Measurement and analysis of the error characteristics of an in-building wireless network
Conference proceedings on Applications, technologies, architectures, and protocols for computer communications
Digital Communication Receivers: Synchronization, Channel Estimation, and Signal Processing
Digital Communication Receivers: Synchronization, Channel Estimation, and Signal Processing
Wireless Communications
Fundamentals of wireless communication
Fundamentals of wireless communication
Security and Privacy for Implantable Medical Devices
IEEE Pervasive Computing
Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses
SP '08 Proceedings of the 2008 IEEE Symposium on Security and Privacy
Absence makes the heart grow fonder: new directions for implantable medical device security
HOTSEC'08 Proceedings of the 3rd conference on Hot topics in security
Jamming for good: a fresh approach to authentic communication in WSNs
Proceedings of the second ACM conference on Wireless network security
Inside risks: Reducing risks of implantable medical devices
Communications of the ACM - One Laptop Per Child: Vision vs. Reality
Transmission power control in body area sensor networks for healthcare monitoring
IEEE Journal on Selected Areas in Communications - Special issue on body area networking: Technology and applications
FC'07/USEC'07 Proceedings of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security
Randomized differential DSSS: jamming-resistant wireless broadcast communication
INFOCOM'10 Proceedings of the 29th conference on Information communications
Jamming-resistant broadcast communication without shared keys
SSYM'09 Proceedings of the 18th conference on USENIX security symposium
Achieving single channel, full duplex wireless communication
Proceedings of the sixteenth annual international conference on Mobile computing and networking
Clearing the RF smog: making 802.11n robust to cross-technology interference
Proceedings of the ACM SIGCOMM 2011 conference
Secure in-band wireless pairing
SEC'11 Proceedings of the 20th USENIX conference on Security
RFID guardian: a battery-powered mobile device for RFID privacy management
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
Implantable medical device communication security: pattern vs. signal encryption
HealthSec'11 Proceedings of the 2nd USENIX conference on Health security and privacy
Block cipher based security for severely resource-constrained implantable medical devices
Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies
Design challenges for secure implantable medical devices
Proceedings of the 49th Annual Design Automation Conference
Neighborhood watch: security and privacy analysis of automatic meter reading systems
Proceedings of the 2012 ACM conference on Computer and communications security
In-vivo NFC: remote monitoring of implanted medical devices with improved privacy
Proceedings of the 10th ACM Conference on Embedded Network Sensor Systems
Practical receipt authentication for branchless banking
Proceedings of the 3rd ACM Symposium on Computing for Development
Counter-jamming using mixed mechanical and software interference cancellation
Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks
Defend your home!: jamming unsolicited messages in the smart home
Proceedings of the 2nd ACM workshop on Hot topics on wireless network security and privacy
EnGarde: protecting the mobile phone from malicious NFC interactions
Proceeding of the 11th annual international conference on Mobile systems, applications, and services
Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM
Dhwani: secure peer-to-peer acoustic NFC
Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM
Balancing security and utility in medical devices?
Proceedings of the 50th Annual Design Automation Conference
Towards trustworthy medical devices and body area networks
Proceedings of the 50th Annual Design Automation Conference
Redundancy offset narrow spectrum: countermeasure for signal-cancellation based jamming
Proceedings of the 11th ACM international symposium on Mobility management and wireless access
Heart-to-heart (H2H): authentication for implanted medical devices
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Securing implantable cardiac medical devices: use of radio frequency energy harvesting
Proceedings of the 3rd international workshop on Trustworthy embedded devices
Fast tag searching protocol for large-scale RFID systems
IEEE/ACM Transactions on Networking (TON)
NSDI'14 Proceedings of the 11th USENIX Conference on Networked Systems Design and Implementation
Hi-index | 0.00 |
Wireless communication has become an intrinsic part of modern implantable medical devices (IMDs). Recent work, however, has demonstrated that wireless connectivity can be exploited to compromise the confidentiality of IMDs' transmitted data or to send unauthorized commands to IMDs---even commands that cause the device to deliver an electric shock to the patient. The key challenge in addressing these attacks stems from the difficulty of modifying or replacing already-implanted IMDs. Thus, in this paper, we explore the feasibility of protecting an implantable device from such attacks without modifying the device itself. We present a physical-layer solution that delegates the security of an IMD to a personal base station called the shield. The shield uses a novel radio design that can act as a jammer-cum-receiver. This design allows it to jam the IMD's messages, preventing others from decoding them while being able to decode them itself. It also allows the shield to jam unauthorized commands---even those that try to alter the shield's own transmissions. We implement our design in a software radio and evaluate it with commercial IMDs. We find that it effectively provides confidentiality for private data and protects the IMD from unauthorized commands.