Abstract
For Implantable Medical Devices (IMD), we have discussed in the previous chapters the technical challenges related to biocompatible materials, flexible fabrication processes, system-on-chip design, low-power operation, and packaging. Increasingly advanced computing capabilities found in IMDs and networking technologies can further broaden the applications and enhance the functions of these devices. However, they can only make a real impact on healthcare when a high level of security is incorporated in these devices. This chapter discusses the relationship between different components of an IMD security system under intrinsic resource constraints. A qualitative overview of the strategies commonly used to provide a secure implant system is provided and the chapter covers the design considerations of lightweight and no-hardware-intensive algorithms for implants.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Abbreviations
- ACL:
-
Control access list
- AOA:
-
Angle of arrival
- ASIC:
-
Application specific integrated circuit
- BCC:
-
Body-coupled communication
- CA:
-
Cellar automata
- CMOS:
-
Complementary metal-oxide semiconductor
- DTOA:
-
Differential time of arrival
- ECC:
-
Error correcting codes
- EEG:
-
Electroencephalogram
- EMA:
-
European Medicines Agency
- ESDS:
-
ECG-based secret data sharing
- FDA:
-
Food and Drug Administration
- GE:
-
Gate equivalents
- IID:
-
Independent-identically distributed
- IMD:
-
Implantable device
- LFSR:
-
Linear feedback shift register
- LPN:
-
Learning parity in the presence of noise
- MAC:
-
Message authentication code
- MICS:
-
Medical Implant Communication System
- NFC:
-
Near-field communication
- NFSR:
-
Nonlinear feedback shift register
- OTP:
-
One-time pads
- PKI:
-
Public-key infrastructure
- PRG:
-
Pseudorandom generator
- RAM:
-
Random access memory
- RF:
-
Radiofrequency
- RFID:
-
Radiofrequency identification
- RN:
-
Random number
- RSSI:
-
Received signal strength indicator
- RV:
-
Random variable
- SHA:
-
Secure hash algorithm
- TOA:
-
Time-of-arrival
- USRP:
-
Universal software radio peripheral
- WMTS:
-
Wireless Medical Telemetry Services
References
S. Hosseini-Khayat, A lightweight security protocol for ultra-low power ASIC implementation for wireless medical devices, in IEEE 5th International Conference on Medical Information & Communication Technology (ISMICT), pp. 6–9 (2011)
C. Camara et al., Security and privacy issues in implantable medical devices: a comprehensive survey. J. Biomed. Inform. 55, 272–289 (2015)
X. Hei et al., PIPAC: patient infusion pattern based access control scheme for wireless insulin pump system, in IEEE Proceedings INFOCOM, pp. 3030–3038 (2013)
M. Zhang et al., Trustworthiness of medical devices and body area networks. Proc. IEEE 102(8) (2014)
H. Martin et al., An estimator for the ASIC footprint area of lightweight cryptographic algorithms. IEEE Trans. Ind. Inf. 10(2) (2014)
Q. Yang et al., An on-chip security guard based on zero-power authentication for implantable medical devices, in IEEE 57th International Midwest Symposium on Circuits and Systems (MWSCAS), pp. 531–534 (2014)
K. Daniluk E.N. Szynkiewicz, Energy-efficient security in implantable medical devices, in IEEE Proceedings of the Federal Conference on Computer Science and Systems (FedCSIS), pp. 773–778 (2012)
M. Rushanan et al., SoK: security and privacy in implantable medical devices and body area networks, in IEEE 14th Symposium on Security and Privacy, pp. 524–539 (2014)
D. Halperin et al., Pacemakers and implantable cardiac defibrillators: software radio attacks and zero-power defences, in IEEE Symposium on Security and Privacy, pp. 129–142 (2008)
C. Li et al., Hijacking an insulin pump: security attacks and defences for a diabetes therapy system, in IEEE 13th International Conference on e-Health Networking Applications and Software (Healthcom), pp. 150–156 (2011)
M. Rostami et al., Balancing security and utility in medical devices?, in ACM/EDAC/IEEE 50th Design Automation Conference (DAC), pp. 1–6 (2013)
X. Hei, X. Du, Biometric-based two-level secure access control for implantable medical devices during emergencies, in IEEE Proceedings on INFOCOM, pp. 346–350 (2011)
Z. Ankarali et al., A comparative review on the wireless implantable medical devices privacy and security, in EAI 4th International Conference on Wireless Mobile Communication and Healthcare (Mobihealth), pp. 246–249 (2014)
G. Zheng et al., Securing wireless medical implants using an ECG-based secret data sharing scheme, in IEEE International Symposium on Communications and Information Technologies (ISCIT), 2014
G. Zheng et al., Encryption for implantable medical devices using modified one-time pads. IEEE Open Access J. 3, 825–836 (2015)
T. Denning et al., Absence makes the heart grow fonder: new directions for implantable medical devices security, in Proceedings 3rd Conference on Hot Topics in Security, no. 5, USENIX Association, 2008
S. Gollakota et al., IMD Shield: Securing Implantable Medical Devices (Poster) (USENIX Association, 2011)
