Light-weight encryption of wireless communication for implantable medical devices using henon chaotic system (invited paper)

Implantable Medical Devices (IMDs) are a growing industry regarding personal health care and monitoring. In addition, they provide patients with efficient treatments. In general, these devices use wireless communication technologies that may require synchronization with the medical team. Even though wireless technology offers satisfaction to the patient's daily life, it is still prone to security threats. Many malicious attacks on these devices can directly affect the patient's health in a lethal way. Using insecure wireless channels for these devices offers adversaries easy ways to steal the patient's private data and hijack these systems. This can cause damage to patients and render their devices unusable. In the aim of protecting these devices, we explore in this paper a new way to create symmetric encryption keys to encrypt the wireless communication held by the IMDs. This key generation will rely on chaotic systems to obtain synchronized Pseudo-Random keys that will be generated separately in the system. This generation is in a way that the communication channel will avoid a wireless key exchange, protecting the patient from key theft. Moreover, we will explore the performance of this generator from a cryptographic point of view, ensuring that these keys are safe to use for communication encryption.

[1]  Serge Vaudenay A Classical Introduction To Cryptography , 2005 .

[2]  M. Hénon A two-dimensional mapping with a strange attractor , 1976 .

[3]  H. H. Nien,et al.  Digital color image encoding and decoding using a novel chaotic random generator , 2007 .

[4]  Mohsen Guizani,et al.  An effective key management scheme for heterogeneous sensor networks , 2007, Ad Hoc Networks.

[5]  Kevin M. Short,et al.  UNMASKING A MODULATED CHAOTIC COMMUNICATIONS SCHEME , 1996 .

[6]  Yee Wei Law,et al.  Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols , 2005, TOSN.

[7]  Rajasekhar Mungara,et al.  A Routing-Driven Elliptic Curve Cryptography based Key Management Scheme for Heterogeneous Sensor Networks , 2014 .

[8]  P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .

[9]  Xiaojiang Du,et al.  Security in wireless sensor networks , 2008, IEEE Wireless Communications.

[10]  Larry J. Greenstein,et al.  Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication , 2007, 2007 IEEE International Conference on Communications.

[11]  Kevin Fu,et al.  Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).

[12]  Susmita Sur-Kolay,et al.  Algorithms, Architectures And Information Systems Security , 2008 .

[13]  Meng Zhang,et al.  MedMon: Securing Medical Devices Through Wireless Monitoring and Anomaly Detection , 2013, IEEE Transactions on Biomedical Circuits and Systems.

[14]  Sun Yi,et al.  A new chaotic secure communication system , 2008 .

[15]  Xiaojiang Du,et al.  A Lightweight Multicast Authentication Mechanism for Small Scale IoT Applications , 2013, IEEE Sensors Journal.

[16]  Dorothy E. Denning,et al.  Information Warfare And Security , 1998 .

[18]  Mohsen Guizani,et al.  Access Control Schemes for Implantable Medical Devices: A Survey , 2017, IEEE Internet of Things Journal.

[19]  Pardeep Kumar,et al.  Security Issues in Healthcare Applications Using Wireless Medical Sensor Networks: A Survey , 2011, Sensors.