Abstract
Internet of Medical Things (IoMTs) is fast emerging, thereby fostering rapid advances in the areas of sensing, actuation and connectivity to significantly improve the quality and accessibility of health care for everyone. Implantable medical device (IMD) is an example of such an IoMT-enabled device. IMDs treat the patient’s health and give a mechanism to provide regular remote monitoring to the healthcare providers. However, the current wireless communication channels can curb the security and privacy of these devices by allowing an attacker to interfere with both the data and communication. The privacy and security breaches in IMDs have thereby alarmed both the health providers and government agencies. Ensuring security of these small devices is a vital task to prevent severe health consequences to the bearer. The attacks can range from system to infrastructure levels where both the software and hardware of the IMD are compromised. In the recent years, biometric and cryptographic approaches to authentication, machine learning approaches to anomaly detection and external wearable devices for wireless communication protection have been proposed. However, the existing solutions for wireless medical devices are either heavy for memory constrained devices or require additional devices to be worn. To treat the present situation, there is a requirement to facilitate effective and secure data communication by introducing policies that will incentivize the development of security techniques. This paper proposes a novel electrocardiogram authentication scheme which uses Legendre approximation coupled with multi-layer perceptron model for providing three levels of security for data, network and application levels. The proposed model can reach up to 99.99% testing accuracy in identifying the authorized personnel even with 5 coefficients.






Similar content being viewed by others
Explore related subjects
Discover the latest articles and news from researchers in related subjects, suggested using machine learning.References
Frost and Sullivan, Internet of Medical Things, Forecast to 2021, market report. https://store.frost.com/internet-of-medical-things-forecast-to-2021.html. Accessed 19 June 2018
SelectUSA (2017) https://www.selectusa.gov/medical-technology-industry-united-states. Accessed 11 Jan 2017
Halperin D et al (2008) Pacemakers and implantable cardiac defibrillators: software radio attacks and zero-power defenses. In: IEEE symposium on security and privacy, SP, pp 129–142
Rathore H (2017) A review of security challenges, attacks and resolutions for wireless medical devices. Wirel Commun Mob Comput Conf (IWCMC) 13:1495–1501
Zheng G et al (2014) An ECG-based secret data sharing scheme supporting emergency treatment of implantable medical devices. In: Proceedings of international symposium on wireless personal multimedia communications (WPMC), pp 624–628
Rathore H et al (2018) DTW based authentication for wireless medical device security. In: IEEE 14th international wireless communications and mobile computing conference (IWCMC), pp. 476–481
Hei X, Du X (2011) Biometric-based two-level secure access control for implantable medical devices during emergency. In: Proceedings of IEEE INFOCOM
Rostami M, Juels A, Koushanfar F (2013) Heart-to-heart (H2H): authentication for implanted medical devices. In: Proceedings of ACM SIGSAC conference on computer and communications security, pp 1099–1112
Halperin D, Heydt-Benjamin TS, Ransford B, Clark SS, Defend B, Morgan W, Fu K, Kohno T, Maisel WH (2008)Pacemakers and implantable cardiac defibrillators: software radio attacks and zero-power defenses. In: IEEE symposium on security and privacy, pp 129–142
Rasmussen KB, Castelluccia C, Heydt-Benjamin TS, Capkun S (2009) Proximity-based access control for implantable medical devices. In: Proceedings of 16th ACM conference on computer and communications security, pp 410–419
Kim Yu BJ, Kim H (2012) In-vivo NFC: remote monitoring of implanted medical devices with improved privacy. In: Proceedings of 10th ACM conference on embedded network sensor systems, pp 327–328
Singh K, Muthukkumarasamy V (2007) Authenticated key establishment protocols for a home health care system. In: Proceedings of 3rd international conference on intelligent sensors, sensor networks and information, pp 353–358
Zheng G, Fang G, Shankaran R, Orgun MA, Dutkiewicz E (2014) An ECG-based secret data sharing scheme supporting emergency treatment of implantable medical devices. In: International symposium on IEEE wireless personal multimedia communications (WPMC), pp 624- 628. IEEE
