skip to main content
research-article
Open access

A system architecture, processor, and communication protocol for secure implants

Published: 01 December 2013 Publication History

Abstract

Secure and energy-efficient communication between Implantable Medical Devices (IMDs) and authorized external users is attracting increasing attention these days. However, there currently exists no systematic approach to the problem, while solutions from neighboring fields, such as wireless sensor networks, are not directly transferable due to the peculiarities of the IMD domain. This work describes an original, efficient solution for secure IMD communication. A new implant system architecture is proposed, where security and main-implant functionality are made completely decoupled by running the tasks onto two separate cores. Wireless communication goes through a custom security ASIP, called SISC (Smart-Implant Security Core), which runs an energy-efficient security protocol. The security core is powered by RF-harvested energy until it performs external-reader authentication, providing an elegant defense mechanism against battery Denial-of-Service (DoS) and other, more common attacks. The system has been evaluated based on a realistic case study involving an artificial pancreas implant. When synthesized for a UMC 90nm CMOS ASIC technology, our system architecture achieves defense against unauthorized accesses having zero energy cost, running entity authentication through harvesting only 7.45μJ of RF energy from the requesting entity. In all other successfully authenticated accesses, our architecture achieves secure data exchange without affecting the performance of the main IMD functionality, adding less than 1‰ (1.3mJ) to the daily energy consumption of a typical implant. Compared to a singe-core, secure reference IMD, which would still be more vulnerable to some types of attacks, our secure system on chip (SoC) achieves high security levels at 56% energy savings and at an area overhead of less than 15%.

