Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2903150.2903165acmconferencesArticle/Chapter ViewAbstractPublication PagescfConference Proceedingsconference-collections
research-article

Secure key-exchange protocol for implants using heartbeats

Published: 16 May 2016 Publication History

Abstract

The cardiac interpulse interval (IPI) has recently been proposed to facilitate key exchange for implantable medical devices (IMDs) using a patient's own heartbeats as a source of trust. While this form of key exchange holds promise for IMD security, its feasibility is not fully understood due to the simplified approaches found in related works. For example, previously proposed protocols have been designed without considering the limited randomness available per IPI, or have overlooked aspects pertinent to a realistic system, such as imperfect heartbeat detection or the energy overheads imposed on an IMD. In this paper, we propose a new IPI-based key-exchange protocol and evaluate its use during medical emergencies. Our protocol employs fuzzy commitment to tolerate the expected disparity between IPIs obtained by an external reader and an IMD, as well as a novel way of tackling heartbeat misdetection through IPI classification. Using our protocol, the expected time for securely exchanging an 80-bit key with high probability (1-10−6) is roughly one minute, while consuming only 88 μJ from an IMD.

References

[1]
S.-D. Bao et al. A novel key distribution of body area networks for telemedicine. In IEEE BioCas, pages 1--17, 2004.
[2]
S.-D. Bao et al. Using the timing information of heartbeats as an entity identifier to secure body sensor network. In T-ITB, pp. 772--779, volume 12. IEEE, 2008.
[3]
A. Bogdanov et al. Present: An ultra-lightweight block cipher. In CHES, pages 450--466. Springer, 2007.
[4]
F. M. Bui and D. Hatzinakos. Biometric methods for secure communications in body sensor networks: resource-efficient key management and signal-level data scrambling. EURASIP Journal on Advances in Signal Processing, 2008:109, 2008.
[5]
S.-Y. Chang et al. Body area network security: robust key establishment using human body channel. In USENIX HealthSec, 2012.
[6]
A. Ghaffari et al. A new mathematical based qrs detector using continuous wavelet transform. CEE, 34(2):81--91, 2008.
[7]
S. K. Gupta, T. Mukherjee, and K. Venkatasubramanian. Criticality aware access control model for pervasive applications. In PerCom. IEEE, 2006.
[8]
D. Halperin et al. Security and Privacy for Implantable Medical Devices. PC, pages 30--39, 2008.
[9]
A. Juels and M. Sudan. A fuzzy vault scheme. Designs, Codes and Cryptography, 38(2):237--257, 2006.
[10]
A. Juels and M. Wattenberg. A fuzzy commitment scheme. In ACM CCS, pages 28--36, 1999.
[11]
J. P. Madeiro et al. An innovative approach of qrs segmentation based on first-derivative, hilbert and wavelet transforms. MED ENG PHYS, 34(9):1236--1246, 2012.
[12]
F. Miao et al. A modified fuzzy vault scheme for biometrics-based body sensor networks security. In IEEE GLOBECOM, pages 1--5, 2010.
[13]
NIST. Fips 202: Sha-3 standard: Permutation-based hash and extendable-output functions. Federal Information Processing Standards Publication, 2015.
[14]
C. C. Poon et al. A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health. IEEE Commun. Mag., pages 73--81, 2006.
[15]
M. Rostami et al. Heart-to-heart (h2h): authentication for implanted medical devices. In ACM CCS, pages 1099--1112, 2013.
[16]
M. Rushanan et al. Sok: Security and privacy in implantable medical devices and body area networks. Proceedings of the IEEE S&P, pages 529--539, 2014.
[17]
R. M. Seepers et al. Peak misdetection in heart-beat-based security characterization and tolerance. IEEE EMBC, 2014.
[18]
R. M. Seepers et al. Enhancing heart-beat-based security for mhealth applications. IEEE J-BHI, 2015.
[19]
R. M. Seepers et al. On using a von neumann extractor in heart-beat-based security. In IEEE Trustcom, pages 491--498, 2015.
[20]
C. Strydis et al. A system architecture, processor and communication protocol for secure implants. TACO, 2013.
[21]
N. Verma et al. A micro-power eeg acquisition soc with integrated seizure detection processor for continuous patient monitoring. In Symp. VLSI Circuits, pages 62--63. IEEE, 2009.
[22]
G.-H. Zhang et al. Analysis of using interpulse intervals to generate 128-bit biometric random binary sequences for securing wireless body sensor networks. T-ITB, 16(1):176--182, 2012.
[23]
G. Zheng, G. Fang, R. Shankaran, and M. A. Orgun. Encryption for implantable medical devices using modified one-time pads. Access, IEEE, 3:825--836, 2015.