Rieback MR, Crispo B, Tanenbaum AS (2005) RFID guardian: a battery-powered mobile device for RFID privacy management. In: Proceedings of Australasian conference on information security and privacy, pp 184–194
Rathore H, Al-Ali A, Mohamed A, Du X, Guizani M. (2017) DLRT: deep learning approach for reliable diabetic treatment. In: Proceedings of IEEE Globecom
Zhang M, Raghunathan A, Jha NK (2013) MedMon: securing medical devices through wireless monitoring and anomaly detection. IEEE Trans Biomed Circuits Syst 7(6):871–881
Xu F, Qin Z, Tan CC, Wang B, Li Q (2011) IMDGuard: securing implantable medical devices with the external wearable guardian. In: Proceedings of IEEE INFOCOM, pp 1862–1870
Denning T, Fu K, Kohno T (2008) Absence makes the heart grow fonder: new directions for implantable medical device security. In: Proceedings of HotSec
Meste O et al (2005) Time-varying analysis methods and models for the respiratory and cardiac system coupling in graded exercise. IEEE Trans Biomed Eng 52(11):1921–1930
Khalil I, Sufi F. (2008) Legendre polynomials based biometric authentication using QRS complex of ECG. In: Proceedings of international conference on intelligent sensors, sensor networks and information processing ISSNIP, pp 297–302
Friesen GM (1990) A comparison of the noise sensitivity of nine QRS detection algorithms. IEEE Trans Biomed Eng 37(1):85–98
Philips W, De Jonghe G (1992) Data compression of ECG’s by high-degree polynomial approximation. IEEE Trans Biomed Eng 39(4):330–337
Rappaport TS (1996) Wireless communications: principles and practice, vol 2. Prentice Hall PTR, New Jersey
Sufi F, Khalil I, Habib I (2010) Polynomial distance measurement for ECG based biometric authentication. Sec Commun Netw 3(4):303–319
Krizhevsky A, Sutskever I, Hinton GE (2012) Imagenet classification with deep convolutional neural networks. In: Advances in neural information processing systems, pp 1097–1105
Rathore H, Badarla V, Jha S, Gupta A (2014) Novel approach for security in wireless sensor network using bio-inspirations. In: Proceedings of sixth international conference on communication systems and networks (COMSNETS), pp 1–8. IEEE
Physionet. https://physionet.org/physiobank/database/ecgiddb/. Accessed 15 July 2017
Chollet F (2015) Keras: Theano-based deep learning library. Code: https://github.com/fchollet. Documentation: http://keras.io
The Theano Development (2016) A Python framework for fast computation of mathematical expressions. arXiv preprint arXiv:1605.02688
Xu F et al (2011) IMDGuard: securing implantable medical devices with the external wearable guardian. In: Proceedings of IEEE INFOCOM, pp 1862–1870
Chi H et al (2018) e-SAFE: secure, efficient and forensics-enabled access to implantable medical devices. arXiv preprint arXiv:1804.02447
Weisman S. Web-connected medical devices are great. Unless. USA Today. Accessed 19 July 2018
Hei X, Du X, Wu J, Hu F (2010) Defending resource depletion attacks on implantable medical devices. In: Proceedings of IEEE GLOBECOM
Gollakota S, Hassanieh H, Ransford B, Katabi D, Fu K (2011) They can hear your heartbeats: non-invasive security for implantable medical devices. ACM SIGCOMM Comput Commun Rev 41(4):2–13
Rathore H et al (2018) Multi-layer perceptron model on chip for secure diabetic treatment. IEEE Access
Shen TW, Tompkins WJ, Hu YH (2002) One-lead ECG for identity verification. In: Proceedings of engineering in medicine and biology, 2002. 24th annual conference and the annual fall meeting of the biomedical engineering society embs/bmes conference. Proceedings of the second joint, vol 1, pp 62–63
Tuzcu V, Nas S (2005) Dynamic time warping as a novel tool in pattern recognition of ECG changes in heart rhythm disturbances. In: 2005 IEEE international conference on systems, man and cybernetics, vol 1, pp 182–186. IEEE
Raspberry Pi Dramble. https://www.pidramble.com/wiki/benchmarks/power-consumption. Accessed 8 June 2018
Herrero-Collantes M, Garcia-Escartin JC (2017) Quantum random number generators. Rev Mod Phys 89(1):015004
Lee DU (2008) Hardware implementation trade-offs of polynomial approximations and interpolations. IEEE Trans Comput 57(5):686–701
Acknowledgements
This publication was made possible by NPRP Grant #8-408-2-172 from the Qatar National Research Fund (a member of Qatar Foundation). The statements made herein are solely the responsibility of the authors. Authors would like to thank Dr Abhay Samant for his valuable feedback and corrections in the paper.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Rathore, H., Fu, C., Mohamed, A. et al. Multi-layer security scheme for implantable medical devices. Neural Comput & Applic 32, 4347–4360 (2020). https://doi.org/10.1007/s00521-018-3819-0
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00521-018-3819-0