2009; 9
Duk-Jin, Prabhakaran (CR23) 2011; 7
Chen, Kher, Somani (CR22) 2006
Park, Son, Shin, Kim, Kim (CR6) 2016
Kim, Suk, Prabhakaran (CR25) 2012
Brown, Patel, Plenefisch, Moghimi, Eisenbarth, Shue, Venkatasubramanian (CR4) 2016
Kune, Backes, Clark, Kramer, Reynolds, Fu, Kim, Xu (CR5) 2013
Velez, White, Motsinger, Bush, Ritchie, Williams, Moore (CR33) 2007; 31
Hester, Peters, Yun, Peterson, Skinner, Golla, Storer, Hearndon, Freeman, Lord, Halter, Kotz, Sorber (CR14) 2014
Cai, Venkatasubramanian, Qiu, Xu, Yung, Zhang (CR15) 2015
CR29
CR28
Martín-Yebra (CR38) 2015
Uluagac, Subramanian, Beyah (CR8) 2014
Mahapatro, Khilar (CR24) 2013; 5
CR26
Nabar, Banerjee, Gupta, Poovendran (CR35) 2011
Goldberger, Amaral, Glass, Hausdorff, Ivanov, Mark, Mietus, Moody, Peng, Stanley (CR17) 2000; 101
Dean, Castro, Flowers, Roth, Ahmed, Hodel, Grantham, Bittle, Brunsch (CR10) 2011; 58
Krishnan, Dutt, Chan, Anantharaman, Acharya, Suri, Spaan, Krishnan (CR30) 2007
Lin, Wu, Li, Zhang, Zhang, Zhang (CR37) 2014
Lee, Choi (CR20) 2008; 31
Wold, Esbensen, Geladi (CR31) 1987; 2
Malagón-Borja, Fuentes (CR32) 2009; 27
D. R. Velez (82_CR33) 2007; 31
K. Duk-Jin (82_CR23) 2011; 7
S. Nabar (82_CR35) 2011
D. Halperin (82_CR2) 2008; 7
G. Lu (82_CR36) 2009; 33
A. Martín-Yebra (82_CR38) 2015
82_CR26
82_CR29
S. M Krishnan (82_CR30) 2007
82_CR28
H. Cai (82_CR15) 2015
R. N. Dean (82_CR9) 2007
N. Brown (82_CR4) 2016
M. Hajibegloo (82_CR19) 2012
J. Chen (82_CR22) 2006
S. Wold (82_CR31) 1987; 2
P. Jiang (82_CR21) 2009; 9
A. Mahapatro (82_CR24) 2013; 5
H. Shin (82_CR7) 2016
Z. Taghikhaki (82_CR18) 2008
M. M. Kermani (82_CR1) 2013
D Kim (82_CR25) 2012
W. H. Lin (82_CR37) 2014
C. Li (82_CR3) 2011
Y. Park (82_CR6) 2016
H. Cai (82_CR16) 2016
M. D. Zink (82_CR39) 2015; 2015
J Hester (82_CR14) 2014
S. Galzarano (82_CR27) 2012
A. S. Uluagac (82_CR8) 2014
A. L. Goldberger (82_CR17) 2000; 101
L. Malagón-Borja (82_CR32) 2009; 27
D. F. Kune (82_CR5) 2013
82_CR12
82_CR11
P. E. McSharry (82_CR34) 2003; 50
R. N. Dean (82_CR10) 2011; 58
M. -H. Lee (82_CR20) 2008; 31
82_CR13
References_xml – start-page: 216
  year: 2014
  end-page: 229
  ident: CR14
  article-title: Amulet: an energy-efficient, multi-application wearable platform
  publication-title: 14th ACM Conference on Embedded Network Sensor Systems (SenSys ’16)
– start-page: 150
  year: 2011
  end-page: 156
  ident: CR3
  article-title: Hijacking an insulin pump: security attacks and defenses for a diabetes therapy system
  publication-title: 2011 IEEE 13th International Conference on e-Health Networking, Applications and Services, Columbia, MO
– start-page: 301
  year: 2014
  end-page: 309
  ident: CR8
  article-title: Sensory channel threats to cyber physical systems: a wake-up call
  publication-title: 2014 IEEE Conference on Communications and Network Security, San Francisco, CA
– start-page: 1
  year: 2008
  end-page: 6
  ident: CR18
  article-title: A trust-based distributed data fault detection algorithm for wireless sensor networks
  publication-title: 2008 11th International Conference on Computer and Information Technology, Khulna, Bangladesh
– start-page: 929
  year: 2015
  end-page: 932
  ident: CR38
