{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T16:29:05Z","timestamp":1743006545383,"version":"3.40.3"},"publisher-location":"Cham","reference-count":11,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030298968"},{"type":"electronic","value":"9783030298975"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-29897-5_36","type":"book-chapter","created":{"date-parts":[[2020,3,3]],"date-time":"2020-03-03T05:03:13Z","timestamp":1583211793000},"page":"407-418","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Information Theoretic Analysis for Securing Next Generation Leadless Cardiac Pacemaker"],"prefix":"10.1007","author":[{"given":"Muhammad Faheem","family":"Awan","sequence":"first","affiliation":[]},{"given":"Kimmo","family":"Kansanen","sequence":"additional","affiliation":[]},{"given":"Deepak","family":"Palaksha","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,3,4]]},"reference":[{"key":"36_CR1","doi-asserted-by":"crossref","unstructured":"Awan, M.F., Kansanen, K.: Estimating eavesdropping risk for next generation implants. In: Advances in Body Area Networks I, pp. 387\u2013398. Springer, Berlin (2019)","DOI":"10.1007\/978-3-030-02819-0_29"},{"key":"36_CR2","doi-asserted-by":"crossref","unstructured":"Halperin, D., Heydt-Benjamin, T.S., Ransford, B., Clark, S.S., Defend, B., Morgan, W., Fu, K., Kohno, T., Maisel, W.H.: Pacemakers and implantable cardiac defibrillators: software radio attacks and zero-power defenses. In: 2008 IEEE Symposium on Security and Privacy, SP 2008, pp. 129\u2013142. IEEE, Piscataway (2008)","DOI":"10.1109\/SP.2008.31"},{"issue":"6","key":"36_CR3","doi-asserted-by":"publisher","first-page":"871","DOI":"10.1109\/TBCAS.2013.2245664","volume":"7","author":"M Zhang","year":"2013","unstructured":"Zhang, M., Raghunathan, A., Jha, N.K.: MedMon: securing medical devices through wireless monitoring and anomaly detection. IEEE Trans. Biomed. Circuits Syst. 7(6), 871\u2013881 (2013)","journal-title":"IEEE Trans. Biomed. Circuits Syst."},{"key":"36_CR4","doi-asserted-by":"crossref","unstructured":"Son, S., Lee, K., Won, D., Kim, S.: U-healthcare system protecting privacy based on cloaker. In: 2010 IEEE International Conference on Bioinformatics and Biomedicine Workshops (BIBMW) , pp. 417\u2013423. IEEE, Piscataway (2010)","DOI":"10.1109\/BIBMW.2010.5703838"},{"key":"36_CR5","doi-asserted-by":"crossref","unstructured":"Gollakota, S., Hassanieh, H., Ransford, B., Katabi, D., Fu, K.: They can hear your heartbeats: non-invasive security for implantable medical devices. In: ACM SIGCOMM Computer Communication Review, vol. 41, no. 4, pp. 2\u201313. ACM, New York (2011)","DOI":"10.1145\/2043164.2018438"},{"key":"36_CR6","doi-asserted-by":"crossref","unstructured":"Awan, M.F., Perez-Simbor, S., Garcia-Pardo, C., Kansanen, K., Bose, P., Castell\u00f3-Palacios, S., Cardona, N.: Experimental phantom-based evaluation of physical layer security for future leadless cardiac pacemaker. In: 2018 IEEE 29th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), pp. 333\u2013339. IEEE, Piscataway (2018)","DOI":"10.1109\/PIMRC.2018.8580808"},{"issue":"4","key":"36_CR7","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"CE Shannon","year":"1949","unstructured":"Shannon, C.E.: Communication theory of secrecy systems. Bell Labs Tech. J. 28(4), 656\u2013715 (1949)","journal-title":"Bell Labs Tech. J."},{"issue":"8","key":"36_CR8","doi-asserted-by":"publisher","first-page":"1355","DOI":"10.1002\/j.1538-7305.1975.tb02040.x","volume":"54","author":"AD Wyner","year":"1975","unstructured":"Wyner, A.D.: The wire-tap channel. Bell Labs Tech. J. 54(8), 1355\u20131387 (1975)","journal-title":"Bell Labs Tech. J."},{"issue":"3","key":"36_CR9","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1109\/TIT.1978.1055892","volume":"24","author":"I Csisz\u00e1r","year":"1978","unstructured":"Csisz\u00e1r, I., Korner, J.: Broadcast channels with confidential messages. IEEE Trans. Inf. Theory 24(3), 339\u2013348 (1978)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"36_CR10","doi-asserted-by":"crossref","unstructured":"Sayrafian-Pour, K., Yang, W.-B., Hagedorn, J., Terrill, J., Yazdandoost, K.Y.: A statistical path loss model for medical implant communication channels. In: 2009 IEEE 20th International Symposium on Personal, Indoor and Mobile Radio Communications, pp. 2995\u20132999. IEEE, Piscataway (2009)","DOI":"10.1109\/PIMRC.2009.5449869"},{"issue":"4","key":"36_CR11","doi-asserted-by":"publisher","first-page":"188","DOI":"10.1016\/j.icte.2016.08.010","volume":"2","author":"MN Islam","year":"2016","unstructured":"Islam, M.N., Yuce, M.R.: Review of medical implant communication system (MICS) band and network. ICT Express 2(4), 188\u2013194 (2016)","journal-title":"ICT Express"}],"container-title":["EAI\/Springer Innovations in Communication and Computing","13th EAI International Conference on Body Area Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-29897-5_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,3]],"date-time":"2020-03-03T16:17:54Z","timestamp":1583252274000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-29897-5_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030298968","9783030298975"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-29897-5_36","relation":{},"ISSN":["2522-8595","2522-8609"],"issn-type":[{"type":"print","value":"2522-8595"},{"type":"electronic","value":"2522-8609"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"4 March 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"BODYNETS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"EAI International Conference on Body Area Networks","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Oulu","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Finland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 October 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 October 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"bodynets2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/bodynets.org\/2018","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}