Security and Privacy for Implantable Medical Devices Presented by Tuo Yu 1.

Slides:



Advertisements
Similar presentations
CS898T Mobile and Wireless Network Handheld Device Security By Yuan Chen July 25 th, 2005.
Advertisements

Thomas S. Messerges, Ezzat A. Dabbish Motorola Labs Shin Seung Uk.
David Grochocki et al.  Lures Potential attackers  Smartmeters do two way communication  Millions of Meters has to be replaced  Serious damages just.
Information Risk Management Key Component for HIPAA Security Compliance Ann Geyer Tunitas Group
Security that is... Ergonomic, Economical and Efficient! In every way! Stonesoft SSL VPN SSL VPN.
Leveraging a Single Platform - Connecting a Statewide Healthcare Ecosystem Michigan Association of Health Plans Rick Murdock Executive Director Michigan.
Access Control Methodologies
ATA Practice Guidelines for Video- based Online Mental Health Services “The guidelines pertain to telemental health conducted between two parties, and.
Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses Authors: Daniel Halperin, Thomas S. Heydt-Benjamin, Benjamin.
Network Isolation Using Group Policy and IPSec Paula Kiernan Senior Consultant Ward Solutions.
Fundamentals of Computer Security Geetika Sharma Fall 2008.
Authentication in Mobile Ad-hoc Network (MANET) Student Ståle Jonny Berget Superviser Chik How Tan.
Security Controls – What Works
Chapter 19: Network Management Business Data Communications, 4e.
Information Security Policies and Standards
 Guarantee that EK is safe  Yes because it is stored in and used by hw only  No because it can be obtained if someone has physical access but this can.
FIT3105 Smart card based authentication and identity management Lecture 4.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Security Models for Trusting Network Appliances From : IEEE ( 2002 ) Author : Colin English, Paddy Nixon Sotirios Terzis, Andrew McGettrick Helen Lowe.
Lecture 11 Reliability and Security in IT infrastructure.
DATA SECURITY AND PRIVACY IN WIRELESS BODY AREA NETWORKS MING LI AND WENJING LOU, WORCESTER POLYTECHNIC INSTITUTE KUI REN, ILLINOIS INSTITUTE OF TECHNOLOGY.
Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses Zac Chupka Jeff Signore.
Information Systems Controls for System Reliability -Information Security-
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
IOT5_ GISFI # 05, June 20 – 22, 2011, Hyderabad, India 1 Privacy Requirements of User Data in Smart Grids Jaydip Sen Tata Consultancy Services Ltd.
NUAGA May 22,  IT Specialist, Utah Department of Technology Services (DTS)  Assigned to Department of Alcoholic Beverage Control  PCI Professional.
Information Security Technological Security Implementation and Privacy Protection.
Introduction Implantable Medical Devices (IMDs) are vulnerable to exploitation (last paper) Unauthorized data retrieval Malicious commands Millions of.
HIPAA PRIVACY AND SECURITY AWARENESS.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Security Security is a measure of the system’s ability to protect data and information from unauthorized access while still providing access to people.
Web Policy Zeitgeist Panel SWPW 2005 – Galway, Ireland Piero Bonatti, November 7th, 2005.
What does “secure” mean? Protecting Valuables
© 2003 East Collaborative e ast COLLABORATIVE ® eC SoftwareProducts TrackeCHealth.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
1 22 August 2001 The Security Architecture of the M&M Mobile Agent Framework P. Marques, N. Santos, L. Silva, J. Silva CISUC, University of Coimbra, Portugal.
CSC8320. Outline Content from the book Recent Work Future Work.
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
Security and Privacy for Implantable Medical Devices Presented by : Dilip Simha.C.R.
Chapter 6 – Data Handling and EPR. Electronic Health Record Systems: Government Initiatives and Public/Private Partnerships EHR is systematic collection.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
1 Smart Grid Cyber Security Annabelle Lee Senior Cyber Security Strategist Computer Security Division National Institute of Standards and Technology June.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
Identity Management: A Technical Perspective Richard Cissée DAI-Labor; Technische Universität Berlin
They Can Hear Your Heartbeats: Non-Invasive Security for Implantable Medical Devices Shyamnath Gollakota, Haitham Hassanieh, Benjamin Ransford, Dina Katabi,
Virtual Workspaces Kate Keahey Argonne National Laboratory.
Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero- Power Defenses By: Halperin, Heydt—Benjamin, Ransford, Clark, Defend,
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Chap1: Is there a Security Problem in Computing?.
The Digital Crime Scene: A Software Perspective Written By: David Aucsmith Presented By: Maria Baron.
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
INTRODUCTION TO COMPUTER & NETWORK SECURITY INSTRUCTOR: DANIA ALOMAR.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
IT Audit for non-IT auditors Cornell Dover Assistant Auditor General 31 March 2013.
Principles Identified - UK DfT -
Security Issues in Information Technology
Cloud Security for eHealth – Study Validation
Chapter 19: Network Management
THE STEPS TO MANAGE THE GRID
Internet of Things (IoT)
Proximity-based Access Control for Implantable Medical Devices
Module 2 OBJECTIVE 14: Compare various security mechanisms.
Security in SDR & cognitive radio
They Can Hear Your Heartbeats: Non-Invasive Security for Implantable Medical Devices Shyamnath Gollakota, Haitham Hassanieh, Benjamin Ransford, Dina Katabi,
Presentation transcript:

