4.6 Article

Securing Implantable Medical Devices Using Ultrasound Waves

Journal

IEEE ACCESS
Volume 9, Issue -, Pages 80170-80182

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/ACCESS.2021.3083576

Keywords

Ultrasonic imaging; Security; Couplings; Energy harvesting; Batteries; Wireless communication; Radio frequency; Authentication protocol; battery-depletion attack; body-coupled communication; denial-of-service attack; IMD; implantable medical device; ultrasound; zero-power defense

Funding

  1. EU [780572]

Ask authors/readers for more resources

Modern implantable medical devices are at risk of security attacks due to their wireless connectivity, with SecureEcho being proposed as a device-pairing scheme to establish trust between IMD and external reader, achieving ZPD without energy harvesting, and successfully testing the security of the ultrasound channel.
Modern Implantable Medical Devices (IMDs) are vulnerable to security attacks because of their wireless connectivity to the outside world. One of the main security challenges is establishing trust between the IMD and an external reader/programmer in order to facilitate secure communication. Numerous device-pairing schemes have been proposed to address this specific challenge. However, they alone cannot protect against a battery-depletion attack in which the adversary is able to keep the IMD occupied with continuous authentication requests until the battery empties. As a result, energy harvesting has been employed as an ancillary mechanism for implementing Zero-Power Defense (ZPD) functionality in order to protect against such a low-cost attack. In this paper, we propose SecureEcho, a device-pairing scheme based on MHz-range ultrasound that establishes trust between the IMD and an external reader. In addition, SecureEcho achieves ZPD without requiring any energy harvesting, which significantly reduces the design complexity. We also provide a proof-of-concept implementation and a first ever security evaluation of the ultrasound channel, which proves that it is infeasible for the attacker to eavesdrop or insert messages even from a range of a few millimeters.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available