  article-title: Studying heart rate variability from ballistocardiography acquired by force platform: comparison with conventional ECG
  publication-title: 2015 Computing in Cardiology Conference (CinC), Nice, France
  doi: 10.1109/CIC.2015.7411064
– volume: 101
  start-page: 215
  issue: 23
  year: 2000
  end-page: 220
  ident: CR17
  article-title: PhysioBank, PhysioToolkit, and PhysioNet: components of a new research resource for complex physiologic signals
  publication-title: Circulation
  doi: 10.1161/01.CIR.101.23.e215
– ident: CR12
– start-page: 2377
  year: 2012
  end-page: 2382
  ident: CR27
  article-title: Embedded self-healing layer for detecting and recovering sensor faults in body sensor networks
  publication-title: 2012 IEEE International Conference on Systems, Man, and Cybernetics (SMC), Seoul, South Korea
  doi: 10.1109/ICSMC.2012.6378098
– volume: 7
  start-page: 30
  issue: 1
  year: 2008
  end-page: 39
  ident: CR2
  article-title: Security and privacy for implantable medical devices
  publication-title: IEEE Pervasive Comput
  doi: 10.1109/MPRV.2008.16
– start-page: 65
  year: 2006
  end-page: 72
  ident: CR22
  article-title: Distributed fault detection of wireless sensor networks
  publication-title: 2006 workshop on Dependability issues in wireless ad hoc networks and sensor networks (DIWANS ’06)
– volume: 27
  start-page: 2
  issue: 1
  year: 2009
  end-page: 9
  ident: CR32
  article-title: Object detection using image reconstruction with PCA
  publication-title: Image Vis. Comput
  doi: 10.1016/j.imavis.2007.03.004
– volume: 31
  start-page: 306
  issue: 4
  year: 2007
  end-page: 315
  ident: CR33
  article-title: A balanced accuracy function for epistasis modeling in imbalanced datasets using multifactor dimensionality reduction
  publication-title: Genet. Epidemiol
  doi: 10.1002/gepi.20211
– volume: 50
  start-page: 289
  issue: 3
  year: 2003
  end-page: 294
  ident: CR34
  article-title: A dynamical model for generating synthetic electrocardiogram signals
  publication-title: IEEE Trans. Biomed. Eng
  doi: 10.1109/TBME.2003.808805
– ident: CR29
– volume: 7
  start-page: 727
  issue: 6
  year: 2011
  end-page: 745
  ident: CR23
  article-title: Motion fault detection and isolation in body sensor networks
  publication-title: Pervasive Mob. Comput
  doi: 10.1016/j.pmcj.2011.09.006
– start-page: 145
  year: 2013
  end-page: 159
  ident: CR5
  article-title: Ghost talk: mitigating EMI signal injection attacks against analog sensors
  publication-title: 2013 IEEE Symposium on Security and Privacy, Berkeley, CA
  doi: 10.1109/SP.2013.20
– volume: 9
  start-page: 1282
  issue: 2
  year: 2009
  end-page: 1294
  ident: CR21
  article-title: A new method for node fault detection in wireless sensor networks
  publication-title: Sensors
  doi: 10.3390/s90201282
– start-page: 1
  year: 2011
  end-page: 6
  ident: CR35
  article-title: GEM-REM: Generative model-driven resource efficient ECG monitoring in body sensor networks
  publication-title: 2011 International Conference on Body Sensor Networks, Dallas, TX
– start-page: 213
  year: 2014
  end-page: 215
  ident: CR37
  article-title: Comparison of heart rate variability from PPG with that from ECG