References

[1]
Bauer, A. and Juerjens, J. 2008. Security protocols, properties, and their monitoring. In Proceedings of the 4th International Workshop on Software Engineering for Secure Systems (SESS’08). ACM, New York, NY, 33--40.
[2]
Beck, C., Masny, D., Geiselmann, W., and Bretthauer, G. 2011. Block cipher based security for severely resource-constrained implantable medical devices. In Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies. ACM, 62.
[3]
Bogari, E. A., Zavarsky, P., Lindskog, D., and Ruhl, R. 2012. An analysis of security weaknesses in the evolution of RFID enabled passport. In Proceedings of the 2012 World Congress on Internet Security (WorldCIS’12). 158--166.
[4]
Boyd, C. and Mathuria, A. 2010. Protocols for authentication and key establishment. In Information Security and Cryptography 3rd Ed. Springer Publishing Company, Incorporated.
[5]
Cam, H., Ozdemir, S., Muthuavinashiappan, D., and Nair, P. 2003. Energy efficient security protocol for wireless sensor networks. In Proceedings of the Vehicular Technology Conference. Vol. 5. IEEE, 2981--2984.
[6]
Cremers, C., Rasmussen, K. B., Schmidt, B., and Capkun, S. 2012. Distance hijacking attacks on distance bounding protocols. In Proceedings of the IEEE Symposium on Security and Privacy (SP’12). 113--127.
[7]
Daly, M. E., Vale, C., Walker, M., Littlefield, A., Alberti, K., and Mathers, J. C. 1998. Acute effects on insulin sensitivity and diurnal metabolic profiles of a high-sucrose compared with a high-starch diet. American Journal of Clinical Nutrition 67, 6, 1186--1196.
[8]
Daniluk, K. and Niewiadomska-Szynkiewicz, E. 2012. Energy-efficient security in implantable medical devices. In Proceedings of the Federated Conference on Computer Science and Information Systems (FedCSIS’12). IEEE, 773--778.
[9]
Denning, T., Borning, A., Friedman, B., Gill, B. T., Kohno, T., and Maisel, W. H. 2010. Patients, pacemakers, and implantable defibrillators: Human values and security for wireless implantable medical devices. In Proceedings of the 28th International Conference on Human Factors in Computing Systems. 917--926.
[10]
Denning, T., Fu, K., and Kohno, T. 2008. Absence makes the heart grow fonder: New directions for implantable medical device security. In Proceedings of the 3rd Conference on Hot Topics in Security. USENIX Association, 5:1--5:7.
[11]
EPCglobal Inc. 2008. Class-1 Generation-2 UHF RFID protocol for communications at 860 MHz-960 MHz (version 1.2.0).
[12]
FCC. 2003. MICS Medical Implant Communication Services. FCC 47CFR95.601-95.673 Subpart E/I. Rules for MedRadio Services.
[13]
Fernald, K., Cook, T., III, T. M., and Paulos, J. 1991. A microprocessor-based implantable telemetry system. IEEE Computer 24, 23--30.
[14]
Gasson, M. N. 2010. Human enhancement: Could you become infected with a computer virus? In Proceedings of the IEEE International Symposium on Technology and Society (ISTAS’10). 61--68.
[15]
Gollakota, S., Hassanieh, H., Ransford, B., Katabi, D., and Fu, K. 2011. They Can Hear Your Heartbeats: Non-invasive Security for Implantable Medical Devices. Retrieved December 2, 2013 from http://groups.csail.mit.edu/netmit/IMDShield/paper.pdf.
[16]
Gupta, S. K., Mukherjee, T., and Venkatasubramanian, K. 2006. Criticality aware access control model for pervasive applications. In Proceedings of the 4th Annual IEEE International Conference on Pervasive Computing and Communications. 251--257.
[17]
Halperin, D., Heydt-Benjamin, T. S., Fu, K., Kohno, T., and Maisel, W. H. 2008. Security and privacy for implantable medical devices. IEEE Pervasive Computing 7, 30--39.
[18]
Halperin, D., Heydt-Benjamin, T. S., Ransford, B., Clark, S. S., Defend, B., Morgan, W., Fu, K., Kohno, T., and Maisel, W. H. 2008. Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses. In Proceedings of the 2008 IEEE Symposium on Security and Privacy. IEEE Computer Society, 129--142.
[19]
Harrigal, C. and Walters, R. 1990. The development of a microprocessor controlled implantable device. In Proceedings of the 1990 16th Annual Northeast Bioengineering Conference. 137--138.
[20]
Hei, X., Du, X., Wu, J., and Hu, F. 2010. Defending resource depletion attacks on implantable medical devices. In GLOBECOM. IEEE, 1--5.
[21]
Hosseini-Khayat, S. 2011. A lightweight security protocol for ultra-low power ASIC implementation for wireless implantable medical devices. In Proceedings of the 5th International Symposium on Medical Information & Communication Technology (ISMICT'11). IEEE, 6--9.
[22]
ISO. 1999. Information technology--Security techniques--Entity authentication--Part 2: Mechanisms using symmetric encipherment algorithms, ISO/IEC 9798-2:2008. International Standard.
[23]
Jalilian, E., Turner, L., Jullien, G., and Mitchev, M. 2004. Design of an implantable multichannel neurostimulator for restoring impaired gastrointestinal motility. In Proceedings of the 9th Annual Conference of the International FES Society.
[24]
Juels, A. 2006. RFID Security and privacy: A research survey. IEEE Journal on Selected Areas in Communications 24, 2, 381--394.
[25]
Ko, J., Lu, C., Srivastava, M. B., Stankovic, J. A., Terzis, A., and Welsh, M. 2010. Wireless sensor networks for healthcare. Proceedings of the IEEE 98, 11, 1947--1960.
[26]
Leavitt, N. 2010. Researchers Fight to Keep Implanted Medical Devices Safe from Hackers. Computer 43, 11--14.
[27]
Lee, J., Kapitanova, K., and Son, S. H. 2010. The price of security in wireless sensor networks. Computer Networks 54, 17, 2967--2978.
[28]
Li, C., Raghunathan, A., and Jha, N. K. 2011. Hijacking an insulin pump: Security attacks and defenses for a diabetes therapy system. In Proceedins of the 13th IEEE International Conferenc on e-Health Networking Applications and Services (Healthcom’11). 150--156.
