A Secure Proxy-based Access Control Scheme for Implantable Medical Devices

03/21/2018
by   Longfei Wu, et al.
0

With the rapid development of health equipments, increasingly more patients have installed the implantable medical devices (IMD) in their bodies for diagnostic, monitoring, and therapeutic purposes. IMDs are extremely limited in computation power and battery capacity. Meanwhile, IMDs have to communicate with an external programmer device (i.e., IMD programmer) through the wireless channel, which put them under the risk of unauthorized access and malicious wireless attacks. In this paper, we propose a proxy-based fine-grained access control scheme for IMDs, which can prolong the IMD's lifetime by delegating the access control computations to the proxy device (e.g., smartphone). In our scheme, the proxy communicates with the IMD programmer through an audio cable, which is resistant to a number of wireless attacks. Additionally, we use the ciphertext-policy attribute-based encryption (CP-ABE) to enforce fine-grained access control. The proposed scheme is implemented on real emulator devices and evaluated through experimental tests. The experiments show that the proposed scheme is lightweight and effective.

READ FULL TEXT

page 3

page 5

page 7

research
09/10/2020

Multi-Authority Ciphertext-Policy Attribute Based Encryption With Accountability

Attribute-based encryption (ABE) is a promising tool for implementing fi...
research
02/21/2021

Content Confidentiality in Named Data Networking

In this paper we present the design of name based access control scheme ...
research
05/03/2022

ATDD: Fine-Grained Assured Time-Sensitive Data Deletion Scheme in Cloud Storage

With the rapid development of general cloud services, more and more indi...
research
07/21/2021

HUAP: Practical Attribute-based Access Control Supporting Hidden Updatable Access Policies for Resource-Constrained Devices

Attribute-based encryption (ABE) is a promising cryptographic mechanism ...
research
04/06/2018

e-SAFE: Secure, Efficient and Forensics-Enabled Access to Implantable Medical Devices

To facilitate monitoring and management, modern Implantable Medical Devi...
research
11/08/2018

vFAC: Fine-Grained Access Control with Versatility for Cloud Storage

In recent years, cloud storage technology has been widely used in many f...
research
06/25/2019

Proxy Certificates: The Missing Link in the Web's Chain of Trust

The ability to quickly revoke a compromised key is critical to the secur...

Please sign up or login with your details

Forgot password? Click here to reset