  publication-title: The International Conference on Health Informatics. IFMBE Proceedings
– volume: 58
  start-page: 2591
  issue: 7
  year: 2011
  end-page: 2596
  ident: CR10
  article-title: A characterization of the performance of a MEMS gyroscope in acoustically harsh environments
  publication-title: IEEE Trans. Ind. Electron
  doi: 10.1109/TIE.2010.2070772
– year: 2016
  ident: CR6
  article-title: This Ain’t Your Dose: Sensor Spoofing Attack on Medical Infusion Pump
  publication-title: 10th Usenix Workshop on Offensive Technologies (WOOT’16), Autin, TX
– volume: 2
  start-page: 37
  issue: 1-3
  year: 1987
  end-page: 52
  ident: CR31
  article-title: Principal component analysis
  publication-title: Chemometr. Intell. Lab. Syst
  doi: 10.1016/0169-7439(87)80084-9
– year: 2016
  ident: CR4
  article-title: Poster: SCREAM: sensory channel remote execution attack methods
  publication-title: 25th Usenix Security Symposium, Austin, TX, 2016
– volume: 2015
  start-page: 10
  year: 2015
  ident: CR39
  article-title: Heartbeat cycle length detection by a ballistocardiographic sensor in atrial fibrillation and sinus rhythm
  publication-title: BioMed Res. Int
– start-page: 531
  year: 2015
  end-page: 539
  ident: CR15
  article-title: Detecting malicious temporal alterations of ECG signals in body sensor networks
  publication-title: Network and System Security. NSS 2015. Lecture Notes in Computer Science
– start-page: 127
  year: 2016
  end-page: 135
  ident: CR16
  article-title: Detecting signal injection attack-based morphological alterations of ECG measurements
  publication-title: 2016 International Conference on Distributed Computing in Sensor Systems (DCOSS), Washington, DC
  doi: 10.1109/DCOSS.2016.36
– start-page: 339
  year: 2007
  end-page: 339
  ident: CR30
  article-title: Phase space analysis for cardiovascular signals
  publication-title: Advances in Cardiac Signal Processing
  doi: 10.1007/978-3-540-36675-1_15
– start-page: 203
  year: 2013
  end-page: 208
  ident: CR1
  article-title: Emerging frontiers in embedded security
  publication-title: 26th International Conference on VLSI Design and 2013 12th International Conference on Embedded Systems, Pune, India
– start-page: 1435
  year: 2007
  end-page: 1440
  ident: CR9
  article-title: On the degradation of MEMS gyroscope performance in the presence of high power acoustic noise
  publication-title: 2007 IEEE International Symposium on Industrial Electronics, Vigo, Spain
  doi: 10.1109/ISIE.2007.4374812
– ident: CR13
– ident: CR11
– year: 2016
  ident: CR7
  article-title: Sampling race: bypassing timing-based analog active sensor spoofing detection on analog-digital systems
  publication-title: 10th Usenix Workshop on Offensive Technologies (WOOTŠ16), Autin, TX
– volume: 31
  start-page: 3469
  issue: 14
  year: 2008
  end-page: 3475
  ident: CR20
  article-title: Fault detection of wireless sensor networks
  publication-title: Comput. Commun
  doi: 10.1016/j.comcom.2008.06.014
– volume: 5
  start-page: 252
  year: 2013
  end-page: 259
  ident: CR24
  article-title: Fault diagnosis in body sensor networks
  publication-title: Int. J. Comput. Inf. Syst. Ind. Manag. Appl. (IJCISIM)
