Survey and benchmark of block ciphers for wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
Optimizing AES for embedded devices and wireless sensor networks
Proceedings of the 4th International Conference on Testbeds and research infrastructures for the development of networks & communities
Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses
SP '08 Proceedings of the 2008 IEEE Symposium on Security and Privacy
IEEE Transactions on Information Technology in Biomedicine - Special section on new and emerging technologies in bioinformatics and bioengineering
They can hear your heartbeats: non-invasive security for implantable medical devices
Proceedings of the ACM SIGCOMM 2011 conference
SP 800-38A 2001 edition. Recommendation for Block Cipher Modes of Operation: Methods and Techniques
SP 800-38A 2001 edition. Recommendation for Block Cipher Modes of Operation: Methods and Techniques
Design challenges for secure implantable medical devices
Proceedings of the 49th Annual Design Automation Conference
Securing implantable cardiac medical devices: use of radio frequency energy harvesting
Proceedings of the 3rd international workshop on Trustworthy embedded devices
A system architecture, processor, and communication protocol for secure implants
ACM Transactions on Architecture and Code Optimization (TACO)
Hi-index | 0.00 |
A large proportion of today's modern implantable medical devices (IMDs) comprises a wireless interface that enables the IMD to connect to another implanted device or a base station situated outside the body. Due to the various benefits, future IMD generations will certainly increase this number even more, making wireless connectivity for IMDs a matter of course. Since the data originating from biomedical applications usually contain sensitive information, security and privacy are major issues in IMD communications. The key challenge in providing adequate security for IMDs results from the severe size, power, and memory constraints that are inherent to most of the devices. In this paper, we discuss security and privacy design goals specific to resource-constrained IMDs. We then present a block cipher based security protocol featuring two modes: a stream mode aiming at minimizing the radio duty cycle while maintaining basic security and a session mode providing strong security for highly sensitive information and a role-based user authorization scheme. The protocol is presented using the Artificial Accommodation System (AAS) as an example. This novel micro-mechatronic implant is characterized by a high communication need and severe resource constraints.