Google scholar arxiv informatics ads IJAIS publications are indexed with Google Scholar, NASA ADS, Informatics et. al.

Call for Paper


April Edition 2021

International Journal of Applied Information Systems solicits high quality original research papers for the April 2021 Edition of the journal. The last date of research paper submission is March 15, 2021.

IMD-IDS a specification based Intrusion Detection system for Wireless IMDs

Monika Darji, Bhushan Trivedi Published in Wireless

International Journal of Applied Information Systems
Year of Publication: 2013
© 2012 by IJAIS Journal
Download full text
  1. Monika Darji and Bhushan Trivedi. Article: IMD-IDS a specification based Intrusion Detection system for Wireless IMDs. International Journal of Applied Information Systems 5(6):19-23, April 2013. BibTeX

    	author = "Monika Darji and Bhushan Trivedi",
    	title = "Article: IMD-IDS a specification based Intrusion Detection system for Wireless IMDs",
    	journal = "International Journal of Applied Information Systems",
    	year = 2013,
    	volume = 5,
    	number = 6,
    	pages = "19-23",
    	month = "April",
    	note = "Published by Foundation of Computer Science, New York, USA"


Implantable Medical Devices (IMDs) have emerged as a break-through technology for e-healthcare. Healthcare providers use wireless medium of communication to monitor patients, perform diagnostics and download data in hospitals or from homes. This provides great convenience, flexibility, cost effectiveness and timely patient care. These implanted devices contain sensitive personal data and other health related information and are controlled through commands issued by healthcare staff wirelessly. Wireless medium of communication introduces several vulnerabilities which if exploited might have severe implications on the security, privacy and safety of patients using IMDs. In this paper we aim to discuss the security and privacy issues for wireless communication of Implantable Medical Devices and come out with a threat model. We also look into the methods proposed in literature to mitigate them and analyze their suitability. Intrusion Detection has gained importance over the years especially for wireless adhoc networks. Seeing the importance of constantly monitoring the IMD-reader communication in detecting and deterring security attacks, we propose a model called IMD-IDS to be integrated with cellphone or PDA, which people can carry with them. The IMD-IDS manages IMD keys, authenticates IMD readers, and blocks attempted accesses to the patients IMD from unauthorized readers using specification based intrusion detection. It monitors the communication between IMD-reader for detecting malicious activities and help patients to take corrective actions if need be. This research is the first effort to apply specification-based detection techniques to detect attacks in the IMD wireless communication.


  1. Halperin, D. , Heydt-Benjamin, T. S. , Fu, K. , Kohno, T. , Maisel, W. H. , "Security and Privacy for Implantable Medical Devices," in IEEE Pervasive Computing, vol. 7, pp. 30–39 (2008)
  2. Halperin, D. , Heydt-Benjamin, T. S. , Ransford, B. , Clark, S. S. , Defend, B. , Morgan, W. , Fu, K. , Kohno, T. , Maisel, W. H. , "Pacemakers and Implantable Cardiac De?brillators: Software Radio Attacks and Zero-Power Defenses," in IEEE Symposium on Security and Privacy (2008)
  3. Israel, C. W. , Barold, S. S. , "Pacemaker Systems as Implantable Cardiac Rhythm Monitors," in American Journal of Cardiology (2001)
  4. Rasmussen, K. B. , Castelluccia, C. , Heydt-Benjamin, T. S. , Capkun, S. , "Proximity-Based Access Control for Implantable Medical Devices," in ACM Conference on Computer and Communications Security (2009)
  5. Fu, K. , "Inside Risks, Reducing the Risks of Implantable Medical Devices: A Prescription to Improve Security and Privacy of Pervasive Health Care. ," in Communications of the ACM, vol. 52(6), pp. 25–2` (2009)
  6. Schechter, S. , "Security that is Meant to be Skin Deep: Using Ultraviolet Micropigmentation to Store Emergency-Access Keys for Implantable Medical Devices," in USENIX Workshop on Health Security and Privacy (2010)
  7. Gollakota, S. , Hassanieh, H. , Ransford, B. , Katabi, D. , Fu, K. , "They Can Hear Your Heartbeats: Non-Invasive Security for Implanted Medical Devices," in ACM SIGCOMM (2011)
  8. Jeremy A. Hansen and Nicole M. Hansen. , "A taxonomy of vulnerabilities in implantable medical devices. In Proceedings of the second annual workshop on Security and privacy in medical and home-care systems," in (SPIMACS '10). ACM, New York, NY, USA, 13-20.
  9. T. Denning, K. Fu, and T. Kohno. , "Absence Makes the Heart Grow Fonder: New Directions for Implantable Medical Device Security," in HotSec, 2008.
  10. Steven J. Templeton. , "Security aspects of cyber-physical device safety in assistive environments," in proceedings of the 4th International Conference on Pervasive Technologies Related to Assistive Environments (PETRA '11). ACM, New York, NY, USA.
  11. S. Bergamasco, M. Bon, and P. Inchingolo. , "Medical data protection with a new generation of hardware authentication tokens," in Mediterranean Conference on Medical and Biological Engineering and Computing (MEDICON), pages 82–85, Pula, Croatia, 2001.
  12. S. Schechter. , "Security that is meant to be skin deep:Using ultraviolet micropigmentation to store emergency-access keys for implantable medical devices," in Technical Report MSR-TR-2010-33, Microsoft
  13. Panos, Christoforos; Kotzias, P. ; Xenakis, C. ; Stavrakakis, I. , "Securing the 802. 11 MAC in MANETs: A specification-based intrusion detection engine," Wireless On-demand Network Systems and Services (WONS), 2012 9th Annual Conference on , vol. , no. , pp. 16,22, 9-11 Jan. 2012
  14. Desilva, S. ; Boppana, R. V. , "Mitigating malicious control packet floods in ad hoc networks," Wireless Communications and Networking Conference, 2005 IEEE , vol. 4, no. , pp. 2112,2117 Vol. 4, 13-17 March 2005


IMDs, security and privacy, threat modeling,IDS