[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/2018436.2018438acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
research-article
Free access

They can hear your heartbeats: non-invasive security for implantable medical devices

Published: 15 August 2011 Publication History

Abstract

Wireless communication has become an intrinsic part of modern implantable medical devices (IMDs). Recent work, however, has demonstrated that wireless connectivity can be exploited to compromise the confidentiality of IMDs' transmitted data or to send unauthorized commands to IMDs---even commands that cause the device to deliver an electric shock to the patient. The key challenge in addressing these attacks stems from the difficulty of modifying or replacing already-implanted IMDs. Thus, in this paper, we explore the feasibility of protecting an implantable device from such attacks without modifying the device itself. We present a physical-layer solution that delegates the security of an IMD to a personal base station called the shield. The shield uses a novel radio design that can act as a jammer-cum-receiver. This design allows it to jam the IMD's messages, preventing others from decoding them while being able to decode them itself. It also allows the shield to jam unauthorized commands---even those that try to alter the shield's own transmissions. We implement our design in a software radio and evaluate it with commercial IMDs. We find that it effectively provides confidentiality for private data and protects the IMD from unauthorized commands.

Supplementary Material

MP4 File (sigcomm_1_1.mp4)

References

[1]
J. Åkerberg. State-of-the-art radiosonde telemetry. In Proc. Symp. Integrated Observing and Assimilation Systems for Atmosphere, Oceans, and Land Surface. American Meterological Society, 2004.
[2]
S. Cherukuri, K. K. Venkatasubramanian, and S. K. S. Gupta. Biosec: A biometric based approach for securing communication in wireless networks of biosensors implanted in the human body. In International Conference on Parallel Processing Workshops, 2003.
[3]
J. Choi, M. Jain, K. Srinivasan, P. Levis, and S. Katti. Achieving single channel, full duplex wireless communication. In Proc. ACM MobiCom, 2010.
[4]
I. Csiszar and J. Korner. Broadcast channels with confidential messages. IEEE Trans. Inf. Theory, 24(3):339--348, 1978.
[5]
T. Denning, K. Fu, and T. Kohno. Absence makes the heart grow fonder: New directions for implantable medical device security. In Proc. USENIX Workshop on Hot Topics in Security (HotSec), 2008.
[6]
D. Eckhardt and P. Steenkiste. Measurement and analysis of the error characteristics of an in-building wireless network. In Proc. ACM SIGCOMM, 1996.
[7]
Ettus Inc. Universal Software Radio Peripheral. http://ettus.com/.
[8]
European Telecommunications Standard Institute. ETSI EN 301 839--1 V1.3.1, 2009.
[9]
C. Falcon. Inside implantable devices. Medical Design Tech., 2004.
[10]
Federal Communications Commission. FCC ID number search. http://www.fcc.gov/searchtools.html.
[11]
Federal Communications Commission. MICS Medical Implant Communication Services, FCC 47CFR95.601--95.673 Subpart E/I Rules for MedRadio Services.
[12]
K. Fu. Inside risks: Reducing the risks of implantable medical devices: A prescription to improve security and privacy of pervasive health care. Communications of the ACM, 52(6):25--27, 2009.
[13]
K. Fu. Trustworthy medical device software. In Public Health Effectiveness of the FDA 510(k) Clearance Process: Measuring Postmarket Performance and Other Select Topics: Workshop Report. IOM (Institute of Medicine), National Academies Press, 2011.
[14]
GNU Radio. http://gnuradio.org/.
[15]
A. Goldsmith. Wireless Communications. Cambridge University Press, 2005.
[16]
S. Gollakota, F. Adib, D. Katabi, and S. Seshan. Clearing the rf smog: Making 802.11n robust to cross-technology interference. In ACM SIGCOMM, 2011.
[17]
S. Gollakota, N. Ahmed, N. Zeldovich, and D. Katabi. Secure in-band wireless pairing. In Usenix security symposium, 2011.
[18]
S. Gollakota and D. Katabi. Physical layer security made fast and channel-independent. In Proc. IEEE INFOCOM, 2011.
[19]
D. Halperin, T. S. Heydt-Benjamin, K. Fu, T. Kohno, and W. H. Maisel. Security and privacy for implantable medical devices. IEEE Pervasive Computing, 7(1), 2008.
[20]
D. Halperin, T. S. Heydt-Benjamin, B. Ransford, S. S. Clark, B. Defend, W. Morgan, K. Fu, T. Kohno, and W. H. Maisel. Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses. In Proc. IEEE Symposium on Security and Privacy, 2008.
[21]
Industry Canada. Radio Standards Specification RSS-243: Medical Devices Operating in the 401--406 MHz Frequency Band. Spectrum Management and Telecommunications, 2010.
[22]
International Telecommunications Union. ITU-R Recommendation RS.1346: Sharing between the meteorological aids service and medical implant communication systems (MICS) operating in the mobile service in the frequency band 401--406 MHz, 1998.
[23]
Jackson Labs. Fury GPSDO. http://www.jackson-labs.com/.
[24]
W. C. Jakes. Microwave Mobile Communications. Wiley, 1974.
[25]