G. Zheng et al., A non-key based security scheme supporting emergency treatment of wireless implants, in IEEE ICC Symposium on Communication and Information Systems Security, 2014
F. Xu et al., IMDGuard: securing implantable medical devices with the external wearable guardian, in IEEE Proceedings on INFOCOM, pp. 1862–1870 (2011)
M. Zhang et al., MedMon: securing medical devices through wireless monitoring and anomaly detection. IEEE Trans. Biomed. Circuits Syst. 7(6), 2013
M. O’Neill, M.J.B. Robshaw, Low-cost digital signature architecture suitable for radio frequency identification tags. IET Comput. Digit. Tech. 4(1), 14–26 (2010)
A. Juels, Minimalist cryptography for low-cost RFID tags, in Proceedings International Conference Security in Communication Networks CSN 2004, Amalfi, Italy
J.H. Oh et al., A light-weight security protocol for RFID system, in 7th IEEE International Conference on Computer and Information Technology, 2007
M. Burmester, J. Munilla, Lightweight RFID authentication with forward and backward security, in ACM Transactions on Information and Systems Security, May 2011
D. Coppersmith et al., The shrinking generator, Proceedings Advances in Cryptology (LNCS, Springer, Berlin, 1993) pp. 22–39
N.J. Hopper, M. Blum, Secure human identification protocols, in Proceedings 7th International Conference on the Theory and Application of Cryptology and Information Security: advances in Cryptology, ed. by C. Boyd, pp. 52–66 (2001)
H. Gilbert et al., HB#: increasing the security and efficiency of HB+, Lecture notes in Computer Science, vol 4965 (Springer, Berlin, 2008), pp. 361–378
M. S. Mamum, A. Miyaji, A fully-secure RFID authentication protocol from exact LPN assumption, in Proceedings IEEE International Conference on Trust, Security, and Privacy in Computing and Communications, 2013
A. Jain et al., Commitments and efficient zero-knowledge proofs from learning parity with noise. ASIACRYPT 2012 Lect. Notes Comput. Sci. 7658, 663–680 (2012)
A. Shamir, SQUASH—a new MAC with provable security properties for highly constrained devices such as RFID tags, in Proceedings Fast Software Encryption, pp. 144–157 (2008)
S. Wolfram, A New Kind of Science (Wolfram Media Inc., Champaign, IL, 2002)
S. Wolfram, Cryptography with cellular automata. Lecture Notes in Computer Science, vol 218 (Springer, Berlin, 1986), pp. 429–432
C.K. Koc, A.M. Apohan, Inversion of cellular automata iterations. IEEE Proc. Comput. Digital Tech. 144(5), 279–284 (1997)
P. Ping et al., Image encryption based on non-affine and balanced cellular automata. Sig. Process. 105, 419–429 (2015)
S.R. Blackburn et al., Comments on—theory and applications of cellular automata in cryptography. IEEE Trans. Comput. 46(5), 637–639 (1997)
M. Scaban et al., Collective behaviour of rules for cellular automata-based stream ciphers, in Proceedings Congress Evolutionary Computation, Vancouver, 2006
M. Seredynski et al., Reversible cellular automata based encryption, Lecture Notes in Computer Science, vol 3222, pp. 411–418 (2004)
G. Alvarex et al., A secure scheme to share secret color images. Comput. Phys. Commun. 173(1–2) (2005)
R.J. Chen, J.L. Lai, Image security system using recursive cellular automata substitution. Pattern Recognit. 40(5), 1621–1631 (2007)
E. Pasalic, C. Carlet, Algebraic attacks and decomposition of Boolean functions, in Proceedings EUROCRYPT, Lecture Notes in Computer Science, vol 3027, pp. 474–491, 2204
J.C. Castro et al., The strict avalanche criterion randomness test. Math. Comput. Simul. 68, 1–7 (2005)
T. Siegenthaler, Correlation-immunity of nonlinear combining functions for cryptographic applications, in IEEE Transactions on Information Theory, 31, 1985
N. Courtois, W. Meier, Algebraic attacks on stream ciphers with linear feedback, Advances in Cryptology, EUROCRYPT 2003, Lecture Notes in Computer Science, vol 2656 (Springer, Berlin, 2003), pp. 346–359
N.T. Courtois, Higher order correlation attacks, XL algorithm and cryptanalysis of toyocrypt. Inf. Secur. Cryptol. Proc. ICISC 2002 Lect. Notes Comput. Sci. 2587, 182–199 (2002)
L.R. Simpson et al., LILI keystream generator. Lect. Notes Comput. Sci. 2012, 248–261 (2001)
N. Courtois, J. Pieprzyk, Cryptanalysis of block ciphers with overdefined systems of equations. ASIACRYPT 2002 Lect. Notes Comput. Sci. 2501, 267–287 (2002)
C. Berbain et al., Cryptanalysis of Grain, in Proceedings FSE’06, Lecture Notes in Computer Science, vol 4047 (2006)
M. Hell et al., Grain—a stream cipher for constrained environments. ECRYPT 2005 Int. J. Wireless Mobile Comput. 2(1), 86–93 (2007)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG, part of Springer Nature
About this chapter
Cite this chapter
Gil, B., Ip, H., Yang, GZ. (2018). Wireless Datapaths and Security. In: Yang, GZ. (eds) Implantable Sensors and Systems. Springer, Cham. https://doi.org/10.1007/978-3-319-69748-2_8
Download citation
DOI: https://doi.org/10.1007/978-3-319-69748-2_8
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-69747-5
Online ISBN: 978-3-319-69748-2
eBook Packages: Computer ScienceComputer Science (R0)