2013
DOI: 10.1145/2541228.2555313
|View full text |Cite
|
Sign up to set email alerts
|

A system architecture, processor, and communication protocol for secure implants

Abstract: Secure and energy-efficient communication between Implantable Medical Devices (IMDs) and authorized external users is attracting increasing attention these days. However, there currently exists no systematic approach to the problem, while solutions from neighboring fields, such as wireless sensor networks, are not directly transferable due to the peculiarities of the IMD domain. This work describes an original, efficient solution for secure IMD communication. A new implant system architecture is proposed, wher… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
6

Relationship

3
3

Authors

Journals

citations
Cited by 24 publications
(2 citation statements)
references
References 41 publications
(41 reference statements)
0
2
0
Order By: Relevance
“…There is a separate MCU/processor for executing the medical application (medical MCU), and for handling communication packets and running the security protocol (security MCU). This dual-processor architecture, which is based on [28], is a first step in protecting against DoS attacks in general: If an attacker sends continuous packets to prevent the IMD from running its main application, only the security MCU will be kept busy entertaining those messages, whereas the medical MCU will remain unaffected. However, in order to protect against battery DoS specifically, additional measures are required, as explained below.…”
Section: System Architecturementioning
confidence: 99%
“…There is a separate MCU/processor for executing the medical application (medical MCU), and for handling communication packets and running the security protocol (security MCU). This dual-processor architecture, which is based on [28], is a first step in protecting against DoS attacks in general: If an attacker sends continuous packets to prevent the IMD from running its main application, only the security MCU will be kept busy entertaining those messages, whereas the medical MCU will remain unaffected. However, in order to protect against battery DoS specifically, additional measures are required, as explained below.…”
Section: System Architecturementioning
confidence: 99%
“…These components are optional, meaning they may not appear in all implanted devices. One good illustration is the Smart Implant Security Core (SISC) [35]. Communication between IMD and a programmer via wireless medium passes through this device.…”
mentioning
confidence: 99%