{"id":"https://openalex.org/W2901842696","doi":"https://doi.org/10.1109/secdev.2018.00037","title":"Securing Wireless Infusion Pumps","display_name":"Securing Wireless Infusion Pumps","publication_year":2018,"publication_date":"2018-09-01","ids":{"openalex":"https://openalex.org/W2901842696","doi":"https://doi.org/10.1109/secdev.2018.00037","mag":"2901842696"},"language":"en","primary_location":{"id":"doi:10.1109/secdev.2018.00037","is_oa":false,"landing_page_url":"https://doi.org/10.1109/secdev.2018.00037","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE Cybersecurity Development (SecDev)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5064161528","display_name":"Andrea Arbelaez","orcid":null},"institutions":[{"id":"https://openalex.org/I1321296531","display_name":"National Institute of Standards and Technology","ror":"https://ror.org/05xpvk416","country_code":"US","type":"funder","lineage":["https://openalex.org/I1321296531","https://openalex.org/I1343035065"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Andrea Arbelaez","raw_affiliation_strings":["National Institute of Standards and Technology, Gaithersburg, MD"],"affiliations":[{"raw_affiliation_string":"National Institute of Standards and Technology, Gaithersburg, MD","institution_ids":["https://openalex.org/I1321296531"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059415041","display_name":"Sallie Edwards","orcid":null},"institutions":[{"id":"https://openalex.org/I44896327","display_name":"Mitre (United States)","ror":"https://ror.org/03ks2a131","country_code":"US","type":"company","lineage":["https://openalex.org/I44896327"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sallie Edwards","raw_affiliation_strings":["The MITRE Corporation, Rockville, MD"],"affiliations":[{"raw_affiliation_string":"The MITRE Corporation, Rockville, MD","institution_ids":["https://openalex.org/I44896327"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088696311","display_name":"Kevin Littlefield","orcid":null},"institutions":[{"id":"https://openalex.org/I44896327","display_name":"Mitre (United States)","ror":"https://ror.org/03ks2a131","country_code":"US","type":"company","lineage":["https://openalex.org/I44896327"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kevin Littlefield","raw_affiliation_strings":["The MITRE Corporation, Rockville, MD"],"affiliations":[{"raw_affiliation_string":"The MITRE Corporation, Rockville, MD","institution_ids":["https://openalex.org/I44896327"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5062356387","display_name":"Sue Wang","orcid":"https://orcid.org/0000-0003-4587-429X"},"institutions":[{"id":"https://openalex.org/I44896327","display_name":"Mitre (United States)","ror":"https://ror.org/03ks2a131","country_code":"US","type":"company","lineage":["https://openalex.org/I44896327"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sue Wang","raw_affiliation_strings":["The MITRE Corporation, Rockville, MD"],"affiliations":[{"raw_affiliation_string":"The MITRE Corporation, Rockville, MD","institution_ids":["https://openalex.org/I44896327"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5022507362","display_name":"Kangmin Zheng","orcid":"https://orcid.org/0009-0008-0857-5921"},"institutions":[{"id":"https://openalex.org/I44896327","display_name":"Mitre (United States)","ror":"https://ror.org/03ks2a131","country_code":"US","type":"company","lineage":["https://openalex.org/I44896327"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kangmin Zheng","raw_affiliation_strings":["The MITRE Corporation, Rockville, MD"],"affiliations":[{"raw_affiliation_string":"The MITRE Corporation, Rockville, MD","institution_ids":["https://openalex.org/I44896327"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5064161528"],"corresponding_institution_ids":["https://openalex.org/I1321296531"],"apc_list":null,"apc_paid":null,"fwci":0.515,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.68452296,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"141","last_page":"141"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12222","display_name":"IoT-based Smart Home Systems","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12222","display_name":"IoT-based Smart Home Systems","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9797000288963318,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9779000282287598,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.563334584236145},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.5271346569061279},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.18604636192321777}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.563334584236145},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.5271346569061279},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.18604636192321777}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/secdev.2018.00037","is_oa":false,"landing_page_url":"https://doi.org/10.1109/secdev.2018.00037","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE Cybersecurity Development (SecDev)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/17","display_name":"Partnerships for the