scholarly journals Can Formal Security Verification Really Be Optional? Scrutinizing the Security of IMD Authentication Protocols

Sensors ◽  
2021 ◽  
Vol 21 (24) ◽  
pp. 8383
Author(s):  
Daniel Gerbi Duguma ◽  
Ilsun You ◽  
Yonas Engida Gebremariam ◽  
Jiyoon Kim

The need for continuous monitoring of physiological information of critical organs of the human body, combined with the ever-growing field of electronics and sensor technologies and the vast opportunities brought by 5G connectivity, have made implantable medical devices (IMDs) the most necessitated devices in the health arena. IMDs are very sensitive since they are implanted in the human body, and the patients depend on them for the proper functioning of their vital organs. Simultaneously, they are intrinsically vulnerable to several attacks mainly due to their resource limitations and the wireless channel utilized for data transmission. Hence, failing to secure them would put the patient’s life in jeopardy and damage the reputations of the manufacturers. To date, various researchers have proposed different countermeasures to keep the confidentiality, integrity, and availability of IMD systems with privacy and safety specifications. Despite the appreciated efforts made by the research community, there are issues with these proposed solutions. Principally, there are at least three critical problems. (1) Inadequate essential capabilities (such as emergency authentication, key update mechanism, anonymity, and adaptability); (2) heavy computational and communication overheads; and (3) lack of rigorous formal security verification. Motivated by this, we have thoroughly analyzed the current IMD authentication protocols by utilizing two formal approaches: the Burrows–Abadi–Needham logic (BAN logic) and the Automated Validation of Internet Security Protocols and Applications (AVISPA). In addition, we compared these schemes against their security strengths, computational overheads, latency, and other vital features, such as emergency authentications, key update mechanisms, and adaptabilities.

2012 ◽  
Vol 459 ◽  
pp. 293-297 ◽  
Author(s):  
Xing Chen ◽  
Hong Lun Hou ◽  
Ming Hui Wu ◽  
Mei Mei Huo

This paper designed a wrist Device which can detect physiological information and save the information data. The information got by device is including Oxygen saturation of blood, Pulse rate and steps. And the device even can distinguish the state of human body between fall and normal activities with 3-axis accelerometer. The equipment designed for family health care and remote healthy care field. The operation of device is so easy to be mastered that the device might have a potential value for the future medical field


2019 ◽  
Vol 2019 ◽  
pp. 1-25 ◽  
Author(s):  
Madiha Khalid ◽  
Umar Mujahid ◽  
Najam-ul-Islam Muhammad

The field of pervasive computing especially the Internet of Things (IoT) network is evolving due to high network speed and increased capacity offered by the 5G communication system. The IoT network identifies each device before giving it access to the network. The RFID system is one of the most prominent enabling technologies for the node identification. Since the communication between the node and the network takes place over an insecure wireless channel, an authentication mechanism is required to avoid the malicious devices from entering the network. This paper presents a brief survey on the authentication protocols along with the prominent cryptanalysis models for the EPC C1G2 RFID systems. A comparative analysis is provided to highlight the common weaknesses of the existing authentication algorithms and to emphasize on the lack of security standardization for the resource constraint IoT network perception layer. This paper is concluded by proposing an ultralightweight protocol that provides Extremely Good Privacy (EGP). The proposed EGP protocol avoids all the pitfalls highlighted by the cryptanalysis of the existing authentication protocols. The incorporation of the novel ultralightweight primitives, Per-XOR (Px) and Inverse Per-XOR (Px-1), makes the protocol messages more robust and irreversible for all types of adversaries. A comprehensive security analysis illustrates that the proposed protocol proves to be highly resistive against all possible attack scenarios and ensures the security optimally.


2018 ◽  
Vol 7 (1) ◽  
pp. 57-65 ◽  
Author(s):  
Sravani Challa ◽  
Mohammad Wazid ◽  
Ashok Kumar Das ◽  
Muhammad Khurram Khan

2019 ◽  
Vol 31 (02) ◽  
pp. 1950016
Author(s):  
B. P. Patil ◽  
Deepali Newaskar ◽  
Kunal Sharma ◽  
Tarun Baghmar ◽  
Mahesh Ku. Rajput

Active implantable medical devices (AIMDs) like implantable cardiac pacemakers play very important role in extending lives of patients with some cardiovascular diseases. The life of implantable device depends on life of battery. If this device can be charged from outside with power transfer device, then the cost of surgical procedures for patient can be saved. One must ensure, while transferring this power there should not be any abnormal effect on human body tissues. Wireless recharging of such devices through magnetic resonant coupling is of concern and hence the topic of more research to have uninterrupted supply from battery. The technique of wireless power transfer, primary or transmitting coil is assumed to be on body and receiver coil is assumed to be inside the human body. Several critical aspects need to be studied while designing coil for wireless power transfer (WPT). One of which is choice of operational frequency. In this research experiment, designed circuit is tested for checking power transfer was studied. Effect of the distance between primary and secondary coil affects the efficiency of power transfer. Authors also tied to test this for using different medium like air, placing 80 GSM paper and cloth. It is found that the medium between the primary and secondary affects the transfer of power. Careful thought needs to be given while designing power transfer system.


Author(s):  
Brian S. Turner

This chapter is concerned with the contemporary impact of the biomedical sciences on life expectancy and how the so-called life-extension project. A promise of more or less indefinite human survival or the end of aging represents a critical challenge, not just to religious assumptions about life, aging and death but to traditional moral assumptions about the just distribution of resources in society. Medical consumption is simply a subset of general consumption, and the idea of living forever is central to modern secular lifestyles. The tensions between religion and medicine, and therefore the nature of “medical secularization,” can be understood by recognizing that many critical problems for the Christian churches in modernity are raised by questions about the changing status of the human body. As modern societies are driven by technological and scientific advances, the choices that confront humans fall broadly into two camps, namely posthumanism and transhumanism.


