skip to main content
10.1145/2556315.2556324acmotherconferencesArticle/Chapter ViewAbstractPublication Pagescs2Conference Proceedingsconference-collections
research-article

Adaptive entity-identifier generation for IMD emergency access

Published: 20 January 2014 Publication History

Abstract

Recent work on wireless Implantable Medical Devices (IMDs) has revealed the need for secure communication in order to prevent data theft and implant abuse by malicious attackers. However, security should not be provided at the cost of patient safety and an IMD should, thus, remain accessible during an emergency regardless of device security. In this paper, we present a novel method of providing IMD emergency access, based on generating Entity Identifiers (EI) using the Inter-Pulse Intervals (IPIs) of heartbeats. We evaluate the current state-of-the-art in EI-generation in terms of security and accessibility for healthy subjects with a wide range of heart rates. Subsequently, we present an adaptive EI-generation algorithm which takes the heart rate into account, maintaining an acceptable emergency-mode activation time (between 5-55.4 s) while improving security by up to 3.4x for high heart rates. Finally, we show that activating emergency mode may consume as little as 0.24μJ from the IMD battery.

References

[1]
F. Agrafioti, F. M. Bui, and D. Hatzinakos. Medical biometrics in mobile health monitoring. Security and Communication Networks, 4(5):525--539, 2011.
[2]
I. Antelmi et al. Influence of age, gender, body mass index, and functional capacity on heart rate variability in a cohort of subjects without heart disease. AJC, 93(3):381--385, 2004.
[3]
S.-D. Bao et al. Using the timing information of heartbeats as an entity identifier to secure body sensor network. T-ITB, pp. 772--779, 12(6), 2008.
[4]
A. L. Goldberger et al. Physiobank, physiotoolkit, and physionet components of a new research resource for complex physiologic signals. Circulation, 101(23):e215--e220, 2000.
[5]
D. Halperin et al. Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses. In SP. IEEE, 2008.
[6]
D. Halperin et al. Security and Privacy for Implantable Medical Devices. PC, pages 30--39, 2008.
[7]
N. Iyengar et al. Age-related alterations in the fractal scaling of cardiac interbeat interval dynamics. AJP-Regu, 271(4):R1078--R1084, 1996.
[8]
C.-K. Peng et al. Exaggerated heart rate oscillations during two meditation techniques. IJC, pages 101--107, 1999.
[9]
C. C. Poon et al. A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health. IEEE Commun. Mag., pages 73--81, 2006.
[10]
C. Strydis et al. A system architecture, processor and communication protocol for secure implants. TACO, 2013.
[11]
M. P. Tulppo et al. Quantitative beat-to-beat analysis of heart rate dynamics during exercise. AJP Heart, 271(1):H244--H252, 1996.
[12]
R.-F. Xue et al. Ultra-low-power wireless implantable blood flow sensing microsystem for vascular graft applications. In ISIC, pages 224--229. IEEE, 2011.
[13]
G.-H. Zhang et al. Analysis of using interpulse intervals to generate 128-bit biometric random binary sequences for securing wireless body sensor networks. T-ITB, 16(1):176--182, 2012.

Cited By

View all
  • (2024)Implantable Medical Device SecurityCryptography10.3390/cryptography80400538:4(53)Online publication date: 15-Nov-2024
  • (2021)Extracting Randomness from the Trend of IPI for Cryptographic Operations in Implantable Medical DevicesIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2019.292177318:2(875-888)Online publication date: 1-Mar-2021
  • (2021)Cardio-ML: Detection of Malicious Clinical Programmings Aimed at Cardiac Implantable Electronic Devices Based on Machine Learning and a Missing Values Resemblance FrameworkArtificial Intelligence in Medicine10.1016/j.artmed.2021.102200(102200)Online publication date: Oct-2021
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
CS2 '14: Proceedings of the First Workshop on Cryptography and Security in Computing Systems
January 2014
56 pages
ISBN:9781450324847
DOI:10.1145/2556315
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

  • HiPEAC: HiPEAC Network of Excellence

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 20 January 2014

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. accessibility
  2. implant
  3. inter-pulse interval
  4. low power
  5. security

Qualifiers

  • Research-article

Funding Sources

Conference

CS2
Sponsor:
  • HiPEAC

Acceptance Rates

CS2 '14 Paper Acceptance Rate 6 of 26 submissions, 23%;
Overall Acceptance Rate 27 of 91 submissions, 30%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 01 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Implantable Medical Device SecurityCryptography10.3390/cryptography80400538:4(53)Online publication date: 15-Nov-2024
  • (2021)Extracting Randomness from the Trend of IPI for Cryptographic Operations in Implantable Medical DevicesIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2019.292177318:2(875-888)Online publication date: 1-Mar-2021
  • (2021)Cardio-ML: Detection of Malicious Clinical Programmings Aimed at Cardiac Implantable Electronic Devices Based on Machine Learning and a Missing Values Resemblance FrameworkArtificial Intelligence in Medicine10.1016/j.artmed.2021.102200(102200)Online publication date: Oct-2021
  • (2020)CardiWall: A Trusted Firewall for the Detection of Malicious Clinical Programming of Cardiac Implantable Electronic DevicesIEEE Access10.1109/ACCESS.2020.29786318(48123-48140)Online publication date: 2020
  • (2019)Keep an Eye on Your Personal Belongings! The Security of Personal Medical Devices and Their EcosystemsJournal of Biomedical Informatics10.1016/j.jbi.2019.103233(103233)Online publication date: Jun-2019
  • (2018)Heartbeats Based Biometric Random Binary Sequences Generation to Secure Wireless Body Sensor NetworksIEEE Transactions on Biomedical Engineering10.1109/TBME.2018.281515565:12(2751-2759)Online publication date: Dec-2018
  • (2018)Adaptive computing-based biometric security for intelligent medical applicationsNeural Computing and Applications10.1007/s00521-018-3855-9Online publication date: 26-Nov-2018
  • (2017)Enhancing Heart-Beat-Based Security for mHealth ApplicationsIEEE Journal of Biomedical and Health Informatics10.1109/JBHI.2015.249615121:1(254-262)Online publication date: Jan-2017
  • (2017)Data Security and Privacy in Cyber‐Physical Systems for HealthcareSecurity and Privacy in Cyber‐Physical Systems10.1002/9781119226079.ch15(305-326)Online publication date: 6-Oct-2017
  • (2015)On Using a Von Neumann Extractor in Heart-Beat-Based SecurityProceedings of the 2015 IEEE Trustcom/BigDataSE/ISPA - Volume 0110.1109/Trustcom.2015.411(491-498)Online publication date: 20-Aug-2015
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media