Authentication and key relay in medical cyber-physical systems

Medical cyber-physical systems MCPS monitor/control patients' physiologic dynamics with embedded/distributed computing process and wireless/wired communication network. MCPS greatly impact the society with high-quality medical services and low-cost ubiquitous healthcare. The major component that integrates the physical world with the cyber space is wireless body area network WBAN of medical sensors and actuators worn or implanted in a patient. The life-critical nature of MCPS mandates safe and effective system design. MCPS must operate safely under malicious attacks. Authentication ensures that a medical device is what it claims to be and does what it declares to do, the first line of MCPS defense. Traditional authentication mechanisms, relied on cryptography, are not applicable to MCPS because of the constraints on computing/communication/energy resources. Recent innovations to secure mobile wireless sensor networks, with multi-sensor fusion to save power consumption, are not adequate. Besides challenges, MCPS present grand opportunities with the unique physical features of WBAN for non-cryptographic authentication and human-aided security. This paper proposes an authentication framework for MCPS. By studying medical processes and investigating healthcare adversaries, the novel design crosses physical world and cyber space. With uneven resource allocation, resource-scarce WBAN utilizes no encryption for authentication. Evaluation of this authentication protocol shows promising aspects and ease of adaptability. Copyright © 2014 John Wiley & Sons, Ltd.

[1]  Sandeep K. S. Gupta,et al.  Biosec: a biometric based approach for securing communication in wireless networks of biosensors implanted in the human body , 2003, 2003 International Conference on Parallel Processing Workshops, 2003. Proceedings..

[2]  David A. Wagner,et al.  TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.

[3]  Elaine Shi,et al.  Designing secure sensor networks , 2004, IEEE Wireless Communications.

[4]  Alec Yasinsac,et al.  Formal analysis of modern security protocols , 2005, Inf. Sci..

[5]  Lan Wang,et al.  SNAP: an architecture for secure medical sensor networks , 2006, 2006 2nd IEEE Workshop on Wireless Mesh Networks.

[6]  Carmen C. Y. Poon,et al.  A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health , 2006, IEEE Communications Magazine.

[7]  Georgios Kambourakis,et al.  Securing Medical Sensor Environments: The CodeBlue Framework Case , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).

[8]  Kevin Fu,et al.  Security and Privacy for Implantable Medical Devices , 2008, IEEE Pervasive Comput..

[9]  K.K. Venkatasubramanian,et al.  Plethysmogram-based secure inter-sensor communication in Body Area Networks , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.

[10]  S. Shankar Sastry,et al.  Secure Control: Towards Survivable Cyber-Physical Systems , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.

[11]  Yuguang Fang,et al.  Securing wireless sensor networks: a survey , 2008, IEEE Communications Surveys & Tutorials.

[12]  Wayne H. Wolf,et al.  Cyber-physical Systems , 2009, Computer.

[13]  Y. M. Huang,et al.  Pervasive, secure access to a hierarchical sensor-based healthcare monitoring architecture in wireless heterogeneous networks , 2009, IEEE Journal on Selected Areas in Communications.

[14]  Ayan Banerjee,et al.  PSKA: Usable and Secure Key Agreement Scheme for Body Area Networks , 2010, IEEE Transactions on Information Technology in Biomedicine.

[15]  Insup Lee,et al.  Toward patient safety in closed-loop medical device systems , 2010, ICCPS '10.

[16]  Hamid Sharif,et al.  Resource-aware secure ECG healthcare monitoring through body sensor networks , 2010, IEEE Wireless Communications.

[17]  Prasant Mohapatra,et al.  Non-cryptographic authentication and identification in wireless networks [Security and Privacy in Emerging Wireless Networks] , 2010, IEEE Wireless Communications.

[18]  Hong Liu,et al.  Mobile Healthcare Infrastructure with Qos and Security , 2010, MOBILWARE.

[19]  Insup Lee,et al.  Medical Cyber Physical Systems , 2010, Design Automation Conference.

[20]  Hong Liu,et al.  Secure architecture for healthcare Wireless Sensor Networks , 2010, 2010 Sixth International Conference on Information Assurance and Security.

[21]  Ingrid Moerman,et al.  A Comprehensive Survey of Wireless Body Area Networks , 2012, Journal of Medical Systems.

[22]  Xiaohui Liang,et al.  A Secure Handshake Scheme with Symptoms-Matching for mHealthcare Social Network , 2011, Mob. Networks Appl..

[23]  L. Ungar,et al.  Limitations of Threshold-Based Brain Oxygen Monitoring for Seizure Detection , 2011, Neurocritical care.

[24]  Athanasios V. Vasilakos,et al.  Body Area Networks: A Survey , 2010, Mob. Networks Appl..

[25]  Syed Taha Ali,et al.  Improving secret key generation performance for on-body devices , 2011, BODYNETS.

[26]  Ayan Banerjee,et al.  BAND-AiDe: A Tool for Cyber-Physical Oriented Analysis and Design of Body Area Networks and Devices , 2012, TECS.

[27]  Insup Lee,et al.  Challenges and Research Directions in Medical Cyber–Physical Systems , 2012, Proceedings of the IEEE.

[28]  Athanasios V. Vasilakos,et al.  ECG-Cryptography and Authentication in Body Area Networks , 2012, IEEE Transactions on Information Technology in Biomedicine.

[29]  Chunming Rong,et al.  Authenticated health monitoring scheme for wireless body sensor networks , 2012, BODYNETS.

[30]  Hong Liu,et al.  Modeling and characterization of GPS spoofing , 2013, 2013 IEEE International Conference on Technologies for Homeland Security (HST).

[31]  Ming Li,et al.  Secure ad hoc trust initialization and key management in wireless body area networks , 2013, TOSN.

[32]  Ming Li,et al.  BANA: Body Area Network Authentication Exploiting Channel Characteristics , 2013, IEEE J. Sel. Areas Commun..

[33]  Hong Liu,et al.  A Generic Authentication Protocol for Wireless Body Area Networks , 2013, BODYNETS.

[34]  Wei-Tek Tsai,et al.  Mobile Cloud Computing Research - Issues, Challenges and Needs , 2013, 2013 IEEE Seventh International Symposium on Service-Oriented System Engineering.

[35]  Hong Liu,et al.  Risk Quantification of Security Authentication: A Predictability Modeling Approach , 2013 .

[36]  Xiaofei Wang,et al.  Cloud-enabled wireless body area networks for pervasive healthcare , 2013, IEEE Network.

[37]  Farinaz Koushanfar,et al.  Balancing security and utility in Medical Devices? , 2013, 2013 50th ACM/EDAC/IEEE Design Automation Conference (DAC).

[38]  Guang-Zhong Yang,et al.  Body sensor networks , 2006 .