Cited By

View all
  • (2023)H2K: A Heartbeat-Based Key Generation Framework for ECG and PPG SignalsIEEE Transactions on Mobile Computing10.1109/TMC.2021.309638422:2(923-934)Online publication date: 1-Feb-2023
  • (2022)A Comparative Analysis on Blockchain versus Centralized Authentication Architectures for IoT-Enabled Smart Devices in Smart Cities: A Comprehensive Review, Recent Advances, and Future Research DirectionsSensors10.3390/s2214516822:14(5168)Online publication date: 10-Jul-2022
  • (2022)Dual-Factor WBAN Enhanced Authentication System Based on Iris and ECG DescriptorsIEEE Sensors Journal10.1109/JSEN.2022.319864522:19(19000-19009)Online publication date: 1-Oct-2022
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
CF '16: Proceedings of the ACM International Conference on Computing Frontiers
May 2016
487 pages
ISBN:9781450341288
DOI:10.1145/2903150
  • General Chairs:
  • Gianluca Palermo,
  • John Feo,
  • Program Chairs:
  • Antonino Tumeo,
  • Hubertus Franke
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 16 May 2016

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article

Funding Sources

  • Horizon-2020

Conference

CF'16
Sponsor:
CF'16: Computing Frontiers Conference
May 16 - 19, 2016
Como, Italy

Acceptance Rates

CF '16 Paper Acceptance Rate 30 of 94 submissions, 32%;
Overall Acceptance Rate 273 of 785 submissions, 35%

Upcoming Conference

CF '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)10
  • Downloads (Last 6 weeks)0
Reflects downloads up to 08 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2023)H2K: A Heartbeat-Based Key Generation Framework for ECG and PPG SignalsIEEE Transactions on Mobile Computing10.1109/TMC.2021.309638422:2(923-934)Online publication date: 1-Feb-2023
  • (2022)A Comparative Analysis on Blockchain versus Centralized Authentication Architectures for IoT-Enabled Smart Devices in Smart Cities: A Comprehensive Review, Recent Advances, and Future Research DirectionsSensors10.3390/s2214516822:14(5168)Online publication date: 10-Jul-2022
  • (2022)Dual-Factor WBAN Enhanced Authentication System Based on Iris and ECG DescriptorsIEEE Sensors Journal10.1109/JSEN.2022.319864522:19(19000-19009)Online publication date: 1-Oct-2022
  • (2021)Optimized Fuzzy Commitment Based Key Agreement Protocol for Wireless Body Area NetworkIEEE Transactions on Emerging Topics in Computing10.1109/TETC.2019.29491379:2(839-853)Online publication date: 1-Apr-2021
  • (2021)Information Theoretic Key Agreement Protocol based on ECG signals2021 IEEE Global Communications Conference (GLOBECOM)10.1109/GLOBECOM46510.2021.9685523(1-6)Online publication date: 7-Dec-2021
  • (2021)Securing Implantable Medical Devices Using Ultrasound WavesIEEE Access10.1109/ACCESS.2021.30835769(80170-80182)Online publication date: 2021
  • (2020)Augmented Randomness for Secure Key Agreement using Physiological Signals2020 IEEE Conference on Communications and Network Security (CNS)10.1109/CNS48642.2020.9162286(1-9)Online publication date: Jun-2020
  • (2020)IMDfence: Architecting a Secure Protocol for Implantable Medical DevicesIEEE Access10.1109/ACCESS.2020.30156868(147948-147964)Online publication date: 2020
  • (2019)Study on peak misdetection recovery of key exchange protocol using heartbeatThe Journal of Supercomputing10.1007/s11227-018-2616-y75:6(3288-3301)Online publication date: 1-Jun-2019
  • (2018)Energy-Aware Key Exchange for Securing Implantable Medical DevicesSecurity and Communication Networks10.1155/2018/18093022018Online publication date: 1-Jan-2018
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media