Security and Privacy for Implantable Medical Devices Presented by Tuo Yu 1

Implantable Medical Devices Implantable medical devices (IMDs) monitor and treat physiological conditions within the body.  Pacemakers  Implantable Cardiac Defibrillators (ICDs)  Drug delivery systems  Neurostimulators By 2008, 25 million US citizens reliant on them for life-critical functions. 2 groups.csail.mit.edu

Implantable Cardiac Defibrillators Sense cardiac events, execute therapies, and store measurements such as electrocardiograms. Healthcare professionals configure the settings on ICDs using an external device called a programmer. 3

At-home monitors wirelessly collect data from ICDs and relay it to a central repository, which is accessible to doctors. 4 ICD Implantable Cardiac Defibrillators

Criteria for IMDs Safety  The IMD should net much greater good than harm. Utility  The IMD should be useful to both clinicians and patients. Security Privacy 5

Motivation Providing safety doesn’t prevent security and privacy problems. Our understanding of how device security and privacy affect medical safety and treatment utility is still limited.  What should be the security and privacy design goals for IMDs? 6

Related Work “Security for Pervasive Healthcare”, (Venkatasubramanian et al., Security in Distributed, Grid, Mobile, and Pervasive Computing, 2007)  Efficient methods for securely communicating with medical sensors, including IMDs.  Controlling access to patient data after aggregation into a management plane.  Legislative approaches for improving security. Only considers the security and privacy of IMD data management by external applications. This paper focuses on the challenges and design criteria inherent in IMDs themselves. 7

A General Framework Present a general framework for evaluating the security and privacy of next-generation wireless IMDs.  Find inherent tensions between security, privacy and traditional goals such as safety and utility.  Present a set of possible research directions.  Provide a foundation for IMD manufacturers to evaluate, understand, and address the security and privacy challenges. 8

Criteria for IMDs Safety and utility goals Security and privacy goals 9

Safety and Utility Goals ①Data access. Data should be available to appropriate entities. ②Data accuracy. Measured and stored data should be accurate. 10 Example: a clock function abnormality

Safety and Utility Goals ③Device identification. An IMD should make its presence and type known to authorized entities. ④Auditable. In the event of a failure, the manufacturer should be able to audit the device’s operational history. ⑤Configurability. ⑥Updatable software. ⑦Resource efficient. … 11

Security and Privacy Goals ①Authorization. Personal authorization. Specific sets of people can perform specific tasks. 12 Tasks Patient APhysician APhysician B ConfigureX√√ Update SoftwareXX√ Read Log√√√

Security and Privacy Goals ①Authorization. Role-based authorization. An entity is authorized for a set of tasks on the basis of its role. 13 Tasks PatientPhysicians ConfigureX√ Update SoftwareXX Read Log√√

Security and Privacy Goals ①Authorization. IMD selection. When an external entity communicates with one or more IMDs, it must ensure it communicates with only the intended devices. 14

Security and Privacy Goals ②Availability. An adversary should not be able to mount a successful denial-of-service (DoS) attack against an IMD. 15

Security and Privacy Goals ③Device software and settings. Only authorized parties should be allowed to modify an IMD or to otherwise trigger specific device behavior. 16

Security and Privacy Goals ④Device-existence privacy. An unauthorized party should not be able to remotely determine that a patient has one or more IMDs. 17

Security and Privacy Goals Even if a device is revealed, ⑤Device-type privacy. IMDs’ type should still only be disclosed to authorized entities. ⑥Specific-device ID privacy. An adversary should not be able to wirelessly track individual IMDs. ⑦Bearer privacy. An adversary should not be able to exploit an IMD’s properties to identify the bearer or extract private information about the patient. 18

Security and Privacy Goals ⑧Measurement and log privacy. An unauthorized party should not be able to learn private information about the measurements or audit log data stored on the device. ⑨Data integrity. An adversary should not be able to tamper with past device measurements or log files or induce specious modifications into future data. 19

Classes of Adversaries Passive adversaries Active adversaries Coordinated adversaries Insiders Standard equipment (Commercial equipment, stolen programmer) Custom equipment (home-brewed equipment) 20

Tensions - Security vs Accessibility Scenario A Emergency room Accessibility Security  21 unconscious I need: Physiological Information IMD settings patient’s name ….

