Multi-layer security scheme for implantable medical devices

Internet of Medical Things (IoMTs) is fast emerging, thereby fostering rapid advances in the areas of sensing, actuation and connectivity to significantly improve the quality and accessibility of health care for everyone. Implantable medical device (IMD) is an example of such an IoMT-enabled device. IMDs treat the patient’s health and give a mechanism to provide regular remote monitoring to the healthcare providers. However, the current wireless communication channels can curb the security and privacy of these devices by allowing an attacker to interfere with both the data and communication. The privacy and security breaches in IMDs have thereby alarmed both the health providers and government agencies. Ensuring security of these small devices is a vital task to prevent severe health consequences to the bearer. The attacks can range from system to infrastructure levels where both the software and hardware of the IMD are compromised. In the recent years, biometric and cryptographic approaches to authentication, machine learning approaches to anomaly detection and external wearable devices for wireless communication protection have been proposed. However, the existing solutions for wireless medical devices are either heavy for memory constrained devices or require additional devices to be worn. To treat the present situation, there is a requirement to facilitate effective and secure data communication by introducing policies that will incentivize the development of security techniques. This paper proposes a novel electrocardiogram authentication scheme which uses Legendre approximation coupled with multi-layer perceptron model for providing three levels of security for data, network and application levels. The proposed model can reach up to 99.99% testing accuracy in identifying the authorized personnel even with 5 coefficients.

[1]  Richard Moulds,et al.  Quantum Random Number Generators , 2016 .

[2]  Kevin Fu,et al.  Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).

[3]  Fahim Sufi,et al.  Polynomial distance measurement for ECG based biometric authentication , 2010, Secur. Commun. Networks.

[4]  Xiaojiang Du,et al.  DTW based Authentication for Wireless Medical Device Security , 2018, 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC).

[5]  Andrew S. Tanenbaum,et al.  RFID Guardian: A Battery-Powered Mobile Device for RFID Privacy Management , 2005, ACISP.

[6]  V. Muthukkumarasamy,et al.  Authenticated Key Establishment Protocols for a Home Health Care System , 2007, 2007 3rd International Conference on Intelligent Sensors, Sensor Networks and Information.

[7]  Jie Wu,et al.  Defending Resource Depletion Attacks on Implantable Medical Devices , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[8]  H. T. Nagle,et al.  A comparison of the noise sensitivity of nine QRS detection algorithms , 1990, IEEE Transactions on Biomedical Engineering.

[9]  Volkan Tuzcu,et al.  Dynamic time warping as a novel tool in pattern recognition of ECG changes in heart rhythm disturbances , 2005, 2005 IEEE International Conference on Systems, Man and Cybernetics.

[10]  W. Philips,et al.  Data compression of ECG's by high-degree polynomial approximation , 1992, IEEE Transactions on Biomedical Engineering.

[11]  Geoffrey E. Hinton,et al.  ImageNet classification with deep convolutional neural networks , 2012, Commun. ACM.

[12]  F. Sufi,et al.  Legendre Polynomials based biometric authentication using QRS complex of ECG , 2008, 2008 International Conference on Intelligent Sensors, Sensor Networks and Information Processing.

[13]  Kevin Fu,et al.  Absence Makes the Heart Grow Fonder: New Directions for Implantable Medical Device Security , 2008, HotSec.

[14]  Xiaojiang Du,et al.  e-SAFE: Secure, Efficient and Forensics-Enabled Access to Implantable Medical Devices , 2018, 2018 IEEE Conference on Communications and Network Security (CNS).

[15]  Wayne Luk,et al.  Hardware Implementation Trade-Offs of Polynomial Approximations and Interpolations , 2008, IEEE Transactions on Computers.

[16]  Xiaojiang Du,et al.  Biometric-based two-level secure access control for Implantable Medical Devices during emergencies , 2011, 2011 Proceedings IEEE INFOCOM.

[17]  Kevin Fu,et al.  They can hear your heartbeats: non-invasive security for implantable medical devices , 2011, SIGCOMM.

[18]  Xiaojiang Du,et al.  Multi-Layer Perceptron Model on Chip for Secure Diabetic Treatment , 2018, IEEE Access.

[19]  Xiaojiang Du,et al.  A review of security challenges, attacks and resolutions for wireless medical devices , 2017, 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC).

[20]  Anupam Gupta,et al.  Novel approach for security in Wireless Sensor Network using bio-inspirations , 2014, 2014 Sixth International Conference on Communication Systems and Networks (COMSNETS).

[21]  Olivier Meste,et al.  Time-varying analysis methods and models for the respiratory and cardiac system coupling in graded exercise , 2005, IEEE Transactions on Biomedical Engineering.

[22]  Farinaz Koushanfar,et al.  Heart-to-heart (H2H): authentication for implanted medical devices , 2013, CCS.

[23]  Meng Zhang,et al.  MedMon: Securing Medical Devices Through Wireless Monitoring and Anomaly Detection , 2013, IEEE Transactions on Biomedical Circuits and Systems.

[24]  Yu Hen Hu,et al.  One-lead ECG for identity verification , 2002, Proceedings of the Second Joint 24th Annual Conference and the Annual Fall Meeting of the Biomedical Engineering Society] [Engineering in Medicine and Biology.

[25]  Xiaojiang Du,et al.  DLRT: Deep Learning Approach for Reliable Diabetic Treatment , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.

[26]  Eryk Dutkiewicz,et al.  An ECG-based Secret Data Sharing scheme supporting emergency treatment of Implantable Medical Devices , 2014, 2014 International Symposium on Wireless Personal Multimedia Communications (WPMC).

[27]  Fengyuan Xu,et al.  IMDGuard: Securing implantable medical devices with the external wearable guardian , 2011, 2011 Proceedings IEEE INFOCOM.

[28]  Hyogon Kim,et al.  In-vivo NFC: remote monitoring of implanted medical devices with improved privacy , 2012, SenSys '12.

[29]  Theodore S. Rappaport,et al.  Wireless communications - principles and practice , 1996 .

[30]  Srdjan Capkun,et al.  Proximity-based access control for implantable medical devices , 2009, CCS.