[29]
Martin Feldhofer, S. D. and Wolkerstorfer, J. 2004. Strong authentication for RFID systems using the AES algorithm. In Cryptographic Hardware and Embedded-Systems. Springer, 85--99.
[30]
Nazhandali, L., Minuth, M., Zhai, B., Olson, J., Austin, T., and Blaauw, D. 2005. A second-generation sensor network processor with application-driven memory optimizations and out-of-order execution. In Proceedings of the 2005 International Conference on Compilers, Architectures and Synthesis for Embedded Systems. ACM, 249--256.
[31]
NIST. 2001. Recommendation for Block Cipher Modes of Operation—Methods and Techniques. NIST Special Publication 800-38a. National Institute of Standards and Technology.
[32]
NIST. 2005. Recommendation for Block Cipher Modes of Operation: The CMAC Mode for Authentication. NIST Special Publication 800-38b. National Institute of Standards and Technology.
[33]
Ohta, H. and Matsui, M. 2000. A description of the misty1 encryption algorithm. RFC2994, November.
[34]
Olivo, J., Carrara, S., and De Micheli, G. 2011. Energy harvesting and remote powering for implantable biosensors. IEEE Sensors Journal 11, 7, 1573--1586.
[35]
Pagkalos, I., Herrero, P., El-Sharkawy, M., Pesl, P., Oliver, N., and Georgiou, P. 2011. Vhdl implementation of the biostator ii glucose control algorithm for critical care. In Proceedings of the Biomedical Circuits and Systems Conference (BioCAS’11). IEEE, 94--97.
[36]
Park, C., Seo, J., Bae, S., Kim, H., Kim, S., and Kim, B. 2003. A low-cost memory architecture with nand xip for mobile embedded systems. In Proceedings of the 1st IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System Synthesis. ACM, 138--143.
[37]
Poulson, K. 2008. Hackers Assault Epilepsy Patients via Computer. Retrieved from www.wired.com/politics/security/news/2008/03/epilepsy.
[38]
Pournaghshband, V., Sarrafzadeh, M., and Reiher, P. 2012. Securing legacy mobile medical devices. In MobiHealth.
[39]
Rasmussen, K. B., Castelluccia, C., Heydt-Benjamin, T. S., and Capkun, S. 2009. Proximity-based access control for implantable medical devices. In Proceedings of the 16th ACM Conference on Computer and Communications Security. ACM, 410--419.
[40]
Rieback, M., Crispo, B., and Tanenbaum, A. 2008. RFID Guardian: A battery-powered mobile device for RFID privacy management. In Information Security and Privacy. Springer, Berlin, 259--273.
[41]
Rivest, R. L. 1995. The rc5 encryption algorithm. In Fast Software Encryption. Springer, 86--96.
[42]
Roger, V. L., Turner, M. B., et al. 2011. Heart Disease and Stroke Statistics -- 2011 Update: A Report from the American Heart Association. American Heart Association.
[43]
Schechter, S. 2010. Security that is Meant to be Skin Deep Using Ultraviolet Micropigmentation to Store Emergency-Access Keys for Implantable Medical Devices. In HealthSec. USENIX.
[44]
Shukuri, S., Yanagisawa, K., and Ishibashi, K. 2001. Cmos process compatible ie-flash (inverse gate electrode flash) technology for system-on-a-chip. In Proceedings of the IEEE Conference on Custom Integrated Circuits, 2001. 179--182.
[45]
Siskos, D. 2011. A Co-processor for a Secure Implantable Medical Device. M.S. thesis, Delft University of Technology.
[46]
Smith, J. R., Sample, A. P., Powledge, P. S., Roy, S., and Mamishev, A. 2006. A wirelessly-powered platform for sensing and computation. In UbiComp 2006: Ubiquitous Computing. Springer, 495--506.
[47]
Sorber, J., Shin, M., Peterson, R., Cornelius, C., Mare, S., Prasad, A., Marois, Z., Smithayer, E., and Kotz, D. 2012. An amulet for trustworthy wearable mhealth. In Proceedings of the 12th Workshop on Mobile Computing Systems & Applications. ACM, 7.
[48]
Stotts, L., Infinger, K., Babka, J., and Genzer, D. 1989. An 8 bit microcomputer with analog subsystems for implantable biomedical application. IEEE Journal of Solid-State Circuits. 292--300.
[49]
Strydis, C. 2011. Universal Processor Architecture for Biomedical Implants: The SiMS Project. Ph.D. thesis, Delft University of Technology, Delft, Netherlands.
[50]
Strydis, C., Zhu, D., and Gaydadjiev, G. 2008. Profiling of symmetric encryption algorithms for a novel biomedical-implant architecture. In Proceedings of the ACM International Conference on Computing Frontiers (CF’08). 231--240.
[51]
Valdastri, P., Menciassi, A., Arena, A., Caccamo, C., and Dario, P. 2004. An implantable telemetry platform system for in vivo monitoring of physiological parameters. IEEE Transactions on Information Technology in Biomedicine. Vol. 8, 271--278.
[52]
van der Lubbe, J. C. A. 1998. Basic Methods of Cryptography. VSSD.
[53]
van Deursen, T. and Radomirovic, S. 2008. Attacks on rfid protocols. IACR Cryptology ePrint Archive 2008, 310.
[54]
Varshney, U. 2003. Pervasive healthcare. Computer 36, 12, 138--140.
[55]
Wang, L., Hammond, P., Johannessen, E., Tang, T., Astaras, A., Beaumont, S., Murray, A., Cooper, J., and Cumming, D. 2004. An on-chip programmable instrumentation microsystem for gastrointestinal telemetry applications. In Proceedings of the 26th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBS’04). 2109--2112.
[56]
Wouters, P., Cooman, M. D., Lapadatu, D., and Puers, R. 1994. A low power multi-sensor interface for injectable microprocessor-based animal monitoring system. Sensors and Actuators A: Physical. 41--42, 198--206.
[57]
Xu, F., Qin, Z., Tan, C. C., Wang, B., and Li, Q. 2011. IMDGuard: Securing implantable medical devices with the external wearable guardian. IEEE INFOCOM 1862--1870.
[58]
Zhuang, X., Wang, Z.-H., Chang, C.-C., and Zhu, Y. 2013. Security analysis of a new ultra-lightweight RFID protocol and its improvement. Journal of Information Hiding and Multimedia Signal Processing 4, 3.

