CFP last date
16 December 2024
Call for Paper
January Edition
IJAIS solicits high quality original research papers for the upcoming January edition of the journal. The last date of research paper submission is 16 December 2024

Submit your paper
Know more
Reseach Article

IMD-IDS a specification based Intrusion Detection system for Wireless IMDs

by Monika Darji, Bhushan Trivedi
International Journal of Applied Information Systems
Foundation of Computer Science (FCS), NY, USA
Volume 5 - Number 6
Year of Publication: 2013
Authors: Monika Darji, Bhushan Trivedi
10.5120/ijais13-450926

Monika Darji, Bhushan Trivedi . IMD-IDS a specification based Intrusion Detection system for Wireless IMDs. International Journal of Applied Information Systems. 5, 6 ( April 2013), 19-23. DOI=10.5120/ijais13-450926

@article{ 10.5120/ijais13-450926,
author = { Monika Darji, Bhushan Trivedi },
title = { IMD-IDS a specification based Intrusion Detection system for Wireless IMDs },
journal = { International Journal of Applied Information Systems },
issue_date = { April 2013 },
volume = { 5 },
number = { 6 },
month = { April },
year = { 2013 },
issn = { 2249-0868 },
pages = { 19-23 },
numpages = {9},
url = { https://www.ijais.org/archives/volume5/number6/456-0926/ },
doi = { 10.5120/ijais13-450926 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2023-07-05T17:58:40.692882+05:30
%A Monika Darji
%A Bhushan Trivedi
%T IMD-IDS a specification based Intrusion Detection system for Wireless IMDs
%J International Journal of Applied Information Systems
%@ 2249-0868
%V 5
%N 6
%P 19-23
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Implantable Medical Devices (IMDs) have emerged as a break-through technology for e-healthcare. Healthcare providers use wireless medium of communication to monitor patients, perform diagnostics and download data in hospitals or from homes. This provides great convenience, flexibility, cost effectiveness and timely patient care. These implanted devices contain sensitive personal data and other health related information and are controlled through commands issued by healthcare staff wirelessly. Wireless medium of communication introduces several vulnerabilities which if exploited might have severe implications on the security, privacy and safety of patients using IMDs. In this paper we aim to discuss the security and privacy issues for wireless communication of Implantable Medical Devices and come out with a threat model. We also look into the methods proposed in literature to mitigate them and analyze their suitability. Intrusion Detection has gained importance over the years especially for wireless adhoc networks. Seeing the importance of constantly monitoring the IMD-reader communication in detecting and deterring security attacks, we propose a model called IMD-IDS to be integrated with cellphone or PDA, which people can carry with them. The IMD-IDS manages IMD keys, authenticates IMD readers, and blocks attempted accesses to the patients IMD from unauthorized readers using specification based intrusion detection. It monitors the communication between IMD-reader for detecting malicious activities and help patients to take corrective actions if need be. This research is the first effort to apply specification-based detection techniques to detect attacks in the IMD wireless communication.

References
  1. Halperin, D. , Heydt-Benjamin, T. S. , Fu, K. , Kohno, T. , Maisel, W. H. , "Security and Privacy for Implantable Medical Devices," in IEEE Pervasive Computing, vol. 7, pp. 30–39 (2008)
  2. Halperin, D. , Heydt-Benjamin, T. S. , Ransford, B. , Clark, S. S. , Defend, B. , Morgan, W. , Fu, K. , Kohno, T. , Maisel, W. H. , "Pacemakers and Implantable Cardiac De?brillators: Software Radio Attacks and Zero-Power Defenses," in IEEE Symposium on Security and Privacy (2008)
  3. Israel, C. W. , Barold, S. S. , "Pacemaker Systems as Implantable Cardiac Rhythm Monitors," in American Journal of Cardiology (2001)
  4. Rasmussen, K. B. , Castelluccia, C. , Heydt-Benjamin, T. S. , Capkun, S. , "Proximity-Based Access Control for Implantable Medical Devices," in ACM Conference on Computer and Communications Security (2009)
  5. Fu, K. , "Inside Risks, Reducing the Risks of Implantable Medical Devices: A Prescription to Improve Security and Privacy of Pervasive Health Care. ," in Communications of the ACM, vol. 52(6), pp. 25–2` (2009)
  6. Schechter, S. , "Security that is Meant to be Skin Deep: Using Ultraviolet Micropigmentation to Store Emergency-Access Keys for Implantable Medical Devices," in USENIX Workshop on Health Security and Privacy (2010)
  7. Gollakota, S. , Hassanieh, H. , Ransford, B. , Katabi, D. , Fu, K. , "They Can Hear Your Heartbeats: Non-Invasive Security for Implanted Medical Devices," in ACM SIGCOMM (2011)
  8. Jeremy A. Hansen and Nicole M. Hansen. , "A taxonomy of vulnerabilities in implantable medical devices. In Proceedings of the second annual workshop on Security and privacy in medical and home-care systems," in (SPIMACS '10). ACM, New York, NY, USA, 13-20.
  9. T. Denning, K. Fu, and T. Kohno. , "Absence Makes the Heart Grow Fonder: New Directions for Implantable Medical Device Security," in HotSec, 2008.
  10. Steven J. Templeton. , "Security aspects of cyber-physical device safety in assistive environments," in proceedings of the 4th International Conference on Pervasive Technologies Related to Assistive Environments (PETRA '11). ACM, New York, NY, USA.
  11. S. Bergamasco, M. Bon, and P. Inchingolo. , "Medical data protection with a new generation of hardware authentication tokens," in Mediterranean Conference on Medical and Biological Engineering and Computing (MEDICON), pages 82–85, Pula, Croatia, 2001.
  12. S. Schechter. , "Security that is meant to be skin deep:Using ultraviolet micropigmentation to store emergency-access keys for implantable medical devices," in Technical Report MSR-TR-2010-33, Microsoft
  13. Panos, Christoforos; Kotzias, P. ; Xenakis, C. ; Stavrakakis, I. , "Securing the 802. 11 MAC in MANETs: A specification-based intrusion detection engine," Wireless On-demand Network Systems and Services (WONS), 2012 9th Annual Conference on , vol. , no. , pp. 16,22, 9-11 Jan. 2012
  14. Desilva, S. ; Boppana, R. V. , "Mitigating malicious control packet floods in ad hoc networks," Wireless Communications and Networking Conference, 2005 IEEE , vol. 4, no. , pp. 2112,2117 Vol. 4, 13-17 March 2005
Index Terms

Computer Science
Information Sciences

Keywords

IMDs security and privacy threat modeling IDS