goals","score":0.4699999988079071}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052","https://openalex.org/W4402327032","https://openalex.org/W2382290278"],"abstract_inverted_index":{"The":[0,201,229,382],"National":[1,11],"Cybersecurity":[2,102,239],"Center":[3],"of":[4,9,13,126,130,162,175,222,225,282,449],"Excellence":[5],"(NCCoE),":[6],"a":[7,19,150,160,198,204,213,220,249,260,280,288,385,389,443],"part":[8],"the":[10,42,71,93,118,123,127,139,143,184,226,237,245,277,285,337,341,355],"Institute":[12],"Standards":[14],"and":[15,27,48,133,172,192,194,215,256,258,311,316,332,345,350,360,374,404,407,414,421,441,451,457,467],"Technology":[16],"(NIST),":[17],"is":[18],"collaborative":[20,199],"hub":[21],"where":[22],"industry":[23,209],"organizations,":[24],"government":[25],"agencies,":[26],"academic":[28],"institutions":[29],"work":[30],"together":[31],"to":[32,52,83,97,154,168,208,274,303,318,340,424],"address":[33],"businesses'":[34],"most":[35,72],"pressing":[36],"cybersecurity":[37,56,272,405,426,437,455,465],"challenges.":[38],"Through":[39],"this":[40,91,182,283],"collaboration,":[41],"NCCoE":[43,185,230,286,383],"applied":[44,216,384],"standards,":[45,352],"best":[46],"practices,":[47],"commercially":[49,270],"available":[50,271,290,464],"technologies":[51,273],"develop":[53,440],"an":[54,114,254],"example":[55],"solution":[57],"for":[58,377],"securing":[59],"wireless":[60,109,144,313,416],"infusion":[61,81,110,119,145,189,314,417],"pumps":[62,69,82],"in":[63,76,108,197,391],"healthcare":[64,88,151,176,432],"delivery":[65,89],"organizations":[66],"(HDOs).":[67],"Infusion":[68,300],"are":[70],"network-connected":[73],"medical":[74,379],"devices":[75],"HDOs":[77,266,305],"[1].":[78],"While":[79],"connecting":[80],"clinical":[84],"systems":[85],"can":[86,267],"improve":[87,319],"processes,":[90],"expands":[92],"threat":[94,330],"landscape,":[95],"leading":[96],"operational":[98],"or":[99],"safety":[100],"risks.":[101,396],"researchers":[103],"have":[104],"identified":[105,395],"system":[106],"vulnerabilities":[107],"pumps,":[111,315,418],"highlighting":[112],"ways":[113],"attacker":[115],"may":[116,148,412],"compromise":[117],"pump":[120,146,190],"ecosystem":[121,124,147,232],"(i.e.":[122],"consisting":[125,224],"pump,":[128],"inclusive":[129],"drug":[131,170],"libraries":[132],"other":[134],"data,":[135],"as":[136,138,158,354,364],"well":[137],"network).":[140],"Tampering":[141],"with":[142,187,309],"expose":[149],"provider's":[152],"enterprise":[153],"serious":[155],"risks,":[156],"such":[157,353,363],"(1)":[159,434],"breach":[161],"protected":[163],"health":[164],"records,":[165],"(2)":[166,439],"changes":[167],"prescribed":[169],"dosage,":[171],"(3)":[173,452],"disruption":[174],"services":[177],"by":[178,235,460],"malicious":[179],"actors.":[180],"For":[181],"project,":[183,284],"worked":[186],"several":[188],"manufacturers":[191],"technology":[193,409],"service":[195],"providers":[196],"setting.":[200],"project":[202,227,246],"included":[203],"risk":[205,233,372],"assessment,":[206],"mapped":[207],"standard":[210],"controls,":[211],"constructed":[212,248],"lab,":[214],"concepts":[217],"discussed":[218],"within":[219],"community":[221],"interest":[223],"participants.":[228],"analyzed":[231],"factors":[234],"leveraging":[236],"NIST":[238,293,322,356,397,428],"Framework":[240,359],"[2].":[241],"With":[242],"assessment":[243],"results,":[244],"team":[247],"laboratory":[250],"environment":[251],"that":[252,263],"modeled":[253],"HDO":[255],"developed":[257],"implemented":[259],"reference":[261],"architecture":[262],"exemplifies":[264],"how":[265,317,401],"use":[268],"standards-based,":[269],"better":[275,435],"protect":[276],"ecosystem.":[278],"As":[279],"result":[281],"produced":[287],"publicly":[289,463],"practical":[291],"guide,":[292],"Special":[294],"Publication":[295],"(SP)":[296],"18008,":[297],"Securing":[298],"Wireless":[299],"Pumps":[301],"[3],":[302],"inform":[304],"on":[306,327,371],"risks":[307],"associated":[308],"deploying":[310],"operating":[312],"cybersecurity.":[320],"This":[321],"SP":[323,398,429],"provides":[324],"detailed":[325],"guidance":[326],"asset":[328],"management,":[329],"protection,":[331],"vulnerability":[333],"mitigation.":[334],"It":[335],"maps":[336],"ecosystem's":[338],"characteristics":[339],"Health":[342],"Insurance":[343],"Portability":[344],"Accountability":[346],"Act":[347],"Security":[348],"Rule":[349],"established":[351],"Risk":[357],"Management":[358],"industry-established":[361],"standards":[362,456],"IEC":[365],"80000-1":[366],"(International":[367],"Electrotechnical":[368],"Commission":[369],"documentation":[370],"mapping":[373],"controls":[375],"application":[376],"networked":[378],"devices)":[380],"[4].":[381],"risk-based":[386],"approach,":[387],"creating":[388],"\u201cdefense":[390],"depth\u201d":[392],"solution,":[393],"noting":[394],"1800-8":[399,430],"shows":[400],"biomedical,":[402],"network,":[403],"engineers":[406],"information":[408],"(IT)":[410],"professionals":[411],"configure":[413],"deploy":[415],"servers,":[419],"workstations,":[420],"network":[422],"components":[423],"reduce":[425],"risk.":[427],"helps":[431],"providers:":[433],"understand":[436],"risk;":[438],"execute":[442],"defense-in-depth":[444],"strategy;":[445],"avoiding":[446],"single":[447],"points":[448],"failure;":[450],"implement":[453],"current":[454],"reasonable":[458],"practices":[459],"using":[461],"current,":[462],"tools":[466],"practices.":[468]},"counts_by_year":[{"year":2023,"cited_by_count":2},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