– ident: CR28
– ident: CR26
– start-page: 62
  year: 2012
  end-page: 66
  ident: CR19
  article-title: Fast fault detection in wireless sensor networks
  publication-title: 2012 Second International Conference on Digital Information and Communication Technology and it’s Applications (DICTAP), Bangkok, Thailand
– start-page: 5234
  year: 2012
  end-page: 5237
  ident: CR25
  article-title: Fault detection and isolation in motion monitoring system
  publication-title: 2012 Annual International Conference of the IEEE Engineering in Medicine and Biology Society, San Diego, CA
– volume: 33
  start-page: 634
  issue: 8
  year: 2009
  end-page: 641
  ident: CR36
  article-title: A comparison of photoplethysmography and ECG recording to analyse heart rate variability in healthy subjects
  publication-title: J. Med. Eng. Technol
  doi: 10.3109/03091900903150998
– start-page: 62
  volume-title: 2012 Second International Conference on Digital Information and Communication Technology and it’s Applications (DICTAP), Bangkok, Thailand
  year: 2012
  ident: 82_CR19
– volume: 2
  start-page: 37
  issue: 1-3
  year: 1987
  ident: 82_CR31
  publication-title: Chemometr. Intell. Lab. Syst
  doi: 10.1016/0169-7439(87)80084-9
– start-page: 145
  volume-title: 2013 IEEE Symposium on Security and Privacy, Berkeley, CA
  year: 2013
  ident: 82_CR5
  doi: 10.1109/SP.2013.20
– start-page: 216
  volume-title: 14th ACM Conference on Embedded Network Sensor Systems (SenSys ’16)
  year: 2014
  ident: 82_CR14
– start-page: 127
  volume-title: 2016 International Conference on Distributed Computing in Sensor Systems (DCOSS), Washington, DC
  year: 2016
  ident: 82_CR16
  doi: 10.1109/DCOSS.2016.36
– volume: 27
  start-page: 2
  issue: 1
  year: 2009
  ident: 82_CR32
  publication-title: Image Vis. Comput
  doi: 10.1016/j.imavis.2007.03.004
– start-page: 1435
  volume-title: 2007 IEEE International Symposium on Industrial Electronics, Vigo, Spain
  year: 2007
  ident: 82_CR9
  doi: 10.1109/ISIE.2007.4374812
– start-page: 339
  volume-title: Advances in Cardiac Signal Processing
  year: 2007
  ident: 82_CR30
  doi: 10.1007/978-3-540-36675-1_15
– start-page: 1
  volume-title: 2008 11th International Conference on Computer and Information Technology, Khulna, Bangladesh
  year: 2008
  ident: 82_CR18
– start-page: 213
  volume-title: The International Conference on Health Informatics. IFMBE Proceedings
  year: 2014
  ident: 82_CR37
  doi: 10.1007/978-3-319-03005-0_54
– volume: 9
  start-page: 1282
  issue: 2
  year: 2009
  ident: 82_CR21
  publication-title: Sensors
  doi: 10.3390/s90201282
– volume-title: 10th Usenix Workshop on Offensive Technologies (WOOT’16), Autin, TX
  year: 2016
  ident: 82_CR6
– ident: 82_CR29
– volume: 33
  start-page: 634
  issue: 8
  year: 2009
  ident: 82_CR36
  publication-title: J. Med. Eng. Technol
  doi: 10.3109/03091900903150998
– volume: 2015
  start-page: 10
  year: 2015
  ident: 82_CR39
  publication-title: BioMed Res. Int
– start-page: 1
  volume-title: 2011 International Conference on Body Sensor Networks, Dallas, TX
  year: 2011
  ident: 82_CR35
– ident: 82_CR11
– start-page: 531
  volume-title: Network and System Security. NSS 2015. Lecture Notes in Computer Science