Tensions - Security vs Accessibility Scenario B IMDs use strong access-control and cryptographic mechanisms. Security Accessibility  22 unconscious No access to IMD !

Tensions - Security vs Device Resources Strong security mechanisms  Can be expensive in terms of both computational time and energy consumption.  Amplifies the effects of certain malicious DoS attacks.  Maintaining transaction logs potentially overflows a device’s onboard memory. 23

Tensions - Security vs Usability Long-distance wireless communication between IMDs and external devices  Usability : offers continuous at-home monitoring and flexibility in clinical settings.  Security  : increases exposure to both passive and active adversaries. Security mechanisms shouldn’t overly complicate user interfaces on the external devices. 24

Research directions ①Fine-grained access control 25 unconscious Primary-care facility or manufacturer Manufacturer, serial number, the patient’s primary-care facility Network

Research directions ①Fine-grained access control 26 unconscious Primary-care facility or manufacturer Network Request Review

Research directions ①Fine-grained access control 27 unconscious Primary-care facility or manufacturer Network Signed credential Approve

Research directions ①Fine-grained access control 28 unconscious Primary-care facility or manufacturer Access IMD Network

Ensure that the manufacturer or primary-care facility has ultimate control over which external devices can interact with a particular IMD. What if the network connection is severed? Research directions 29 unconscious Network

Research directions ②Open access with revocation and second-factor authentication  Revoke access from lost or stolen equipment through automatically expiring certificates.  This approach exposes IMDs to compromised equipment for short periods.  IMD programmers could require a secondary authentication token (e.g., a smart card) tied to a medical professional’s identity.  It might decrease usability and increase emergency response time. 30

Research directions ③Accountability Deter malicious activities by correlating them with a cryptographic audit log that can’t be undetectably modified.  Physicians could review the log when detecting certain anomalies in a patient’s care. 31

Research directions ④Patient awareness via secondary channels Use secondary channels to inform patients about their IMDs’ security status.  IMD issues a notification whenever it establishes a wireless connection with an external device or whenever a critical setting changes.  Does not directly prevent attacks but help detect attacks. 32

Research directions ⑤Authorization via secondary channels Use near-field communication for initial activation. After activation, the physician can program the device from a greater distance for a longer period of time. 33 Near-field activation

Research directions ⑤Authorization via secondary channels Use near-field communication for initial activation. After activation, the physician can program the device from a greater distance for a longer period of time. 34 Program the device

Research directions ⑤Authorization via secondary channels IMD ceases wireless communications when its sensors (e.g., built-in accelerometers) detects that its environment has changed significantly. 35

Research directions ⑤Authorization via secondary channels IMD ceases wireless communications when its sensors (e.g., built-in accelerometers) detects that its environment has changed significantly. 36

Research directions ⑥Shift computation to external devices Offload computation to external devices via client puzzles  Reduce a DoS attack’s efficacy. Use a resource-rich device to mediate communication between an IMD and an external programmer. 37 Mediator Lighter-weight symmetric encryption Expensive asymmetric encryption IMD Programmer

Conclusion This paper shows the inherent tensions between security, privacy and traditional goals such as safety and utility. This paper proposes research directions for mitigating the tensions between the various goals.  An ultimate solution will require experts from the medical and security communities and all other relevant communities to collaboratively make decisions on both mechanisms and policies. 38

Discussion 39 What if the token of the emergency room is leaked? Is it reasonable to consider the design criteria inherent in IMDs alone ? unconscious Primary-care facility or manufacturer Network Request Review

40 Thank you

Motivation “… to date, most devices have been isolated from networks and do not interoperate. This paradigm is changing now, creating new challenges in medical device design.” Providing safety doesn’t prevent security and privacy problems. Our understanding of how device security and privacy interact with and affect medical safety and treatment utility is still limited Paul Jones from the US Food and Drug Administration, personal communication, Aug. 2007