Cited By

View all
  • (2024)A Survey on the Verification and Validation of Artificial Pancreas Software Systems2024 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW)10.1109/ICSTW60967.2024.00039(1-9)Online publication date: 27-May-2024
  • (2023)Bringing Energy Efficiency Closer to Application Developers: An Extensible Software Analysis FrameworkIEEE Transactions on Sustainable Computing10.1109/TSUSC.2022.32224098:2(180-193)Online publication date: 1-Apr-2023
  • (2023)An Energy Consumption Benchmark for a Low-Power RISC-V Core Aimed at Implantable Medical DevicesIEEE Embedded Systems Letters10.1109/LES.2022.319006315:2(57-60)Online publication date: Jun-2023
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Transactions on Architecture and Code Optimization
ACM Transactions on Architecture and Code Optimization  Volume 10, Issue 4
December 2013
1046 pages
ISSN:1544-3566
EISSN:1544-3973
DOI:10.1145/2541228
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 December 2013
Accepted: 01 November 2013
Revised: 01 October 2013
Received: 01 June 2013
Published in TACO Volume 10, Issue 4

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Implantable device
  2. security
  3. system on chip
  4. ultra-low power

Qualifiers

  • Research-article
  • Research
  • Refereed

Funding Sources

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)111
  • Downloads (Last 6 weeks)12
Reflects downloads up to 01 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2024)A Survey on the Verification and Validation of Artificial Pancreas Software Systems2024 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW)10.1109/ICSTW60967.2024.00039(1-9)Online publication date: 27-May-2024
  • (2023)Bringing Energy Efficiency Closer to Application Developers: An Extensible Software Analysis FrameworkIEEE Transactions on Sustainable Computing10.1109/TSUSC.2022.32224098:2(180-193)Online publication date: 1-Apr-2023
  • (2023)An Energy Consumption Benchmark for a Low-Power RISC-V Core Aimed at Implantable Medical DevicesIEEE Embedded Systems Letters10.1109/LES.2022.319006315:2(57-60)Online publication date: Jun-2023
  • (2022)A Lightweight System-On-Chip Based Cryptographic Core for Low-Cost DevicesSensors10.3390/s2208300422:8(3004)Online publication date: 14-Apr-2022
  • (2022)Personalized Neural Network for Patient-Specific Health Monitoring in IoT: A Metalearning ApproachIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems10.1109/TCAD.2022.316218241:12(5394-5407)Online publication date: Dec-2022
  • (2021)Can Formal Security Verification Really Be Optional? Scrutinizing the Security of IMD Authentication ProtocolsSensors10.3390/s2124838321:24(8383)Online publication date: 15-Dec-2021
  • (2021)Secure and efficient WBANs algorithm with authentication mechanismJournal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology10.3233/JIFS-18987341:5(5525-5534)Online publication date: 1-Jan-2021
  • (2021)On-device Prior Knowledge Incorporated Learning for Personalized Atrial Fibrillation DetectionACM Transactions on Embedded Computing Systems10.1145/347698720:5s(1-25)Online publication date: 17-Sep-2021
  • (2021)Enabling On-Device Model Personalization for Ventricular Arrhythmias Detection by Generative Adversarial Networks2021 58th ACM/IEEE Design Automation Conference (DAC)10.1109/DAC18074.2021.9586123(163-168)Online publication date: 5-Dec-2021
  • (2021)Securing Implantable Medical Devices Using Ultrasound WavesIEEE Access10.1109/ACCESS.2021.30835769(80170-80182)Online publication date: 2021
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Full Access

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media