  year: 2015
  ident: 82_CR15
– start-page: 929
  volume-title: 2015 Computing in Cardiology Conference (CinC), Nice, France
  year: 2015
  ident: 82_CR38
  doi: 10.1109/CIC.2015.7411064
– volume: 50
  start-page: 289
  issue: 3
  year: 2003
  ident: 82_CR34
  publication-title: IEEE Trans. Biomed. Eng
  doi: 10.1109/TBME.2003.808805
– start-page: 203
  volume-title: 26th International Conference on VLSI Design and 2013 12th International Conference on Embedded Systems, Pune, India
  year: 2013
  ident: 82_CR1
– volume: 7
  start-page: 30
  issue: 1
  year: 2008
  ident: 82_CR2
  publication-title: IEEE Pervasive Comput
  doi: 10.1109/MPRV.2008.16
– volume-title: 25th Usenix Security Symposium, Austin, TX, 2016
  year: 2016
  ident: 82_CR4
– ident: 82_CR13
– volume: 31
  start-page: 3469
  issue: 14
  year: 2008
  ident: 82_CR20
  publication-title: Comput. Commun
  doi: 10.1016/j.comcom.2008.06.014
– volume: 7
  start-page: 727
  issue: 6
  year: 2011
  ident: 82_CR23
  publication-title: Pervasive Mob. Comput
  doi: 10.1016/j.pmcj.2011.09.006
– volume: 5
  start-page: 252
  year: 2013
  ident: 82_CR24
  publication-title: Int. J. Comput. Inf. Syst. Ind. Manag. Appl. (IJCISIM)
– volume: 101
  start-page: 215
  issue: 23
  year: 2000
  ident: 82_CR17
  publication-title: Circulation
  doi: 10.1161/01.CIR.101.23.e215
– start-page: 5234
  volume-title: 2012 Annual International Conference of the IEEE Engineering in Medicine and Biology Society, San Diego, CA
  year: 2012
  ident: 82_CR25
– ident: 82_CR26
– start-page: 150
  volume-title: 2011 IEEE 13th International Conference on e-Health Networking, Applications and Services, Columbia, MO
  year: 2011
  ident: 82_CR3
– volume: 58
  start-page: 2591
  issue: 7
  year: 2011
  ident: 82_CR10
  publication-title: IEEE Trans. Ind. Electron
  doi: 10.1109/TIE.2010.2070772
– start-page: 2377
  volume-title: 2012 IEEE International Conference on Systems, Man, and Cybernetics (SMC), Seoul, South Korea
  year: 2012
  ident: 82_CR27
  doi: 10.1109/ICSMC.2012.6378098
– start-page: 65
  volume-title: 2006 workshop on Dependability issues in wireless ad hoc networks and sensor networks (DIWANS ’06)
  year: 2006
  ident: 82_CR22
– volume-title: 10th Usenix Workshop on Offensive Technologies (WOOTŠ16), Autin, TX
  year: 2016
  ident: 82_CR7
– ident: 82_CR28
– volume: 31
  start-page: 306
  issue: 4
  year: 2007
  ident: 82_CR33
  publication-title: Genet. Epidemiol
  doi: 10.1002/gepi.20211
– ident: 82_CR12
– start-page: 301
  volume-title: 2014 IEEE Conference on Communications and Network Security, San Francisco, CA
  year: 2014
  ident: 82_CR8
  doi: 10.1109/CNS.2014.6997498
SSID ssj0002808905
ssj0064073
Score 2.126294
Snippet Recent years have seen the emergence of wearable medical systems (WMS) that have demonstrated great promise for improved health monitoring and overall...
Abstract Recent years have seen the emergence of wearable medical systems (WMS) that have demonstrated great promise for improved health monitoring and overall...
SourceID doaj
proquest
crossref
springer
SourceType Open Website
Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 1