Sensors ◽  
2019 ◽  
Vol 19 (10) ◽  
pp. 2358 ◽  
Author(s):  
JoonYoung Lee ◽  
SungJin Yu ◽  
KiSung Park ◽  
YoHan Park ◽  
YoungHo Park

Internet of Things (IoT) environments such as smart homes, smart factories, and smart buildings have become a part of our lives. The services of IoT environments are provided through wireless networks to legal users. However, the wireless network is an open channel, which is insecure to attacks from adversaries such as replay attacks, impersonation attacks, and invasions of privacy. To provide secure IoT services to users, mutual authentication protocols have attracted much attention as consequential security issues, and numerous protocols have been studied. In 2017, Bae et al. presented a smartcard-based two-factor authentication protocol for multi-gateway IoT environments. However, we point out that Bae et al.’s protocol is vulnerable to user impersonation attacks, gateway spoofing attacks, and session key disclosure, and cannot provide a mutual authentication. In addition, we propose a three-factor mutual authentication protocol for multi-gateway IoT environments to resolve these security weaknesses. Then, we use Burrows–Abadi–Needham (BAN) logic to prove that the proposed protocol achieves secure mutual authentication, and we use the Automated Validation of Internet Security Protocols and Applications (AVISPA) tool to analyze a formal security verification. In conclusion, our proposed protocol is secure and applicable in multi-gateway IoT environments.


2021 ◽  
Author(s):  
Abdulkadir Celik ◽  
Ahmed Eltawil

<div>Taking a cue from the Internet of Things, the Internet of Bodies (IoB) can be defined as a network of smart objects placed in, on, and around the human body, allowing for intra- and inter-body communications. This position paper aims to provide a glimpse into the opportunities created by implantable, injectable, ingestible, and wearable IoB devices. The paper starts with a thorough discussion of application-specific design goals, technical challenges, and enabling of communication standards. We discuss the reason that the highly radiative nature of radio frequency (RF) systems results in inefficient systems due to over-extended coverage that causes interference and becomes susceptible to eavesdropping. Body channel communication (BCC) presents an attractive, alternative wireless technology by inherently coupling signals to the human body, resulting in highly secure and efficient communications. The conductive nature of body tissues yields a better channel quality, while the BCC's operational frequency range (1-100 kHz) eliminates the need for radio front-ends. State-of-the-art BCC transceivers can reach several tens of Mbps data rates at pJ/b energy efficiency levels that support IoB devices and applications. Furthermore, as the cyber and biological worlds meet, security risks and privacy concerns take center stage, leading to a discussion of the multi-faceted legal, societal, ethical, and political issues related to technology governance.</div>


2021 ◽  
Author(s):  
Mohammed Jameel Hakeem

Abstract Radio Frequency Identification (RFID) is a promising technology to provide automated contactless identification of objects, people and animals. The identification process is performed as the reader receives simultaneous responses from various tags over a shared wireless channel and without no requirement of line-of-sight in the interrogation zone. The communication between the reader and tags is separated into two processes: identification and acknowledgment processes. Both processes suffer from serious drawbacks that limit the proliferation of RFID. Such drawbacks are security and privacy and collision problems. This thesis has two main parts. The first part examines the security and privacy of the existing RFID authentication protocols. We introduced a novel cryptographic scheme, Hacker Proof Authentication Protocol (HPAP) that allows mutual authentication and achieves full security by deploying tag static identifier, updated timestamp, a one-way hash function and encryption keys with randomized update using Linear Feedback Shift Register (LFSR). Cryptanalysis and simulation show that the protocol is secure against various attacks. In comparison with the various existing RFID authentication protocols, our protocol has less computation load, requires less storage, and costs less. The second part focuses on solving RFID collision arbitration imposed by the shared wireless link between a reader and the many tags distributed in the interrogation zone. In most proposed anticollision algorithms, tags reply randomly to the time slots chosen by the reader. Since more than two tags may choose the same time slot in a frame, this Random Access (RA) causes garbled data at the reader side resulting the identification process fails. Towards this challenge, two ALOHA based anti-collision algorithms that adopt a new way for tags to choose their replied time slots to enhance system efficiency are presented. In MBA and LTMBA, tags use modulo function to choose their owned time slot. The difference between the two algorithms relies on the method by which the reader estimates the next frame size. The performance evaluation of the two algorithms shows better performance than previously proposed algorithms in terms of fewer communication rounds and fewer collided/empty slots considering the limitation of the EPCglobal Class-1 Gen-2 standard.


Author(s):  
Gengfa Fang ◽  
Eryk Dutkiewicz ◽  
Rein Vesilos

Medical Body Area Network (MBAN) is a new wireless communications technology designed to sense human’s vital signals through tiny nodes in, on and around the human body wirelessly. MBAN will play an important role in enabling ubiquitous and noninvasive telemetry and healthcare systems in the future. In this paper, we analyze the interference in MBAN both from legacy wireless networks and neighbouring MBANs. We then study the possible solutions to fight against these interferences in MBAN including the channel sharing scheme to solve the inter-network interference. Experiments are carried out based on MQWIN400 radio platform to studythe wireless channel in 400MHz band. We found the receiver’s mobility makes the channel quite dynamic because of multipath effect.


Sign in / Sign up

Export Citation Format

Share Document