Securing wireless implantable devices for healthcare: Ideas and challenges

Implantable devices hold great potential for pervasive healthcare, enabling the identification, monitoring, and treatment of patients regardless of their location. To realize this goal, these devices must be able to communicate wirelessly with external devices. However, wireless communication presents many vulnerabilities: an attacker can eavesdrop on transmitted information, use implanted devices to track patients, or spoof an implanted device. An attacker even has the potential to cause direct physical harm to a patient, either by forcibly removing an implanted device from the patient or by maliciously sending commands that affect the operation of an implanted device. Addressing these security threats is crucial for implantable devices due to their permanent nature, but it is difficult because of the severe resource constraints facing such devices. This article details the threats that face wireless implantable devices, surveys the work addressing these threats, and identifies open issues for future research.

[1]  Sandeep K. S. Gupta,et al.  Security solutions for pervasive healthcare , 2007 .

[2]  Ronald L. Rivest,et al.  The blocker tag: selective blocking of RFID tags for consumer privacy , 2003, CCS '03.

[3]  Sandra Upson Update: Radiation sensor fine-tunes cancer treatments , 2008, IEEE Spectrum.

[4]  Bing Jiang,et al.  Some Methods for Privacy in RFID Communication , 2004, ESAS.

[5]  Ari Juels,et al.  Technology Evaluation: The Security Implications of VeriChip Cloning , 2006, J. Am. Medical Informatics Assoc..

[6]  Markus G. Kuhn,et al.  An RFID Distance Bounding Protocol , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[7]  Lan Wang,et al.  Design and Implementation of a Secure Wireless Mote-Based Medical Sensor Network , 2008, Sensors.

[8]  Ari Juels,et al.  RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.

[9]  Lan Wang,et al.  Design and implementation of a secure wireless mote-based medical sensor network , 2008, UbiComp.

[10]  Ronald L. Rivest,et al.  Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems , 2003, SPC.

[11]  Atsushi Kanai,et al.  Privacy Enhanced Active RFID Tag , 2005 .

[12]  Avishai Wool,et al.  Picking Virtual Pockets using Relay Attacks on Contactless Smartcard , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[13]  Sandeep K. S. Gupta,et al.  Biosec: a biometric based approach for securing communication in wireless networks of biosensors implanted in the human body , 2003, 2003 International Conference on Parallel Processing Workshops, 2003. Proceedings..

[14]  Carmen C. Y. Poon,et al.  A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health , 2006, IEEE Communications Magazine.

[15]  Jelena V. Misic,et al.  Implementation of security policy for clinical information systems over wireless sensor networks , 2007, Ad Hoc Networks.

[16]  Ari Juels,et al.  Minimalist Cryptography for Low-Cost RFID Tags , 2004, SCN.

[17]  Scott F. Midkiff,et al.  Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses , 2008, IEEE Pervasive Computing.