IMDfence: Architecting a Secure Protocol for Implantable Medical Devices
- URL: http://arxiv.org/abs/2002.09546v4
- Date: Thu, 13 Aug 2020 09:34:22 GMT
- Title: IMDfence: Architecting a Secure Protocol for Implantable Medical Devices
- Authors: Muhammad Ali Siddiqi, Christian Doerr, Christos Strydis
- Abstract summary: We propose IMDfence, a security protocol for implantable medical devices (IMDs)
IMDfence provides availability, non-repudiation, access control, entity authentication, remote monitoring and system scalability.
We find that IMDfence achieves the above security requirements at a mere less than 7% increase in total IMD energy consumption.
- Score: 8.01833277608166
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Over the past decade, focus on the security and privacy aspects of
implantable medical devices (IMDs) has intensified, driven by the multitude of
cybersecurity vulnerabilities found in various existing devices. However, due
to their strict computational, energy and physical constraints, conventional
security protocols are not directly applicable to IMDs. Custom-tailored schemes
have been proposed instead which, however, fail to cover the full spectrum of
security features that modern IMDs and their ecosystems so critically require.
In this paper we propose IMDfence, a security protocol for IMD ecosystems that
provides a comprehensive yet practical security portfolio, which includes
availability, non-repudiation, access control, entity authentication, remote
monitoring and system scalability. The protocol also allows emergency access
that results in the graceful degradation of offered services without
compromising security and patient safety. The performance of the security
protocol as well as its feasibility and impact on modern IMDs are extensively
analyzed and evaluated. We find that IMDfence achieves the above security
requirements at a mere less than 7% increase in total IMD energy consumption,
and less than 14 ms and 9 kB increase in system delay and memory footprint,
respectively.
Related papers
- Defining and Evaluating Physical Safety for Large Language Models [62.4971588282174]
Large Language Models (LLMs) are increasingly used to control robotic systems such as drones.
Their risks of causing physical threats and harm in real-world applications remain unexplored.
We classify the physical safety risks of drones into four categories: (1) human-targeted threats, (2) object-targeted threats, (3) infrastructure attacks, and (4) regulatory violations.
arXiv Detail & Related papers (2024-11-04T17:41:25Z) - A Security Assessment tool for Quantum Threat Analysis [34.94301200620856]
The rapid advancement of quantum computing poses a significant threat to many current security algorithms used for secure communication, digital authentication, and information encryption.
A sufficiently powerful quantum computer could potentially exploit vulnerabilities in these algorithms, rendering data in insecure transit.
This work developed a quantum assessment tool for organizations, providing tailored recommendations for transitioning their security protocols into a post-quantum world.
arXiv Detail & Related papers (2024-07-18T13:58:34Z) - Adaptive Lightweight Security for Performance Efficiency in Critical Healthcare Monitoring [1.1874952582465603]
The Internet of Things (IoT) with its diverse technologies has become an integral component of future healthcare systems.
The evolving healthcare paradigm requires adaptive security procedures and technologies that can adapt to the varying resource constraints of IoT devices.
This article brings forth the unique healthcare monitoring requirements and studies the existing encryption-based security approaches to provide the necessary security.
arXiv Detail & Related papers (2024-06-06T06:55:16Z) - Adaptive Security in 6G for Sustainable Healthcare [1.4747234049753455]
6G will fulfill the requirements of future digital healthcare systems through emerging decentralized computing and secure communications technologies.
Digital healthcare solutions employ numerous low-power and resource-constrained connected things, such as the Internet of Medical Things (IoMT)
arXiv Detail & Related papers (2024-03-02T05:48:52Z) - A Survey and Comparative Analysis of Security Properties of CAN Authentication Protocols [92.81385447582882]
The Controller Area Network (CAN) bus leaves in-vehicle communications inherently non-secure.
This paper reviews and compares the 15 most prominent authentication protocols for the CAN bus.
We evaluate protocols based on essential operational criteria that contribute to ease of implementation.
arXiv Detail & Related papers (2024-01-19T14:52:04Z) - A Novel Zero-Trust Machine Learning Green Architecture for Healthcare IoT Cybersecurity: Review, Analysis, and Implementation [0.0]
The integration of Internet of Things (IoT) devices in healthcare applications has revolutionized patient care, monitoring, and data management.
However, the rapid involvement of these devices brings information security concerns that pose critical threats to patient privacy and the integrity of healthcare data.
This paper introduces a novel machine learning (ML) based architecture explicitly designed to address and mitigate security vulnerabilities in IoT devices within healthcare applications.
arXiv Detail & Related papers (2024-01-14T21:01:21Z) - Classification of cyber attacks on IoT and ubiquitous computing devices [49.1574468325115]
This paper provides a classification of IoT malware.
Major targets and used exploits for attacks are identified and referred to the specific malware.
The majority of current IoT attacks continue to be of comparably low effort and level of sophistication and could be mitigated by existing technical measures.
arXiv Detail & Related papers (2023-12-01T16:10:43Z) - CyMed: A Framework for Testing Cybersecurity of Connected Medical
Devices [0.18416014644193066]
Connected Medical Devices (CMDs) have a large impact on patients as they allow them to lead a more normal life.
There are many safety regulations which must be adhered to prior to a CMD entering the market.
While many detailed safety regulations exist, there are a fundamental lack of cybersecurity frameworks applicable to CMDs.
This paper describes a framework, CyMed, to be used by vendors and ens-users, which contains concrete measures to improve the resilience of CMDs against cyber attack.
arXiv Detail & Related papers (2023-10-05T15:05:16Z) - Practical quantum secure direct communication with squeezed states [55.41644538483948]
We report the first table-top experimental demonstration of a CV-QSDC system and assess its security.
This realization paves the way into future threat-less quantum metropolitan networks, compatible with coexisting advanced wavelength division multiplexing (WDM) systems.
arXiv Detail & Related papers (2023-06-25T19:23:42Z) - Runtime Safety Assurance Using Reinforcement Learning [37.61747231296097]
This paper aims to design a meta-controller capable of identifying unsafe situations with high accuracy.
We frame the design of RTSA with the Markov decision process (MDP) and use reinforcement learning (RL) to solve it.
arXiv Detail & Related papers (2020-10-20T20:54:46Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.