M. Koplow, A. Chen, D. Steingart, P.Wright, and J. Evans. Thick film thermoelectric energy harvesting systems for biomedical applications. In Proc. Symp. Medical Devices and Biosensors, 2008.
[26]
C. Kuo, J. Walker, and A. Perrig. Low-cost manufacturing, usability and security: An analysis of bluetooth simple pairing and wi-fi protected setup. In Usable Security Workshop, 2007.
[27]
Y. Liu, P. Ning, H. Dai, and A. Liu. Randomized differential DSSS: Jamming-resistant wireless broadcast communication. In Proc. IEEE INFOCOM, 2010.
[28]
J. Lopatka. Adaptive generating of the jamming signal. In Proc. IEEE Military Communications Conference (MILCOM), 1995.
[29]
W. H. Maisel. Safety issues involving medical devices: Implications of recent implantable cardioverter-defibrillator malfunctions. Journal of the American Medical Association, 2005.
[30]
W. H. Maisel and T. Kohno. Improving the security and privacy of implantable medical devices. New England Journal of Medicine, 362(13):1164--1166, 2010.
[31]
I. Martinovic, P. Pichota, and J. Schmitt. Jamming for good: A fresh approach to authentic communication in WSNs. In Proc. ACM Conf. on Wireless Network Security (WiSec), 2009.
[32]
Medtronic's Paradigm Veo wireless insulin pump helps prevent hypoglycemia. MedGadget--Internet Journal for emerging medical technologies, 2009.
[33]
Medtronic Inc. CareLink Programmer. http://www.medtronic.com/for-healthcare-professionals/productstherapies/cardiac-rhythm/patient-management-carelink/medtroniccarelink-programmer/index.htm.
[34]
Medtronic Inc. Concerto II CRT-D digital implantable cardioverter defibrillator with cardiac resynchronization therapy. http://www.medtronic.com/for-healthcare-professionals/productstherapies/cardiac-rhythm/cardiac-resynchronization-therapydevices/historical-crt-devices/index.htm.
[35]
Medtronic Inc. Virtuoso DR/VR implantable cardioverter defibrillator systems. http://www.medtronic.com/your-health/sudden-cardiacarrest/device/our-implantable-defibrillators/virtuoso/index.htm.
[36]
H. Meyr, M. Moeneclaey, and S. A. Fechtel. Digital Communication Receivers: Synchronization, Channel Estimation, and Signal Processing. Wiley, 1998.
[37]
D. Panescu. Wireless communication systems for implantable medical devices. IEEE Eng. in Medicine and Biology Mag., 2008.
[38]
PCTest Engineering Labs, Inc. Certificate of compliance, fcc part 95 certification, test report number: 95.220719375.lf5, 2002.
[39]
PCTest Engineering Labs, Inc. Certificate of compliance, fcc part 95 and en 301 839--2, test report number: 0703090168.med, 2007.
[40]
C. Pöpper, M. Strasser, and S. Capkun. Jamming-resistant broadcast communication without shared keys. In USENIX Security Sym., 2009.
[41]
B. Radunovic, D. Gunawardena, P. Key, A. Proutiere, N. Singh, H. V. Balan, and G. Dejean. Rethinking indoor wireless: Low power, low frequency, full-duplex. Technical report, Microsoft Research, 2009.
[42]
M. Rieback, B. Crispo, and A. Tanenbaum. RFID Guardian: A battery-powered mobile device for RFID privacy management. In Proc. Australasian Conf. on Information Security and Privacy, 2005.
[43]
D. Sagan. Rf integrated circuits for medical applications: Meeting the challenge of ultra low power communication. Zarlink Semiconductor. http://stf.ucsd.edu/presentations.
[44]
N. Santhapuri, R. R. Choudhury, J. Manweiler, S. Nelakuduti, S. Sen, and K. Munagala. Message in message mim: A case for reordering transmissions in wireless networks. In ACM HotNets-VII, 2008.
[45]
K. Sayrafian-Pour, W. Yang, J. Hagedorn, J. Terrill, K. Yazdandoost, and K. Hamaguchi. Channel models for medical implant communication. Inter. Journal of Wireless Info. Networks, 2010.
[46]
S. Schechter. Security that is meant to be skin deep: Using ultraviolet micropigmentation to store emergency-access keys for implantable medical devices. In USENIX Workshop HealthSec, 2010.
[47]
M. Scheffler, E. Hirt, and A. Caduff. Wrist-wearable medical devices: Technologies and applications. Medical Device Technology, 2003.
[48]
C. E. Shannon. Communication theory of secrecy systems. Bell System Technical Journal, 28(4):656--715, 1949.
[49]
V. Shnayder, B. Chen, K. Lorincz, T. R. F. Fulford-Jones, and M. Welsh. Sensor networks for medical care. Technical Report TR-08-05, Harvard University, 2005.
[50]
M. J. Siavoshani, U. Pulleti, E. Atsan, I. Safaka, C. Fragoulia, K. Argyraki, and S. Diggavi. Exchanging secrets without using cryptography. arXiv:1105.4991v1, 2011.
[51]
D. Tse and P. Vishwanath. Fundamentals of Wireless Communications. Cambridge University Press, 2005.
[52]
A. Wyner. The wire-tap channel. Bell Sys. Technical Journal, 1975.
[53]
S. Xiao, A. Dhamdhere, V. Sivaraman, and A. Burdett. Transmission power control in body area sensor networks for healthcare monitoring. IEEE Journal on Selected Areas in Comm., 2009.
[54]
F. Xu, Z. Qin, C. C. Tan, B. Wang, and Q. Li. IMDGuard: Securing implantable medical devices with the external wearable guardian. In Proc. IEEE INFOCOM, 2011.
[55]
Zephyr Inc. BioHarness BT. http://www.zephyr-technology.com.
[56]
C. Zhan, W. B. Baine, A. Sedrakyan, and S. Claudia. Cardiac device implantation in the US from 1997 through 2004: A population-based analysis. Journal of General Internal Medicine, 2007.

