Abstract:
Users of personal health devices (PHD) have implicit expectations on convenience, connectivity, accessibility of their data, and security. They expect to connect PHDs to ...Show MorePurpose:The purpose of this Standards Roadmap is to build common ground around cybersecurity in the PHD data exchange and define an “information security toolbox” appropriate for...Show More
Metadata
Abstract:
Users of personal health devices (PHD) have implicit expectations on convenience, connectivity, accessibility of their data, and security. They expect to connect PHDs to their mobile devices, view their data in the cloud, and easily share with their clinicians or care providers. In some cases, the users themselves are taking action to build connections between PHDs, mobile devices, and the cloud to create the desired system. While many manufacturers are working on solving PHD connectivity with proprietary solutions, there is a lack of a standardized approach to providing secure Plug & Play interoperability.
Purpose:
The purpose of this Standards Roadmap is to build common ground around cybersecurity in the PHD data exchange and define an “information security toolbox” appropriate for the PHD data exchange standards. The Standards Roadmap will become the basis for the standardization of secure Plug & Play interoperability in an open consensus standard by the IEEE 11073 PHD Working Group and secure Profile and Service by the Bluetooth SIG Medical Devices Working Group.
Date of Publication: 30 April 2019
Electronic ISBN:978-1-5044-5773-6
Persistent Link: https://ieeexplore.ieee.org/servlet/opac?punumber=8703256
Keywords assist with retrieval of results and provide a means to discovering other relevant content. Learn more.
- Index Terms
- Vulnerability Scores ,
- Components Of System ,
- Health Information ,
- Flow Data ,
- Types Of Devices ,
- Collateral Damage ,
- System Context ,
- Vulnerability Assessment ,
- Personal Health Records ,
- Threat Model ,
- Security Control ,
- Physical Activity Monitoring ,
- Common Vulnerability ,
- Message Authentication Code ,
- Privacy By Design ,
- Supply Chain ,
- Caregivers ,
- Interoperability ,
- Data Exchange ,
- Access Control ,
- Information Security ,
- Pulse Oximeter ,
- Preservation Of Integrity ,
- Risk Level ,
- Continuous Subcutaneous Insulin Infusion ,
- Protected Health Information ,
- Mitigation Techniques ,
- Attack Vector ,
- External Actors ,
- Multicomponent Systems ,
- User Awareness ,
- Insulin Delivery ,
- Risk Analysis ,
- Confidentiality ,
- Medical Devices ,
- Scoring System ,
- Cybersecurity ,
- Functional Devices ,
- Vulnerability Of Systems ,
- Attack Surface ,
- Environmental Metrics ,
- Identification Of Vulnerabilities ,
- Physiological Metrics ,
- Risk Management ,
- Information Disclosure ,
- Denial Of Service ,
- Risk Reduction ,
- Risk Evaluation ,
- Continuous Glucose Monitoring ,
- Cyber Operations
Keywords assist with retrieval of results and provide a means to discovering other relevant content. Learn more.
- Index Terms
- Vulnerability Scores ,
- Components Of System ,
- Health Information ,
- Flow Data ,
- Types Of Devices ,
- Collateral Damage ,
- System Context ,
- Vulnerability Assessment ,
- Personal Health Records ,
- Threat Model ,
- Security Control ,
- Physical Activity Monitoring ,
- Common Vulnerability ,
- Message Authentication Code ,
- Privacy By Design ,
- Supply Chain ,
- Caregivers ,
- Interoperability ,
- Data Exchange ,
- Access Control ,
- Information Security ,
- Pulse Oximeter ,
- Preservation Of Integrity ,
- Risk Level ,
- Continuous Subcutaneous Insulin Infusion ,
- Protected Health Information ,
- Mitigation Techniques ,
- Attack Vector ,
- External Actors ,
- Multicomponent Systems ,
- User Awareness ,
- Insulin Delivery ,
- Risk Analysis ,
- Confidentiality ,
- Medical Devices ,
- Scoring System ,
- Cybersecurity ,
- Functional Devices ,
- Vulnerability Of Systems ,
- Attack Surface ,
- Environmental Metrics ,
- Identification Of Vulnerabilities ,
- Physiological Metrics ,
- Risk Management ,
- Information Disclosure ,
- Denial Of Service ,
- Risk Reduction ,
- Risk Evaluation ,
- Continuous Glucose Monitoring ,
- Cyber Operations