They can hear your heartbeats: non-invasive security for implantable medical devices

@article{Gollakota2011TheyCH,
  title={They can hear your heartbeats: non-invasive security for implantable medical devices},
  author={Shyamnath Gollakota and Haitham Hassanieh and Benjamin Ransford and Dina Katabi and Kevin Fu},
  journal={Proceedings of the ACM SIGCOMM 2011 conference},
  year={2011}
}
Wireless communication has become an intrinsic part of modern implantable medical devices (IMDs). Recent work, however, has demonstrated that wireless connectivity can be exploited to compromise the confidentiality of IMDs' transmitted data or to send unauthorized commands to IMDs---even commands that cause the device to deliver an electric shock to the patient. The key challenge in addressing these attacks stems from the difficulty of modifying or replacing already-implanted IMDs. Thus, in… 
Implantable Medical Devices : Device security and emergency access
TLDR
A novel seizure-detection algorithm that may be used by IMDs for the treatment of epilepsy is discussed and how such an IMD could benefit from wireless data exchange is described, based on a heterogeneous system-on-chip architecture and a lightweight security protocol.
OpSecure: A Secure Unidirectional Optical Channel for Implantable Medical Devices
  • A. Mosenia, N. Jha
  • Computer Science
    IEEE Transactions on Multi-Scale Computing Systems
  • 2018
TLDR
OpSecure enables an intrinsically user-perceptible unidirectional data transmission, suitable for physically-secure communication with minimal size and energy overheads, and is designed and implemented with a low-power wakeup protocol that is resilient against remote battery-draining attacks.
Security Analysis Of An Implantable Cardioverter Defibrillator
TLDR
R reverse-engineered part of the wireless communication protocol between an implantable cardioverter defibrillator (ICD) and a commercial device programmer, and discovered some of the key aspects of this communication protocol.
A non-key based security scheme supporting emergency treatment of wireless implants
TLDR
This paper presents a non-key based security scheme for the emergency treatment of IMDs, named the BodyDouble, which employs an external authentication proxy embedded in a gateway to authenticate the identity of a programmer.
Energy-Aware Key Exchange for Securing Implantable Medical Devices
TLDR
An energy-aware key exchange protocol for securing IMDs that utilizes synchronous interpulse intervals (IPIs) as the source of a secret key and demonstrates that it is difficult for adversaries to guess the keys established using the proposed approach.
A survey on physiological-signal-based security for medical devices
TLDR
This paper surveys some of the proposed countermeasures in the field of medical device security, with a special focus on those that use patient’s physiological signals for key establishment or authentication between the devices and investigates how to use physiological-signal-based protocols in cryptography.
Physical layer security for wireless implantable medical devices
  • Z. E. Ankaralı, A. Demir, R. Gitlin
  • Computer Science
    2015 IEEE 20th International Workshop on Computer Aided Modelling and Design of Communication Links and Networks (CAMAD)
  • 2015
TLDR
This paper presents a physical layer (PHY) authentication technique for IMDs that does not use existing methods of cryptology and provides advantages in terms of decreasing processing complexity of IMDs and enhances overall communications performance.
Ideas and Challenges for Securing Wireless Implantable Medical Devices: A Review
TLDR
Various schemes that aim to conserve the underlying resources of an IMD and also counter battery denial of service attacks from different perspectives are analyzed.
On the (in)security of the latest generation implantable cardiac defibrillators and how to secure them
TLDR
This paper fully reverse-engineer the proprietary communication protocol between a device programmer and the latest generation of a widely used Implantable Cardioverter Defibrillator (ICD) which communicate over a long-range RF channel (from two to five meters).
Sequential Encryption for Multiple Implantable Medical Devices
TLDR
This work proposes a sequential and secure encrypted communication scheme for patients with multiple IMDs that relieves the IMDs from the need for the encryption in addition to a recovery rate of 100% for the proposed architecture.
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 71 REFERENCES
Security and Privacy for Implantable Medical Devices
TLDR
The latest IMDs support delivery of telemetry for remote monitoring over long-range, high-bandwidth wireless links, and emerging devices will communicate with other interoperating IMDs.
Security That Is Meant to Be Skin Deep: Using Ultraviolet Micropigmentation to Store Emergency-Access Keys for Implantable Medical Devices
TLDR
It is proposed that access keys be written into patients’ skin using ultraviolet-ink micropigmentation (invisible tattoos), which gives the greatest control to reluctant patients and guarantees a minimum level of key entropy and can be augmented with error correcting codes.
Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses
TLDR
This paper is the first in the community to use general-purpose software radios to analyze and attack previously unknown radio communications protocols, and introduces three new zero-power defenses based on RF power harvesting.
IMDGuard: Securing implantable medical devices with the external wearable guardian
TLDR
IMDGuard is introduced, a comprehensive security scheme for heart-related IMDs to fulfill the requirement to remain operable in an emergency when appropriate security credentials may be unavailable and incorporates two techniques tailored to provide desirable protections for IMDs.
Absence Makes the Heart Grow Fonder: New Directions for Implantable Medical Device Security
TLDR
A class of new, fail-open defensive techniques for implantable medical devices that attempt to strike a balance between safety in the common case and security under adversarial conditions for wireless implantableMedical Alert bracelets are proposed.
Biosec: a biometric based approach for securing communication in wireless networks of biosensors implanted in the human body
TLDR
This paper proposes an approach wherein, biometrics derived from the body are used for securing the keying material, which obviates the need for expensive computation and avoids unnecessary communication making this approach novel compared to existing approaches.
Secure In-Band Wireless Pairing
TLDR
The main innovation is a new key exchange message constructed in a manner that ensures an adversary can neither hide the fact that a message was transmitted, nor alter its payload without being detected, which translates into the pairing devices detecting either invalid pairing messages or an unacceptable increase in the number of such messages.
Jamming for good: a fresh approach to authentic communication in WSNs
TLDR
This work demonstrates how multipath propagation, a broadcast medium, and frequency jamming can be used as valuable security primitives and justifies the feasibility of such a security design and provides details on implementing it within a realistic wireless sensor network.
Clearing the RF smog: making 802.11n robust to cross-technology interference
TLDR
TIMO is presented, a MIMO design that enables 802.11n to communicate in the presence of interference from baby monitors, cordless phones, and microwave ovens, transforming scenarios with a complete loss of connectivity to operational networks.
Transmission Power Control in Body Area Sensor Networks for Healthcare Monitoring
TLDR
This paper presents extensive empirical evidence that the wireless link quality can change rapidly in body area networks, and a fixed transmit power results in either wasted energy or low reliability, and proposes a class of schemes feasible for practical implementation that adapt transmit power in real-time based on feedback information from the receiver.
...
1
2
3
4
5
...