Cited By

View all
  • (2024)Implantable Medical Device SecurityCryptography10.3390/cryptography80400538:4(53)Online publication date: 15-Nov-2024
  • (2024)The Internet of Bio-Nano Things with Insulin-Glucose, Security and Research Challenges: A SurveyACM Computing Surveys10.1145/3703448Online publication date: 5-Dec-2024
  • (2024)OOBKey: Key Exchange with Implantable Medical Devices Using Out-Of-Band ChannelsProceedings of the 19th International Conference on Availability, Reliability and Security10.1145/3664476.3670876(1-13)Online publication date: 30-Jul-2024
  • Show More Cited By

Index Terms

  1. They can hear your heartbeats: non-invasive security for implantable medical devices

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      SIGCOMM '11: Proceedings of the ACM SIGCOMM 2011 conference
      August 2011
      502 pages
      ISBN:9781450307970
      DOI:10.1145/2018436
      • cover image ACM SIGCOMM Computer Communication Review
        ACM SIGCOMM Computer Communication Review  Volume 41, Issue 4
        SIGCOMM '11
        August 2011
        480 pages
        ISSN:0146-4833
        DOI:10.1145/2043164
        Issue’s Table of Contents
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 15 August 2011

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. full-duplex
      2. implanted medical devices
      3. wireless

      Qualifiers

      • Research-article

      Conference

      SIGCOMM '11
      Sponsor:
      SIGCOMM '11: ACM SIGCOMM 2011 Conference
      August 15 - 19, 2011
      Ontario, Toronto, Canada

      Acceptance Rates

      SIGCOMM '11 Paper Acceptance Rate 32 of 223 submissions, 14%;
      Overall Acceptance Rate 462 of 3,389 submissions, 14%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)309
      • Downloads (Last 6 weeks)35
      Reflects downloads up to 19 Dec 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Implantable Medical Device SecurityCryptography10.3390/cryptography80400538:4(53)Online publication date: 15-Nov-2024
      • (2024)The Internet of Bio-Nano Things with Insulin-Glucose, Security and Research Challenges: A SurveyACM Computing Surveys10.1145/3703448Online publication date: 5-Dec-2024
      • (2024)OOBKey: Key Exchange with Implantable Medical Devices Using Out-Of-Band ChannelsProceedings of the 19th International Conference on Availability, Reliability and Security10.1145/3664476.3670876(1-13)Online publication date: 30-Jul-2024
      • (2024)Wireless Battery-free and Fully Implantable Organ InterfacesChemical Reviews10.1021/acs.chemrev.3c00425124:5(2205-2280)Online publication date: 21-Feb-2024
      • (2024)Guarding the Beats by Defending Resource Depletion Attacks on Implantable Cardioverter DefibrillatorsProceedings of the Tenth International Conference on Mathematics and Computing10.1007/978-981-97-2069-9_17(231-243)Online publication date: 30-Jun-2024
      • (2023)Beyond Smart Homes: An In-Depth Analysis of Smart Aging Care System SecurityACM Computing Surveys10.1145/361022556:2(1-35)Online publication date: 21-Jul-2023
      • (2023)Unmasking the Dominant Threat of Data Manipulation Attack on Implantable Cardioverter Defibrillators2023 20th Annual International Conference on Privacy, Security and Trust (PST)10.1109/PST58708.2023.10320186(1-7)Online publication date: 21-Aug-2023
      • (2023)Variable Window and Deadline-Aware Sensor Attack Detector for Automotive CPS2023 IEEE 26th International Symposium on Real-Time Distributed Computing (ISORC)10.1109/ISORC58943.2023.00018(54-63)Online publication date: May-2023
      • (2022)Towards Design and Development of Security Assessment Framework for Internet of Medical ThingsApplied Sciences10.3390/app1216814812:16(8148)Online publication date: 15-Aug-2022
      • (2022)Cybersicherheit von Gehirn-Computer-SchnittstellenCybersecurity of brain–computer interfacesInternational Cybersecurity Law Review10.1365/s43439-022-00046-x3:1(191-243)Online publication date: 17-Mar-2022
      • Show More Cited By

      View Options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Login options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media