Analysis on Vulnerability of Home Healthcare Medical Devices and Development of Protection Profile Based on Common Criteria Version 3.1

Author(s):  
Changwhan Lee ◽  
Kwangwoo Lee ◽  
Seungjoo Kim ◽  
Dongho Won
PLoS ONE ◽  
2018 ◽  
Vol 13 (12) ◽  
pp. e0208723
Author(s):  
Pablo Reyes ◽  
Dominique Larée ◽  
Alejandro Weinstein ◽  
Álvaro Jara

Author(s):  
Keith S. Karn ◽  
Andrew Golaszewski

Insurance companies, healthcare providers, and patients are realizing we can treat many medical issues at home and avoid expensive and often inconvenient visits to the doctor’s office or hospital. As a result, many medical devices are now in the hands of untrained patients and caregivers, creating a growing market of consumer medical (or “medsumer”) products. This medsumer product market is exploding, along with the increased spending on home healthcare. This paper explores the benefits and value of looking at medical product development through the lens of this medsumer trend by applying typically consumer-oriented tools and techniques to the development of medical devices. We recommend specific consumer-driven techniques and tools we have used recently in developing medical products. The techniques include a greater emphasis on up-front user research, technological augmentation to ethnography, interdisciplinary design approach, integrated physical & digital prototyping, and more iterative user feedback.


2014 ◽  
Vol 32 (7) ◽  
pp. 402-408 ◽  
Author(s):  
Lisa K. Simone ◽  
JoAnn Brumbaugh ◽  
Catherine Ricketts

2017 ◽  
Vol 11 (21) ◽  
Author(s):  
Henry Hermel Andrade Caicedo ◽  
Juan Camilo Vanegas Serna ◽  
Geiner Giovanny Barbosa Casanova

Heart failure is a common condition in which the heart is unable to keep up with its workload. Therefore, oxygen and nutrients are no longer able to reach the cardiac cells, which worsens the situation of the whole heart. Treating an HF patient is challenging due to the co-morbidities and the numerous medications associated with the treatment. Medical dosage through titration of ACE inhibitors (ACEIs), Angiotensin receptor blockers (ARBs), beta-blockers and other drugs is a recommended procedure to reduce morbidity and mortality in HF patients. However, the procedure is performed under medical supervision at the hospital, lasting from one to four weeks. We propose a telemonitoring system to help clinicians to follow the patient through the Medication Titration procedure at home. We used commercial medical devices, certified on international communication standards to assure interoperability. Independently of the producer or brand, they can operate properly in the designed architecture. So far, we are able to connect two medical devices, blood pressure meter and weight scale, to a data hub. Then the data is rerouted to the cloud, where information is stored in a database. We use a commercial application to visualize the data through a friendly graphical interface.


2013 ◽  
Vol 10 (6) ◽  
pp. 609-620
Author(s):  
Byung-Hee Hwang ◽  
Ho-Sung Jeon ◽  
Young-Sam Bae ◽  
Dong-Hoon Lee

1997 ◽  
Author(s):  
Kris Britton ◽  
Jack Walsh ◽  
Wayne Jansen ◽  
Thomas Kaygiannis ◽  
Jandria Alexander

2019 ◽  
Vol 26 (1) ◽  
pp. 134-145
Author(s):  
Andrey N. Petukhov ◽  
Paul L. Pilyugin

«Common criteria» (ISO 15408) is a universally recognized and broadly applicable approach to information security solutions management and evaluation. «Common criteria» leans on developing a shared conceptual basis for key security solution modules including protection profiles and security targets. Conceptual basis development implies defining the following elements: security objectives and assumptions (for the environment and the object), threats and security policies, as well as functional and assurance requirements. The specifics of SDN (software defined network) security solutions is largely driven by fundamental architectural principles of SDN technology itself − primarily by the separation of control and data flows, − and by conditions imposed by Open Flow protocol application. However, proactive (threats and policies), passive (objectives and assumptions) and reactive (requirements) aspects of security management remain highly relevant for this type of security solutions. This paper discusses the Common Criteria application specifics for assessing the SDN security and practical MTUCI (Moscow Technical University of Communications and Informatics) experience in the development of the protection profile. A new class of network attacks on SDN switches and controllers can involve either data or control components. In addition to traditional vulnerabilities, centralization of management functions paves way for new security threats by isolating controller activity and administrative message exchange. Therefore, identifying and analyzing threats, policies and requirements specific to SDN control module security becomes an emerging priority.


Sign in / Sign up

Export Citation Format

Share Document