Download presentation
Presentation is loading. Please wait.
Published byBerniece Hunt Modified over 9 years ago
1
Security and Privacy for Implantable Medical Devices Presented by : Dilip Simha.C.R.
2
Authors and Publication Daniel Halperin, Thomas S. Heydt-Benjamin, Kevin Fu, Tadayoshi Kohno, and William H. Maisel Pervasive Computing, IEEE (Volume:7, Issue: 1 )Pervasive Computing, IEEE Issue: 1
3
Topics What are IMD’s?. Need of Security and Privacy. Design issues Types of intruders Methods to deal with security issues Tensions Future research
4
What are Implantable Medical Devices Monitor and treat physiological conditions. Placed inside the body Examples Pacemakers ICD’s(Implantable cardiac defibrillators) Drug delivery systems Neurostimulators
5
Importance of IMD’s Used in treatment of diseases like Cardiac arrhythmia Diabetes Parkinson’s disease Over 25 million US citizens are dependent on IMD’s.
6
Modern day IMD’s Enable remote monitoring over long-range Communicate with other interoperating IMD’s
7
Criteria for design of IMD’s Safety and Utility goals Security and Privacy goals
8
Safety and Utility goals Data accuracy Device Identification Configurability Updatable Software Multidevice Coordination Auditable
9
Data accuracy Measured and stored data should be accurate. Incudes data about physiological conditions and timing.
10
Device Identification Authorized personnel must detect the presence of IMD’s. Example- ICD’s removal before heart surgery FDA considered attaching RFID(Radio Frequency ID) to IMD’s.
11
Configurability Authorized personnel must be able to change IMD settings. ICD’s and Open loop Insulin pumps.
12
Updatable Software Appropriately engineered updates are necessary Updates need to come from authorized personnel
13
Multidevice Coordination Current IMD’s have some examples of coordination CROS(Contralateral routing of signals) hearing Aid. Projected future devices use more coordination closed loop insulin delivery system
14
Auditable In case of failure Device’s operational history to manufacturers. Might differ from the data received by healthcare professionals.
15
Resource Efficient Power consumption More energy for wireless communications. Must minimize computation and communication. Data storage requirements
16
Security and Privacy Goals Authorization Availability Device software and settings Device Existence Privacy Device-type privacy Specific Device ID privacy Measurement and Log privacy Bearer privacy Data integrity
17
Authorization Personal Authorization Specific basic rights are granted Patients and primary-care physicians Role-based authorization Authorized for a set of tasks Physician or Ambulance Computer IMD selection Only interact with intended devices.
18
Availability DoS attack prevention Intruder should not be able to Drain battery Overflow data storage Jam the communication
19
Device software and settings Authorized personnel should only modify IMD’s. Avoid accidental malfunctions.
20
Device existence privacy IMD’s are expensive. Avoid detection by unauthorized personnel.
21
Specific device ID privacy Attacker should not be able to track IMD’s. Location privacy.
22
Measurement and log privacy Private information about measurements and audit log data.
23
Bearer Privacy Private information of patient Name Medical history Detailed diagnoses.
24
Data integrity Avoid tampering of past data. Avoid inducing modifications to future data.
25
Classes of adversaries Passive adversaries Active adversaries Coordinated adversaries Insiders
26
Tensions Security v/s Accessibility Security v/s Device resources Security v/s Usability
27
Research directions Fine grained access control Open access with revocation and second- factor authentication Accountability Patient awareness via secondary channels Authorization via secondary channels Shift computation to external devices
28
QUESTIONS?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.