SubjectTerms Blood pressure
Classifiers
Communications Engineering
Data manipulation attacks
Data-centric attack detection
Decision analysis
Electrocardiography
Engineering
Health
Image reconstruction
Medical electronics
Medical imaging
Networks
Physiology
Pressure measurement
Security Science and Technology
Sensors
Signal processing
Signal,Image and Speech Processing
Support systems
Systems and Data Security
Trustworthiness
Wearable medical systems
Wearable technology
SummonAdditionalLinks – databaseName: DOAJ Directory of Open Access Journals
  dbid: DOA
  link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1Lb9QwELbQqgcuQIGqCwX5wAlk1bGdxD4CbcUBrTiAtDfLGU-konYXbVJQ_z1jJ9ndVgIu3KLEjqx5eGY8nm8YexMwBFlKFKbUUZCFMKJBW4mmDa50WNYRMrr-53qxsMul-7LX6ivdCRvggQfCnSoLaGUJrgE0FTlZVQFt0EYb0NiG7BqR17MXTH3PR0bSOrl1hFO2So85zcJWp12hydBSGG1FsoHi9o5VyuD9dzzOe0nSbHsunrBHo9PI3w-LPWQPcPWUPZ4aMvBRP5-xeIYpJ0D_4OnmJ0_YFlN_Lh76PtXTc3rMxxnTrsc7imTXG369Oy3s-OWK_yIdSHVV_HrI5fAB9Ll7zr5dnH_9-EmMbRQEkEL2IjZQ2NBoiwopCIVIQW8Dqq4bSXtbKqFsqsQk2baGyNZGSVxtoUUVijIqo4_YbLVe4THjEVUkWqoCyAuJWjkMztQYASwEwGrO5ERGDyPGeGp1ceVzrGErP1DeE-V9ory_nbO32yk_BoCNvw3-kHizHZiwsfMLkhg_Soz_l8TM2cnEWT8qbOcpDjZFquN1c_Zu4vbu8x9X9OJ_rOgle6iyLDqh3Amb9ZsbfMUO4Gd_2W1eZ8n-DXld_r0
  priority: 102
  providerName: Directory of Open Access Journals
– databaseName: SpringerOpen
  dbid: C24
  link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3Nb9UwDLdgcIDDBoOJBwPlwAkUkSZpmxzHYOKAJg4g7RaljouG2HvTawfaf0-Spm8MARLcojatIn_Edhz_DPDck_eiFsR1rQKPFkLzjkzDu97b2lLdBszo-u_b42NzcmI_lDruYb7tPqck806d1do0r4ZKReMYQ1_Dk93ilzfhVl0Zm8T6sJQ4fMmnRcJYsfGBU6JKlXTmb39zzSBl3P5rzuYv-dFsdo52_mvB92C7eJnsYBKL-3CDlruwM3dwYEWhd-HuT3CEDyC8oZRSiGOWLo6yBI0xt_difhxTOT6Lw3waMm-abIiB8GrNzq4OGwd2umTfowqlsix2NqWC2IQZPTyET0dvPx6-46ULA8eozyMPHVbGd8qQpBjDYogxc4eybTsRt8ZUgdk1icei73UkfR9EFIoee5K-qoPUag-2lqslPQIWSIbID1lhdGKCkpa81S0FRIMeqVmAmFnhsECUp04ZX10OVUzjJpq6SFOXaOouF_Bi88n5hM_xt8mvE383ExO0dn6wWn92RVOdNEhG1Gg7JN1Er76psPdKK42Keu8XsD9Lhyv6PrgYRusqlQHbBbycpeHq9R9X9PifZj-BOzKLk-XS7sPWuL6gp3Abv42nw_pZVoMf6pwF6g
  priority: 102
  providerName: Springer Nature
Title Detecting data manipulation attacks on physiological sensor measurements in wearable medical systems
URI https://link.springer.com/article/10.1186/s13635-018-0082-y
https://www.proquest.com/docview/2114128259
https://doaj.org/article/28ce805c9bce4681b61cfa3434c3efaa
Volume 2018
WOSCitedRecordID wos000446252500001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAON
  databaseName: DOAJ Directory of Open Access Journals
  customDbUrl:
  eissn: 2510-523X
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0002808905
  issn: 2510-523X
  databaseCode: DOA
  dateStart: 20070101
  isFulltext: true
  titleUrlDefault: https://www.doaj.org/
  providerName: Directory of Open Access Journals
– providerCode: PRVHPJ
  databaseName: ROAD: Directory of Open Access Scholarly Resources
  customDbUrl:
  eissn: 2510-523X
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0002808905
  issn: 2510-523X
  databaseCode: M~E
  dateStart: 20070101
  isFulltext: true
  titleUrlDefault: https://road.issn.org
  providerName: ISSN International Centre
– providerCode: PRVAVX
  databaseName: SpringerOpen
  customDbUrl:
