| Literature DB >> 25276797 |
Abstract
After two recent security attacks against implantable medical devices (IMDs) have been reported, the privacy and security risks of IMDs have been widely recognized in the medical device market and research community, since the malfunctioning of IMDs might endanger the patient's life. During the last few years, a lot of researches have been carried out to address the security-related issues of IMDs, including privacy, safety, and accessibility issues. A physician accesses IMD through an external device called a programmer, for diagnosis and treatment. Hence, cryptographic key management between IMD and programmer is important to enforce a strict access control. In this paper, a new security architecture for the security of IMDs is proposed, based on a 3-Tier security model, where the programmer interacts with a Hospital Authentication Server, to get permissions to access IMDs. The proposed security architecture greatly simplifies the key management between IMDs and programmers. Also proposed is a security mechanism to guarantee the authenticity of the patient data collected from IMD and the nonrepudiation of the physician's treatment based on it. The proposed architecture and mechanism are analyzed and compared with several previous works, in terms of security and performance.Entities:
Mesh:
Year: 2014 PMID: 25276797 PMCID: PMC4158127 DOI: 10.1155/2014/543051
Source DB: PubMed Journal: Biomed Res Int Impact factor: 3.411
Figure 1(a) Generic patient session protocol and (b) remote monitoring service for IMD patients.
Figure 2(a) 2-Tier security model and (b) 3-Tier security model.
Figure 3IMD initialization.
Figure 5Threat model and preestablished security associations.
Figure 4Proposed protocol for secure patient session.
Figure 6Notations and inference rules of BAN logic.
Figure 7Formal verification for correctness of the proposed protocol.
Security comparisons.
| [ | [ | [ | [ | Proposed | |
|---|---|---|---|---|---|
| Security model | 2-Tier | 2-Tier | 2-Tier | 3-Tier w/PD | 3-Tier w/HAS |
| Cryptographic method for authentication | Password | CR with | CR with | CR with | CR with |
| Authentication type | Unilateral | Unilateral | Mutual | Unilateral | Mutual |
| SK generation | None | None | Diffie- | PD | HAS |
| Key management | N/A | IMD-specific key from MK | N/A | PD maintains multiple PKs | RK and WK from LK |
| Multiple programmers | N/A | Insecure | Secure | Insecure | Secure |
| Patient data | N/A | N/A | N/A | N/A | Secure |
| Treatment protection | N/A | N/A | N/A | N/A | Possible with |
CR: challenge-response; PD: personal device; MK: master key; SK: session key; LK: long-term key; PK: public key; RK: Read-Key; WK: Write-Key.
Performance comparisons.
| 2009 | [ | [ | Proposed w/HAS | |||||
|---|---|---|---|---|---|---|---|---|
| IMD | Prog. | IMD | PD | Prog. | IMD | Prog. | HAS | |
| Authentication/integrity | 1 mac | 1 mac | 1 enc | 1 enc | 2 enc/1 dec | 2 mac | 4 mac | 2 mac |
| SK generation/distribution | 1 DH w/RBE | 1 DH w/RBE | 1 dec | 1 Penc | 1 Pdec | 1 kdf | 1 dec | 1 kdf |
| No. msg | 4 |
IMP-PD: 1/PD-Prog.: 3 | IMD-Prog.: 2/Prog.-HAS: 2 | |||||
| Patient data protection | N/A | N/A | 1 enc | 1 enc | 1 hash | |||
| Treatment protection | N/A | N/A | N/A | 1 sig | 1 ver | |||
PD: personal device; Prog.: programmer; No. msg: number of messages exchanged; mac: MAC function; UniL: unilateral authentication; RBE: rapid bit exchange; DH: Diffie-Hellman; hash: hash function; Penc: public-key encryption; Pdec: public-key decryption; enc: symmetric encryption; dec: symmetric decryption; kdf: key derivation function; sig: signature generation; ver: signature verification.