{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T20:53:36Z","timestamp":1775249616486,"version":"3.50.1"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2018,10,13]],"date-time":"2018-10-13T00:00:00Z","timestamp":1539388800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/100008982","name":"Qatar National Research Fund","doi-asserted-by":"publisher","award":["8-408-2-172"],"award-info":[{"award-number":["8-408-2-172"]}],"id":[{"id":"10.13039\/100008982","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Neural Comput &amp; Applic"],"published-print":{"date-parts":[[2020,5]]},"DOI":"10.1007\/s00521-018-3819-0","type":"journal-article","created":{"date-parts":[[2018,10,13]],"date-time":"2018-10-13T13:15:10Z","timestamp":1539436510000},"page":"4347-4360","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":23,"title":["Multi-layer security scheme for implantable medical devices"],"prefix":"10.1007","volume":"32","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9403-8071","authenticated-orcid":false,"given":"Heena","family":"Rathore","sequence":"first","affiliation":[]},{"given":"Chenglong","family":"Fu","sequence":"additional","affiliation":[]},{"given":"Amr","family":"Mohamed","sequence":"additional","affiliation":[]},{"given":"Abdulla","family":"Al-Ali","sequence":"additional","affiliation":[]},{"given":"Xiaojiang","family":"Du","sequence":"additional","affiliation":[]},{"given":"Mohsen","family":"Guizani","sequence":"additional","affiliation":[]},{"given":"Zhengtao","family":"Yu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,10,13]]},"reference":[{"key":"3819_CR1","unstructured":"Frost and Sullivan, Internet of Medical Things, Forecast to 2021, market report. https:\/\/store.frost.com\/internet-of-medical-things-forecast-to-2021.html . Accessed 19 June 2018"},{"key":"3819_CR2","unstructured":"SelectUSA (2017) https:\/\/www.selectusa.gov\/medical-technology-industry-united-states . Accessed 11 Jan 2017"},{"key":"3819_CR3","doi-asserted-by":"crossref","unstructured":"Halperin D et al (2008) Pacemakers and implantable cardiac defibrillators: software radio attacks and zero-power defenses. In: IEEE symposium on security and privacy, SP, pp 129\u2013142","DOI":"10.1109\/SP.2008.31"},{"key":"3819_CR4","first-page":"1495","volume":"13","author":"H Rathore","year":"2017","unstructured":"Rathore H (2017) A review of security challenges, attacks and resolutions for wireless medical devices. Wirel Commun Mob Comput Conf (IWCMC) 13:1495\u20131501","journal-title":"Wirel Commun Mob Comput Conf (IWCMC)"},{"key":"3819_CR5","doi-asserted-by":"crossref","unstructured":"Zheng G et al (2014) An ECG-based secret data sharing scheme supporting emergency treatment of implantable medical devices. In: Proceedings of international symposium on wireless personal multimedia communications (WPMC), pp 624\u2013628","DOI":"10.1109\/WPMC.2014.7014892"},{"key":"3819_CR6","doi-asserted-by":"crossref","unstructured":"Rathore H et al (2018) DTW based authentication for wireless medical device security. In: IEEE 14th international wireless communications and mobile computing conference (IWCMC), pp. 476\u2013481","DOI":"10.1109\/IWCMC.2018.8450419"},{"key":"3819_CR7","doi-asserted-by":"crossref","unstructured":"Hei X, Du X (2011) Biometric-based two-level secure access control for implantable medical devices during emergency. In: Proceedings of IEEE INFOCOM","DOI":"10.1109\/INFCOM.2011.5935179"},{"key":"3819_CR8","doi-asserted-by":"crossref","unstructured":"Rostami M, Juels A, Koushanfar F (2013) Heart-to-heart (H2H): authentication for implanted medical devices. In: Proceedings of ACM SIGSAC conference on computer and communications security, pp 1099\u20131112","DOI":"10.1145\/2508859.2516658"},{"key":"3819_CR9","doi-asserted-by":"crossref","unstructured":"Halperin D, Heydt-Benjamin TS, Ransford B, Clark SS, Defend B, Morgan W, Fu K, Kohno T, Maisel WH (2008)Pacemakers and implantable cardiac defibrillators: software radio attacks and zero-power defenses. In: IEEE symposium on security and privacy, pp 129\u2013142","DOI":"10.1109\/SP.2008.31"},{"key":"3819_CR10","doi-asserted-by":"crossref","unstructured":"Rasmussen KB, Castelluccia C, Heydt-Benjamin TS, Capkun S (2009) Proximity-based access control for implantable medical devices. In: Proceedings of 16th ACM conference on computer and communications security, pp 410\u2013419","DOI":"10.1145\/1653662.1653712"},{"key":"3819_CR11","unstructured":"Kim Yu BJ, Kim H (2012) In-vivo NFC: remote monitoring of implanted medical devices with improved privacy. In: Proceedings of 10th ACM