Abstract:Implantable and wearable medical devices are used for monitoring, diagnosis, and treatment of an ever-increasing range of medical conditions, leading to an improved quality of life for patients. The addition of wireless connectivity to medical devices has enabled postdeployment tuning of therapy and access to device data virtually anytime and anywhere but, at the same time, has led to the emergence of security attacks as a critical concern. While cryptography and secure communication protocols may be used to a… Show more
“…The advantages of TAG lie in its intuitive user interaction, and the ubiquity of the required sensors, i.e., vibration motors and accelerometers, in today's wearables. Several recent advances [31], [32] have proposed using vibration signals to generate shared secrets for physically connected devices. However, vibration signals leak over the air and can be captured by acoustic eavesdroppers.…”
Securely pairing wearables with another device is the key to many promising applications. This paper presents Touch-And-Guard (TAG), a system that uses hand touch as an intuitive manner to establish a secure connection between a wristband wearable and the touched device. It generates secret bits from hand resonant properties, which are obtained using accelerometers and vibration motors. The extracted secret bits are used by both sides to authenticate each other and then communicate confidentially. The ubiquity of accelerometers and motors presents an immediate market for our system. We demonstrate the feasibility of our system using an experimental prototype and conduct experiments involving 12 participants with 1440 trials. The results indicate that we can generate secret bits at a rate of 7.15 bit/s, which is 44% faster than conventional text input PIN authentication.
“…The advantages of TAG lie in its intuitive user interaction, and the ubiquity of the required sensors, i.e., vibration motors and accelerometers, in today's wearables. Several recent advances [31], [32] have proposed using vibration signals to generate shared secrets for physically connected devices. However, vibration signals leak over the air and can be captured by acoustic eavesdroppers.…”
Securely pairing wearables with another device is the key to many promising applications. This paper presents Touch-And-Guard (TAG), a system that uses hand touch as an intuitive manner to establish a secure connection between a wristband wearable and the touched device. It generates secret bits from hand resonant properties, which are obtained using accelerometers and vibration motors. The extracted secret bits are used by both sides to authenticate each other and then communicate confidentially. The ubiquity of accelerometers and motors presents an immediate market for our system. We demonstrate the feasibility of our system using an experimental prototype and conduct experiments involving 12 participants with 1440 trials. The results indicate that we can generate secret bits at a rate of 7.15 bit/s, which is 44% faster than conventional text input PIN authentication.
“…Thus, no magnetic electronic wave interference occurs. This feature brings more advantages since it can be used for communication for users who wear medical devices embedded in their body [9].…”
Section: Short Range Communication Methodsmentioning
In the information-oriented society, there are increasing needs to conduct data communication with nearby devices/people. In this light, vibration-based communication method was proposed as one of possible communication means between adjacent devices. This method has been expected to provide an intuitive and safe communication by propagating vibration to a receiver device. This study proposes two types of techniques, which are multi-step ASK (Amplitude Shift Keying) with pseudo clock and PPM (Pulse Position Modulation), to achieve a stable vibration-based communication simply using smart device functions. These proposed techniques are then evaluated through some experiments using several types of smart devices. In addition, the effectiveness of the proposed methods is discussed based on the experimental results.
“…electrocardiogram signal (ECG) [7], interpulse interval [36]. The key distribution can be achieved via channels like body-coupled communications [37], vibration [8], ultrasound [9], and near field communication [38].…”
Section: A Imd Access Controlmentioning
confidence: 99%
“…Some other schemes set up temporary keys in a distributed manner based on proximity. They assume that only the programmer operated by the doctor can get close to the patient, and thus only it can extract the same key materials as the IMD, such as electrocardiograms [7], vibration [8], ultrasound [9]. However, this subclass of access control schemes does not include a real authentication.…”
To facilitate monitoring and management, modern Implantable Medical Devices (IMDs) are often equipped with wireless capabilities, which raise the risk of malicious access to IMDs. Although schemes are proposed to secure the IMD access, some issues are still open. First, pre-sharing a long-term key between a patient's IMD and a doctor's programmer is vulnerable since once the doctor's programmer is compromised, all of her patients suffer; establishing a temporary key by leveraging proximity gets rid of pre-shared keys, but as the approach lacks real authentication, it can be exploited by nearby adversaries or through man-in-the-middle attacks. Second, while prolonging the lifetime of IMDs is one of the most important design goals, few schemes explore to lower the communication and computation overhead all at once. Finally, how to safely record the commands issued by doctors for the purpose of forensics, which can be the last measure to protect the patients' rights, is commonly omitted in the existing literature. Motivated by these important yet open problems, we propose an innovative scheme e-SAFE, which significantly improves security and safety, reduces the communication overhead and enables IMD-access forensics. We present a novel lightweight compressive sensing based encryption algorithm to encrypt and compress the IMD data simultaneously, reducing the data transmission overhead by over 50% while ensuring high data confidentiality and usability. Furthermore, we provide a suite of protocols regarding device pairing, dual-factor authentication, and accountability-enabled access. The security analysis and performance evaluation show the validity and efficiency of the proposed scheme.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.