Title
Heart-to-heart (H2H): authentication for implanted medical devices
Abstract
We present Heart-to-Heart (H2H), a system to authenticate external medical device controllers and programmers to Implantable Medical Devices (IMDs). IMDs, which include pacemakers and cardiac defibrillators, are therapeutic medical devices partially or wholly embedded in the human body. They often have built-in radio communication to facilitate non-invasive reprogramming and data readout. Many IMDs, though, lack well designed authentication protocols, exposing patients to over-the-air attack and physical harm. H2H makes use of ECG (heartbeat data) as an authentication mechanism, ensuring access only by a medical instrument in physical contact with an IMD-bearing patient. Based on statistical analysis of real-world data, we propose and analyze new techniques for extracting time-varying randomness from ECG signals for use in H2H. We introduce a novel cryptographic device pairing protocol that uses this randomness to protect against attacks by active adversaries, while meeting the practical challenges of lightweight implementation and noise tolerance in ECG readings. Finally, we describe an end-to-end implementation in an ARM-Cortex M-3 microcontroller that demonstrates the practicality of H2H in current IMD hardware. Previous schemes have had goals much like those of H2H, but with serious limitations making them unfit for deployment---such as naively designed cryptographic pairing protocols (some of them recently broken). In addition to its novel analysis and use of ECG entropy, H2H is the first physiologically-based IMD device pairing protocol with a rigorous adversarial model and protocol analysis.
Year
DOI
Venue
2013
10.1145/2508859.2516658
ACM Conference on Computer and Communications Security
Keywords
Field
DocType
authentication protocol,ecg entropy,cryptographic pairing protocol,ecg signal,novel analysis,medical instrument,ecg reading,data readout,external medical device controller,heartbeat data,security protocols
Heartbeat,Internet privacy,Authentication,Cryptographic protocol,Protocol analysis,Cryptography,Computer science,Computer security,Authentication protocol,Microcontroller,Noise tolerance
Conference
Citations 
PageRank 
References 
58
1.60
26
Authors
3
Name
Order
Citations
PageRank
Masoud Rostami127410.32
Ari Juels27263590.42
Farinaz Koushanfar33055268.84