A Microprocessor-Based Implantable Telemetry System
Computer - Special issue on computer-based medical systems
Basic methods of cryptography
A low-cost memory architecture with NAND XIP for mobile embedded systems
Proceedings of the 1st IEEE/ACM/IFIP international conference on Hardware/software codesign and system synthesis
Computer
Proceedings of the 2005 international conference on Compilers, architectures and synthesis for embedded systems
Criticality Aware Access Control Model for Pervasive Applications
PERCOM '06 Proceedings of the Fourth Annual IEEE International Conference on Pervasive Computing and Communications
Security and Privacy for Implantable Medical Devices
IEEE Pervasive Computing
Profiling of symmetric-encryption algorithms for a novel biomedical-implant architecture
Proceedings of the 5th conference on Computing frontiers
Security protocols, properties, and their monitoring
Proceedings of the fourth international workshop on Software engineering for secure systems
Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses
SP '08 Proceedings of the 2008 IEEE Symposium on Security and Privacy
Absence makes the heart grow fonder: new directions for implantable medical device security
HOTSEC'08 Proceedings of the 3rd conference on Hot topics in security
Proximity-based access control for implantable medical devices
Proceedings of the 16th ACM conference on Computer and communications security
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
The price of security in wireless sensor networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Protocols for Authentication and Key Establishment
Protocols for Authentication and Key Establishment
Block cipher based security for severely resource-constrained implantable medical devices
Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies
RFID guardian: a battery-powered mobile device for RFID privacy management
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
An amulet for trustworthy wearable mHealth
Proceedings of the Twelfth Workshop on Mobile Computing Systems & Applications
A wirelessly-powered platform for sensing and computation
UbiComp'06 Proceedings of the 8th international conference on Ubiquitous Computing
An implantable telemetry platform system for in vivo monitoring of physiological parameters
IEEE Transactions on Information Technology in Biomedicine
Distance Hijacking Attacks on Distance Bounding Protocols
SP '12 Proceedings of the 2012 IEEE Symposium on Security and Privacy
RFID security and privacy: a research survey
IEEE Journal on Selected Areas in Communications
Adaptive entity-identifier generation for IMD emergency access
Proceedings of the First Workshop on Cryptography and Security in Computing Systems
Hi-index | 0.00 |
Secure and energy-efficient communication between Implantable Medical Devices (IMDs) and authorized external users is attracting increasing attention these days. However, there currently exists no systematic approach to the problem, while solutions from neighboring fields, such as wireless sensor networks, are not directly transferable due to the peculiarities of the IMD domain. This work describes an original, efficient solution for secure IMD communication. A new implant system architecture is proposed, where security and main-implant functionality are made completely decoupled by running the tasks onto two separate cores. Wireless communication goes through a custom security ASIP, called SISC (Smart-Implant Security Core), which runs an energy-efficient security protocol. The security core is powered by RF-harvested energy until it performs external-reader authentication, providing an elegant defense mechanism against battery Denial-of-Service (DoS) and other, more common attacks. The system has been evaluated based on a realistic case study involving an artificial pancreas implant. When synthesized for a UMC 90nm CMOS ASIC technology, our system architecture achieves defense against unauthorized accesses having zero energy cost, running entity authentication through harvesting only 7.45μJ of RF energy from the requesting entity. In all other successfully authenticated accesses, our architecture achieves secure data exchange without affecting the performance of the main IMD functionality, adding less than 1‰ (1.3mJ) to the daily energy consumption of a typical implant. Compared to a singe-core, secure reference IMD, which would still be more vulnerable to some types of attacks, our secure system on chip (SoC) achieves high security levels at 56% energy savings and at an area overhead of less than 15%.