conference on embedded network sensor systems, pp 327\u2013328"},{"key":"3819_CR12","doi-asserted-by":"crossref","unstructured":"Singh K, Muthukkumarasamy V (2007) Authenticated key establishment protocols for a home health care system. In: Proceedings of 3rd international conference on intelligent sensors, sensor networks and information, pp 353\u2013358","DOI":"10.1109\/ISSNIP.2007.4496869"},{"key":"3819_CR13","doi-asserted-by":"crossref","unstructured":"Zheng G, Fang G, Shankaran R, Orgun MA, Dutkiewicz E (2014) An ECG-based secret data sharing scheme supporting emergency treatment of implantable medical devices. In: International symposium on IEEE wireless personal multimedia communications (WPMC), pp 624- 628. IEEE","DOI":"10.1109\/WPMC.2014.7014892"},{"key":"3819_CR14","doi-asserted-by":"crossref","unstructured":"Rieback MR, Crispo B, Tanenbaum AS (2005) RFID guardian: a battery-powered mobile device for RFID privacy management. In: Proceedings of Australasian conference on information security and privacy, pp 184\u2013194","DOI":"10.1007\/11506157_16"},{"key":"3819_CR15","doi-asserted-by":"crossref","unstructured":"Rathore H, Al-Ali A, Mohamed A, Du X, Guizani M. (2017) DLRT: deep learning approach for reliable diabetic treatment. In: Proceedings of IEEE Globecom","DOI":"10.1109\/GLOCOM.2017.8255028"},{"issue":"6","key":"3819_CR16","doi-asserted-by":"publisher","first-page":"871","DOI":"10.1109\/TBCAS.2013.2245664","volume":"7","author":"M Zhang","year":"2013","unstructured":"Zhang M, Raghunathan A, Jha NK (2013) MedMon: securing medical devices through wireless monitoring and anomaly detection. IEEE Trans Biomed Circuits Syst 7(6):871\u2013881","journal-title":"IEEE Trans Biomed Circuits Syst"},{"key":"3819_CR17","doi-asserted-by":"crossref","unstructured":"Xu F, Qin Z, Tan CC, Wang B, Li Q (2011) IMDGuard: securing implantable medical devices with the external wearable guardian. In: Proceedings of IEEE INFOCOM, pp 1862\u20131870","DOI":"10.1109\/INFCOM.2011.5934987"},{"key":"3819_CR18","unstructured":"Denning T, Fu K, Kohno T (2008) Absence makes the heart grow fonder: new directions for implantable medical device security. In: Proceedings of HotSec"},{"issue":"11","key":"3819_CR19","doi-asserted-by":"publisher","first-page":"1921","DOI":"10.1109\/TBME.2005.856257","volume":"52","author":"O Meste","year":"2005","unstructured":"Meste O et al (2005) Time-varying analysis methods and models for the respiratory and cardiac system coupling in graded exercise. IEEE Trans Biomed Eng 52(11):1921\u20131930","journal-title":"IEEE Trans Biomed Eng"},{"key":"3819_CR20","doi-asserted-by":"crossref","unstructured":"Khalil I, Sufi F. (2008) Legendre polynomials based biometric authentication using QRS complex of ECG. In: Proceedings of international conference on intelligent sensors, sensor networks and information processing ISSNIP, pp 297\u2013302","DOI":"10.1109\/ISSNIP.2008.4762003"},{"issue":"1","key":"3819_CR21","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1109\/10.43620","volume":"37","author":"GM Friesen","year":"1990","unstructured":"Friesen GM (1990) A comparison of the noise sensitivity of nine QRS detection algorithms. IEEE Trans Biomed Eng 37(1):85\u201398","journal-title":"IEEE Trans Biomed Eng"},{"issue":"4","key":"3819_CR22","doi-asserted-by":"publisher","first-page":"330","DOI":"10.1109\/10.126605","volume":"39","author":"W Philips","year":"1992","unstructured":"Philips W, De Jonghe G (1992) Data compression of ECG\u2019s by high-degree polynomial approximation. IEEE Trans Biomed Eng 39(4):330\u2013337","journal-title":"IEEE Trans Biomed Eng"},{"key":"3819_CR23","volume-title":"Wireless communications: principles and practice","author":"TS Rappaport","year":"1996","unstructured":"Rappaport TS (1996) Wireless communications: principles and practice, vol 2. Prentice Hall PTR, New Jersey"},{"issue":"4","key":"3819_CR24","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1002\/sec.76","volume":"3","author":"F Sufi","year":"2010","unstructured":"Sufi F, Khalil I, Habib I (2010) Polynomial distance measurement for ECG based biometric authentication. Sec Commun Netw 3(4):303\u2013319","journal-title":"Sec Commun Netw"},{"key":"3819_CR25","unstructured":"Krizhevsky A, Sutskever I, Hinton GE (2012) Imagenet classification with deep convolutional neural networks. In: Advances in neural information processing systems, pp 1097\u20131105"},{"key":"3819_CR26","doi-asserted-by":"crossref","unstructured":"Rathore H, Badarla V, Jha S, Gupta A (2014) Novel approach for security in wireless sensor network using bio-inspirations. In: Proceedings of sixth international conference on communication systems and networks (COMSNETS), pp 1\u20138. IEEE","DOI":"10.1109\/COMSNETS.2014.6734875"},{"key":"3819_CR27","unstructured":"Physionet. https:\/\/physionet.org\/physiobank\/database\/ecgiddb\/ . Accessed 15 July 2017"},{"key":"3819_CR28","unstructured":"Chollet F (2015) Keras: Theano-based deep learning library. Code: https:\/\/github.com\/fchollet . Documentation: http:\/\/keras.io"},{"key":"3819_CR29","unstructured":"The Theano Development (2016) A Python framework for fast computation of mathematical expressions. arXiv preprint arXiv:1605.02688"},{"key":"3819_CR30","doi-asserted-by":"crossref","unstructured":"Xu F et al (2011) IMDGuard: securing implantable medical devices with the external wearable guardian. In: Proceedings of IEEE INFOCOM, pp 1862\u20131870","DOI":"10.1109\/INFCOM.2011.5934987"},{"key":"3819_CR31","doi-asserted-by":"crossref","unstructured":"Chi H et al (2018) e-SAFE: secure, efficient and forensics-enabled access to implantable medical devices. arXiv preprint arXiv:1804.02447","DOI":"10.1109\/CNS.2018.8433213"},{"key":"3819_CR32","unstructured":"Weisman S. Web-connected medical devices are great. Unless. USA Today. Accessed 19 July 2018"},{"key":"3819_CR33","doi-asserted-by":"crossref","unstructured":"Hei X, Du X, Wu J, Hu F (2010) Defending resource depletion attacks on implantable medical devices. In: Proceedings of IEEE GLOBECOM","DOI":"10.1109\/GLOCOM.2010.5685228"},{"issue":"4","key":"3819_CR34","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1145\/2043164.2018438","volume":"41","author":"S Gollakota","year":"2011","unstructured":"Gollakota S, Hassanieh H, Ransford B, Katabi D, Fu K (2011) They can hear your heartbeats: non-invasive security for implantable medical devices. ACM SIGCOMM Comput Commun Rev 41(4):2\u201313","journal-title":"ACM SIGCOMM Comput Commun Rev"},{"key":"3819_CR35","doi-asserted-by":"crossref","unstructured":"Rathore H et al (2018) Multi-layer perceptron model on chip for secure diabetic treatment. IEEE Access","DOI":"10.1109\/ACCESS.2018.2854822"},{"key":"3819_CR36","unstructured":"Shen TW, Tompkins WJ, Hu YH (2002) One-lead ECG for identity verification. In: Proceedings of engineering in medicine and biology, 2002. 24th annual conference and the annual fall meeting of the biomedical engineering society embs\/bmes conference. Proceedings of the second joint, vol 1, pp 62\u201363"},{"key":"3819_CR37","doi-asserted-by":"crossref","unstructured":"Tuzcu V, Nas S (2005) Dynamic time warping as a novel tool in pattern recognition of ECG changes in heart rhythm disturbances. In: 2005 IEEE international conference on systems, man and cybernetics, vol 1, pp 182\u2013186. IEEE","DOI":"10.1109\/ICSMC.2005.1571142"},{"key":"3819_CR38","unstructured":"Raspberry Pi Dramble. https:\/\/www.pidramble.com\/wiki\/benchmarks\/power-consumption . Accessed 8 June 2018"},{"issue":"1","key":"3819_CR39","doi-asserted-by":"publisher","first-page":"015004","DOI":"10.1103\/RevModPhys.89.015004","volume":"89","author":"M Herrero-Collantes","year":"2017","unstructured":"Herrero-Collantes M, Garcia-Escartin JC (2017) Quantum random number generators. Rev Mod Phys 89(1):015004","journal-title":"Rev Mod Phys"},{"issue":"5","key":"3819_CR40","doi-asserted-by":"publisher","first-page":"686","DOI":"10.1109\/TC.2007.70847","volume":"57","author":"DU Lee","year":"2008","unstructured":"Lee DU (2008) Hardware implementation trade-offs of polynomial approximations and interpolations. IEEE Trans Comput 57(5):686\u2013701","journal-title":"IEEE Trans Comput"}],"container-title":["Neural Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-018-3819-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00521-018-3819-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-018-3819-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T19:52:03Z","timestamp":1775245923000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00521-018-3819-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10,13]]},"references-count":40,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2020,5]]}},"alternative-id":["3819"],"URL":"https:\/\/doi.org\/10.1007\/s00521-018-3819-0","relation":{},"ISSN":["0941-0643","1433-3058"],"issn-type":[{"value":"0941-0643","type":"print"},{"value":"1433-3058","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,10,13]]},"assertion":[{"value":"24 August 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 October 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 October 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}