- Letchworth Garden City, Hertfordshire
We are an innovative, robust and fast growing business, whose main focus is to deliver continues improvement to existing products and offer new sol..
- Recruiter: Helmet Integrated Systems / Gentex Corporation
- Cumbernauld, Glasgow
- Grade: 6/7* £26,537 - £37,768*
Work as part of a growing dynamic team on a wide range of technical projects with particular emphasis on experimental validation and testing
- Recruiter: University of Strathclyde
- Hatfield, Hertfordshire
Responsible for updating and writing electrical engineering standards, approved codes of practice and safe systems of work
- Recruiter: Affinity Water
- York, North Yorkshire
Senior electronics engineer to work as part of a team developing an MEG imaging system; working with the engineering team and external contractors.
- Recruiter: York Instruments
- Lostock Junction
- Competitive Salary & Benefits
Whats the opportunity? Manufacturing UK is an integral part of the Operations Directorate whose principal mission is to ensure that MBDAs deliverable commitments are met...
- Recruiter: MBDA
- Great Dunmow, Essex
This High Voltage Engineer will provide design leadership for high voltage cable assemblies up to one megavolt.
- Recruiter: Essex X-Ray & Medical Equipment
- Barrow-In-Furness, Cumbria, England
Team Leader - Flank Arrays Would you like to work in a unique role within the construction of the Astute Class submarines? We currently have a vacancy for a Team Leader - Flank Arrays at our site in Barrow-in-Furness. As a Team Leader - Flank Arrays, you
- Recruiter: BAE Systems
- circa £35,000 per annum + bonus
Develop new test equipment for the pharmaceutical industry. Good opportunities to grow and develop. Successful family-owned and managed business.
- Recruiter: Copley Scientific Ltd
- Shropshire, Telford, England
Bridge Test Facility ManagerWe currently have a vacancy for a Bridge Test Facility Manager at our site in Telford with our Land UK business.As the Bridge Test Facility Manager, you will be part of our Test & Trials team, working closely with the Mili
- Recruiter: BAE Systems
- Birmingham, West Midlands
Our transport technology team in Birmingham is currently growing a highly skilled and customer-focused team to...
- Recruiter: Mott MacDonald
Pacemaker sensor security vulnerability discovered
Researchers have found security vulnerabilities in sensor commonly used in pacemakers
Common sensors found in pacemakers and Bluetooth headsets have major security vulnerabilities according to researchers.
In experiments in simulated human models, an international team of researchers demonstrated that they could forge an erratic heartbeat with radio frequency electromagnetic waves, which could theoretically inhibit needed pacing or induce unnecessary defibrillation shocks.
Implantable defibrillators monitor the heart for irregular beating and, when necessary, administer an electric shock to bring it back into normal rhythm. Pacemakers use electrical pulses to continuously keep the heart in pace.
This is not the first time vulnerabilities have been identified in implantable medical devices, but the findings reveal new security risks in relatively common "analog" sensors – sensors that rely on inputs from the human body or the environment to cue particular actions.
Beyond medical devices, analog sensors are also used in microphones in Bluetooth headsets and computers in web-based phone calls, and in those places, too, the researchers discovered vulnerabilities.
"We found that these analog devices generally trust what they receive from their sensors, and that path is weak and could be exploited," says Denis Foo Kune, University of Michigan (U-M) postdoctoral researcher and visiting scholar in computer science and engineering, who will present the findings May 20 at the IEEE Symposium on Security and Privacy in San Francisco.
Although these medical systems and consumer electronics have security mechanisms, the information the analog sensors receive bypasses their safety layers as devices convert the input from the sensors directly into digital information that they use to make quick decisions.
The researchers emphasize that they know of no case where a hacker has corrupted an implanted cardiac device, and doing so in the real world would be extremely difficult, but with these kinds of sensors employed in a growing number of devices and applications their lack of security is a concern.
"Security is often an arms race with adversaries," says Wenyuan Xu, assistant professor of computer science and engineering at the University of South Carolina. "As researchers, it's our responsibility to always challenge the common practice and find defences for vulnerabilities that could be exploited before unfortunate incidents happen.
“We hope our research findings can help to enhance the security of sensing systems that will emerge for years to come."
In the category of medical devices, the researchers tested cardiac defibrillators and pacemakers in open air to determine which radio waveforms could cause interference.
Then they exposed the medical devices to those waveforms in a both a saline bath and a patient simulator. The experiments suggest that the human body likely acts as a shield, protecting the medical devices to a large degree, the researchers said.
They found that in the saline bath and the patient simulator, a perpetrator would need to be within five centimetres away to cause interference and current guidelines instruct patients to keep potential sources of interference at least 27 centimetres away from their chest.
"People with pacemakers and defibrillators can remain confident in the safety and effectiveness of their implants," says Kevin Fu, U-M associate professor of electrical engineering and computer science.
"Patients already protect themselves from interference by keeping transmitters like phones away from their implants. The problem is that emerging medical sensors worn on the body, rather than implanted, could be more susceptible to this type of interference."
The team proposes solutions to help the sensors ensure that the signals they're receiving are authentic. Software could “ping” the cardiac tissue to determine whether the previous pulse came from the heart or from interference. If the source was not the heart, the software could raise a red flag.
The researchers also found pathways to tamper with consumer electronics. They were able to use specific radio signals to convince the microphone on a phone paired with a Bluetooth headset that a caller was dialling touch-tone selections at an automated banking line. They demonstrated this by changing the call language from English to Spanish.
Foo Kune says the technique could conceivably enable more harmful scenarios such as fraudulent money transfers. In another experiment, they cancelled out speech on one side of a web-based phone call and replaced it with a song (Weezer's "Island in the Sun").
"The microphone was receiving the song even though the room was silent," Foo Kune says.
"This type of interference can be prevented with shields and filters like those seen today in military-grade equipment," says Yongdae Kim, professor of electrical engineering at the Korea Advanced Institute of Science and Technology.
"Safety critical systems, such as smart grids and automated vehicles, rely more and more on sensing technology for their accurate operation. Malicious input signals with improved antenna and power may cause serious safety problems."
"We visit Barcelona, one of the smartest cities in the world, to find out what makes it so special. What does it look like and what is the future?"
- HS2 to cost 'five times as much as TGV', study finds
- Turning sunlight into heat doubles solar cell efficiency
- Apple investigating electric vehicle charging stations
- Robots threatening more jobs than immigrants, Labour MP says
- Nasa inflates Bigelow space station module
- Healthcare sensors to prevent falls and sunburn