{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T21:15:01Z","timestamp":1771017301836,"version":"3.50.1"},"reference-count":48,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,10]]},"DOI":"10.1109\/healthcom.2013.6720675","type":"proceedings-article","created":{"date-parts":[[2014,1,31]],"date-time":"2014-01-31T17:36:56Z","timestamp":1391189816000},"page":"243-248","source":"Crossref","is-referenced-by-count":29,"title":["Security threats against the transmission chain of a medical health monitoring system"],"prefix":"10.1109","author":[{"given":"Juha","family":"Partala","sequence":"first","affiliation":[]},{"given":"Niina","family":"Keraneny","sequence":"additional","affiliation":[]},{"given":"Mariella","family":"Sarestoniemi","sequence":"additional","affiliation":[]},{"given":"Matti","family":"Hamalainen","sequence":"additional","affiliation":[]},{"given":"Jari","family":"Iinatti","sequence":"additional","affiliation":[]},{"given":"Timo","family":"Jamsa","sequence":"additional","affiliation":[]},{"given":"Jarmo","family":"Reponen","sequence":"additional","affiliation":[]},{"given":"Tapio","family":"Seppanen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2010.5416350"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.2230219"},{"key":"17","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1109\/ICSNC.2006.66","article-title":"Security issues in wireless sensor networks","author":"zia","year":"2006","journal-title":"Systems and Networks Communications 2006 ICSNC '06 International Conference on"},{"key":"36","year":"2011","journal-title":"Digital Imaging and Communications in Medicine (DICOM) - Part 1 Introduction and Overview"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/ISABEL.2008.4712577"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1109\/TITB.2009.2031316"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2009.2032660"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1109\/IEMBS.2011.6090225"},{"key":"16","doi-asserted-by":"crossref","first-page":"55","DOI":"10.3390\/s120100055","article-title":"Security issues in healthcare applications using wireless medical sensor networks: A survey","volume":"12","author":"kumar","year":"2011","journal-title":"SENSORS"},{"key":"39","year":"2011","journal-title":"Continua Design Guidelines Version 2011"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1002\/mds.20633"},{"key":"14","first-page":"307","article-title":"System architecture of a wireless body area sensor network for ubiquitous health monitoring","volume":"1","author":"otto","year":"2006","journal-title":"Journal of Mobile Multimedia"},{"key":"37","article-title":"The relationship between cen 13606, hl7, and openehr","author":"schloeffel","year":"2006","journal-title":"Health Informatics Conference"},{"key":"11","first-page":"21","article-title":"A body sensor network to monitor parkinsonian symptoms: Extracting features on the nodes","author":"patel","year":"2008","journal-title":"5th International Workshop on Wearable Micro and Nanosystems for Personalised Health pHealth2008"},{"key":"38","first-page":"1","year":"2010","journal-title":"ISO\/IEC\/IEEE Health Informatics-Personal Health Device Communication-Part 20601 Application Profile-Optimized Exchange Protocol"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/TITB.2011.2107916"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-010-0260-8"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2004.1368895"},{"key":"43","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.16"},{"key":"42","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.2005.1437055"},{"key":"41","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2006.1637931"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2006.315852"},{"key":"48","doi-asserted-by":"publisher","DOI":"10.1145\/1330107.1330152"},{"key":"45","doi-asserted-by":"publisher","DOI":"10.1145\/1023646.1023654"},{"key":"44","first-page":"1","year":"2011","journal-title":"IEEE Standard for Local and Metropolitan Area Networks-Part 15 4 Low-Rate Wireless Personal Area Networks (LR-WPANs)"},{"key":"47","first-page":"45","article-title":"Review of the bluetooth security architecture","volume":"11","author":"singel?ee","year":"2006","journal-title":"Information Security Bulletin"},{"key":"46","doi-asserted-by":"crossref","first-page":"176","DOI":"10.1007\/3-540-45353-9_14","article-title":"Security weaknesses in bluetooth","author":"jakobsson","year":"2001","journal-title":"Proceedings of the 2001 Conference on Topics in Cryptology The Cryptographers Track at RSA"},{"key":"22","first-page":"1","year":"2012","journal-title":"IEEE Standard for Local and Metropolitan Area Networks-Part 15 6 Wireless Body Area Networks"},{"key":"23","year":"0","journal-title":"Medical Privacy National Standards of Protect the Privacy of Personal-health-information"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.8"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.861394"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1016\/S1570-8705(03)00008-8"},{"key":"27","first-page":"251","article-title":"The sybil attack","author":"douceur","year":"2002","journal-title":"Revised Papers from the First International Workshop on Peer-to-Peer Systems"},{"key":"28","doi-asserted-by":"crossref","first-page":"172","DOI":"10.1007\/10720107_24","article-title":"The resurrecting duckling: Security issues for ad-hoc wireless networks","author":"stajano","year":"2000","journal-title":"Proceedings of the 7th International Workshop on Security Protocols"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1080\/15501320600642718"},{"key":"3","article-title":"Hacking medical devices for fun and insulin: Breaking the human scada system","author":"radcliffe","year":"2011","journal-title":"Black Hat Conference Presentation Slides 2011"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.31"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-8167.2007.00805.x"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/TBME.2006.886670"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/TBME.2007.895114"},{"key":"30","author":"doraswamy","year":"1999","journal-title":"Ipsec The New Security Standard for the Internet Intranets and Virtual Private Networks"},{"key":"6","author":"wood","year":"2006","journal-title":"ALARM-NET Wireless sensor networks for assisted-living and residential monitoring"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2004.18"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1109\/TITB.2010.2047865"},{"key":"4","year":"1995","journal-title":"Directive 95\/46\/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2004.1341273"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/IEMBS.2009.5332557"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/TBME.2012.2204990"}],"event":{"name":"2013 IEEE 15th International Conference on e-Health Networking, Applications and Services (Healthcom 2013)","location":"Lisbon","start":{"date-parts":[[2013,10,9]]},"end":{"date-parts":[[2013,10,12]]}},"container-title":["2013 IEEE 15th International Conference on e-Health Networking, Applications and Services (Healthcom 2013)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6713381\/6720623\/06720675.pdf?arnumber=6720675","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,7]],"date-time":"2019-08-07T01:54:03Z","timestamp":1565142843000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6720675\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,10]]},"references-count":48,"URL":"https:\/\/doi.org\/10.1109\/healthcom.2013.6720675","relation":{},"subject":[],"published":{"date-parts":[[2013,10]]}}}