POKs Based Low Energy Authentication Scheme for Implantable Medical Devices

03/27/2018
by   Chenglong Fu, et al.
0

Implantable medical devices (IMDs), including pacemakers, implanted cardiac defibrillators and neurostimulator are medical devices implanted into patients' bodies via surgery and are capable of monitoring patient's conditions and delivering therapy. They often have built-in radio modules to support data reading and parameters reconfiguration according to the commands from external programmers. The lack of a secure authentication mechanism exposes patients to cyber attacks over the air and threatens patients' lives. Physically Obfuscated Keys (POKs) are a special means for storing the secret key inside the integrated circuit. In this paper, we design an effective authentication system for IMDs by utilizing POKs. The dynamic authentication and access control scheme is based on some secure pre-shared keys, which are protected by the POKs. We evaluate the proposed scheme with detailed security analysis and implement it on a prototype testbed to demonstrate its lightweight feature.

READ FULL TEXT
research
11/02/2022

Secure and Efficient Privacy-preserving Authentication Scheme using Cuckoo Filter in Remote Patient Monitoring Network

With the ubiquitous advancement in smart medical devices and systems, th...
research
04/06/2018

e-SAFE: Secure, Efficient and Forensics-Enabled Access to Implantable Medical Devices

To facilitate monitoring and management, modern Implantable Medical Devi...
research
07/19/2020

PUF-RLA: A PUF-based Reliable and Lightweight Authentication Protocol employing Binary String Shuffling

Physically unclonable functions (PUFs) can be employed for device identi...
research
06/13/2023

Cryptanalysis on Secure ECC based Mutual Authentication Protocol for Cloud-Assisted TMIS

The creation of TMIS (Telecare Medical Information System) makes it simp...
research
11/23/2022

Privacy-Preserving Application-to-Application Authentication Using Dynamic Runtime Behaviors

Application authentication is typically performed using some form of sec...
research
03/31/2020

VoltKey: Using Power Line Noise for Zero-Involvement Pairing and Authentication (Demo Abstract)

We present VoltKey, a method that transparently generates secret keys fo...
research
02/28/2021

HW/SW Framework for Improving the Safety of Implantable and Wearable Medical Devices

Implantable and wearable medical devices (IWMDs) are widely used for the...

Please sign up or login with your details

Forgot password? Click here to reset