  eissn: 2510-523X
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0002808905
  issn: 2510-523X
  databaseCode: C24
  dateStart: 20071201
  isFulltext: true
  titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22
  providerName: Springer Nature
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3Nb9UwDI_YxoELHwLEg_GUAydQtCZN0_Q0sfEmJODpCYE0cYlSJ0WTtvfGa2HaZX_77LTd05DYhUtVtWkb1Xbsnx3bjL3x0fusyKLQRR4Eaggt6miNqBtfFVUsygCpuv7ncj63x8fVYnC4tcO2ynFNTAt1WAH5yPcQqGhJiZbV_vkvQV2jKLo6tNDYYjtSKUl8_qkUhLEMyg7Z7kMgU1qz18octStiZytI8YnLW6ooVey_ZWb-FRlNCufo0f9O9TF7OJia_H3PG0_Yvbh8ysKHSGED_CKnzaGcyl-MLby47zpKued4mjwe48LIWwS7qzU_2zgUW36y5BcoJpR6xc_6cA_v60K3z9j3o9m3w49i6LQgAGW2E6EGaX2d26gi4lQIiItrUGVZZ7j8UZZlbYiOWdNom9kmZEj4BpqovCyC0vlztr1cLeMLxkNUwSAolYCGSshVFX2lyxgALHiIZsKy8ac7GMqQUzeMU5fgiDWup5NDOjmik7ucsLc3j5z3NTjuGnxAlLwZSOWz04XV-qcbpNEpC9FmBVQ1RG3QcjcSGp_rXEMeG-8nbHekrBtkunUbsk7Yu5E3Nrf_OaOXd7_sFXugEk9WQlW7bLtb_46v2X3405206ynbOZjNF1-nbOtQ6WnyGEwTk-Pxy9UMj4vixzV9pwZO
linkProvider ProQuest
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Nb9QwEB2VgkQvFASILQV8gAvIauI4iXNAiFKqVrusOBSpN-OMHVSp3W03gWr_FL-RmXx0VSR664FblDhWJn4z4-exZwBeu-BclEZB6jTxkjyElmUwmSwrV6RFSHOPbXb9ST6dmuPj4usa_B7OwvC2ysEmtobaz5HXyHeIqOiYD1oWH84vJFeN4ujqUEKjg8U4LC-JstXvD_dofN8otf_56NOB7KsKSCR8NtKXGBtXJiaoQJwMPXHAElWelxGpOp8oLDP-5qiqtIlM5SMSssIqKBenXumE-r0Dd3Vics7VP84lc7qMdJW5Qh84jU22U8cJeXPi6kayo5XLa66vrRBwbVr7VyS2dXD7m__br3kID_qptPjYYf8RrIXZY_B7gcMiJKHgza-C03sMJcqEaxpOKSDosl3RGQy_qInMzxfibLVgWouTmbgkofhomTjrwlmiy3tdP4FvtyLYU1ifzWfhGQgflM-IdMdIEzGfqCK4QufBIxp0GLIRRMMgW-zTrHO1j1Pb0i2T2Q4XlnBhGRd2OYK3V6-cdzlGbmq8y8i5asjpwdsb88UP21sbqwwGE6VYlBh0Rswki7FyiU40JqFybgTbA5Jsb7Nqu4LRCN4NWFw9_ucXbd3c2Su4f3D0ZWInh9Pxc9hQrT4UUhXbsN4sfoYXcA9_NSf14mWrTAK-3zZE_wBXwWAd
linkToPdf http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Lb9QwEB6VghAXHgLElgI-wAVkbeI4iXNACFhWVK1WewCp4mIce1JVortlk1LtX-PXMZNHV0Witx64RYljZeJvZvx57BmAlw6di9IIpU6TIMlDaFmiyWRZuSItMM2Db7PrH-SzmTk8LOZb8Hs4C8PbKgeb2BrqsPS8Rj4moqJjPmhZjKt-W8R8Mn13-lNyBSmOtA7lNDqI7OP6nOhb_XZvQmP9Sqnppy8fP8u-woD0hNVGhtLHxpWJQYXEz3wgPlh6ledlRGrPpwvLjL8_qiptIlOFiASufIXKxWlQOqF-b8DNnDgmE795-o35XUZ6y7yhD6LGJhvXcUKenXi7kex05fqSG2yrBVya4v4VlW2d3fTe__yb7sPdfoot3nc68QC2cPEQwgQ5XELSCt4UKzjtx1C6TLim4VQDgi7blZ7BIYiaSP5yJU42C6m1OF6IcxKKj5yJky7MJbp82PUj-Hotgj2G7cVygU9ABFQhIzIee5qghUQV6AqdY_DeeOcxG0E0DLj1ffp1rgLyw7Y0zGS2w4gljFjGiF2P4PXFK6dd7pGrGn9gFF005LTh7Y3l6sj2Vsgq49FEqS9KjzojxpLFvnKJTrRPsHJuBLsDqmxvy2q7gdQI3gy43Dz-5xftXN3ZC7hNyLQHe7P9p3BHtapRSFXswnazOsNncMv_ao7r1fNWrwR8v26E_gEy0WlC
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Detecting+data+manipulation+attacks+on+physiological+sensor+measurements+in+wearable+medical+systems&rft.jtitle=EURASIP+Journal+on+Information+Security&rft.au=Cai%2C+Hang&rft.au=Venkatasubramanian%2C+Krishna+K&rft.date=2018-09-29&rft.pub=Springer+Nature+B.V&rft.issn=1687-4161&rft.eissn=1687-417X&rft.volume=2018&rft.issue=1&rft.spage=1&rft.epage=21&rft_id=info:doi/10.1186%2Fs13635-018-0082-y&rft.externalDBID=HAS_PDF_LINK
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2510-523X&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2510-523X&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2510-523X&client=summon