Light-Weight Solution to Defend Implantable Medical Devices against Man-In-The-Middle Attack

Nowadays, Implantable Medical Devices (IMDs) rely mainly on wireless technology for information exchange. In spite of the many advantages wireless technology offers to patients in terms of efficiency, speed and ease; it puts the patients' health in serious danger if no proper security mechanism is deployed. The IMDs rely generally on resources that are relatively simple and sometimes require surgery to be altered. Therefore, common security mechanisms cannot be simply implemented in fear of consuming all the resources held for healthcare purposes. A certain balance between security and efficiency must be found in each IMD architecture. In this work, we try to avoid encryption algorithms to protect IMDs from Man-In- The-Middle (MITM) attacks. Encryption is generally used to protect communication confidentiality. However, this method is still a subject for replay and MITM attacks. In this work, we propose to create a signature protocol that protects IMDs from MITM attempts using less resources than common encryption/decryption algorithms. This signature algorithm is dynamic, which means that the signature output depends on a key and the same message can have different signatures if this key is different. This dynamic part will be introduced using chaotic generators.

[1]  Jyh-Long Chern,et al.  Coding the chaos in a semiconductor diode for information transmission , 1995 .

[2]  Mohsen Guizani,et al.  A lightweight live memory forensic approach based on hardware virtualization , 2017, Information Sciences.

[3]  Xiaojiang Du,et al.  Security in wireless sensor networks , 2008, IEEE Wireless Communications.

[4]  Gregor Leander,et al.  Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows , 2015, CT-RSA.

[5]  Srdjan Capkun,et al.  Proximity-based access control for implantable medical devices , 2009, CCS.

[6]  Xiaojiang Du,et al.  A survey of key management schemes in wireless sensor networks , 2007, Comput. Commun..

[7]  Mohsen Guizani,et al.  Transactions papers a routing-driven Elliptic Curve Cryptography based key management scheme for Heterogeneous Sensor Networks , 2009, IEEE Transactions on Wireless Communications.

[8]  Serge Vaudenay A Classical Introduction To Cryptography , 2005 .

[9]  M. Hénon A two-dimensional mapping with a strange attractor , 1976 .

[10]  Tong Kun Lim,et al.  Secure communication using small time continuous feedback , 1995 .

[11]  Hendrik Richter,et al.  The Generalized HÉnon Maps: Examples for Higher-Dimensional Chaos , 2002, Int. J. Bifurc. Chaos.

[12]  Wadia Faid Hassan Al-shameri,et al.  Dynamical Properties of the Hénon Mapping , 2012 .

[13]  Xiaojiang Du,et al.  PIPAC: Patient infusion pattern based access control scheme for wireless insulin pump system , 2013, 2013 Proceedings IEEE INFOCOM.

[14]  Rajasekhar Mungara,et al.  A Routing-Driven Elliptic Curve Cryptography based Key Management Scheme for Heterogeneous Sensor Networks , 2014 .

[15]  P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .

[16]  Fengyuan Xu,et al.  IMDGuard: Securing implantable medical devices with the external wearable guardian , 2011, 2011 Proceedings IEEE INFOCOM.

[17]  Ingrid Verbauwhede,et al.  On the Feasibility of Cryptography for a Wireless Insulin Pump System , 2016, CODASPY.

[18]  Xiaojiang Du,et al.  Symmetric Encryption Relying on Chaotic Henon System for Secure Hardware-Friendly Wireless Communication of Implantable Medical Systems , 2018, J. Sens. Actuator Networks.

[19]  Mohsen Guizani,et al.  An effective key management scheme for heterogeneous sensor networks , 2007, Ad Hoc Networks.

[20]  Kevin M. Short,et al.  UNMASKING A MODULATED CHAOTIC COMMUNICATIONS SCHEME , 1996 .

[21]  Gengfa Fang,et al.  An Improved Binary Sequence Generation for Securing Wireless Body Area Networks , 2015, 2015 IEEE International Conference on Data Science and Data Intensive Systems.

[22]  G Ramesh,et al.  Security Threats to Mobile Multimedia Applications: Camera-Based Attacks on Mobile Phones , 2018 .