Please use this identifier to cite or link to this item:
Researcher: MONIKA DARJI
Keywords: Security
Implantable Medical Devices
wireless communication
reply attacks
University: Gujarat Technological University
Completed Date: 23/06/2016
Abstract: IMDs of current genre are complex embedded systems with networking capabilities newlinethat aid in wireless communication amongst IMDs and with other external devices. Due to newlinetheir unique placement in human body and resource constraints like low power availability, newlinecomputation and storage capacity, achieving security and privacy for wireless newlinecommunication is difficult. Security for medical devices has gained attention in the recent newlineyears following some well-publicized attacks on Implantable Medical Devices, like newlinepacemakers and insulin pumps. This has resulted in solutions being proposed for securing newlinethese devices, which are usually device specific and useful only for secure communication newlinewith external devices. Multiple IMDs may be implanted in a single patient therefore we newlineargue that securing individual devices will not serve the purpose as these devices will be newlineintegrated sooner or later for advance therapeutic implications. Security solution rather newlinethan being device specific should be patient specific to cater to the security needs of IMDs newlineof a patient. We provide a simple solution to detect active attacks on IMDs and then we provide an emergency aware access control framework for IMDs and also provide a Buddy newlineSystem for secure communication with external devices. Finally, we provide an application newlinelayer security solution which not only allows secure communication between IMDs and newlineexternal devices but also between interoperable IMDs for a single patient. We consider newlineextreme resource constraints of IMD and explore the tradeoffs among different newlinecryptographic primitives for use in IMDs to carefully design a lightweight protocol newlineoptimized for IMDs for mutual authentication and secure communication between the IMD newlineand the proxy device. We also design a secure publish-subscribe communication protocol newlinebetween the proxy device and external devices. Finally, we provide a proof-of-concept newlinefor the proposed two-tier security solution. newline
Appears in Departments:Computer Science

Files in This Item:
File Description SizeFormat 
chapter 1.pdfAttached File235.8 kBAdobe PDFView/Open
chapter 2.pdf311.23 kBAdobe PDFView/Open
chapter 3.pdf239.81 kBAdobe PDFView/Open
chapter 4.pdf237.11 kBAdobe PDFView/Open
chapter 5.pdf150.63 kBAdobe PDFView/Open
chapter 6.pdf171.34 kBAdobe PDFView/Open
chapter 7.pdf608.81 kBAdobe PDFView/Open
chapter 8.pdf634.92 kBAdobe PDFView/Open
chapter 9.pdf126.83 kBAdobe PDFView/Open
initials.pdf291.29 kBAdobe PDFView/Open
references.pdf166.16 kBAdobe PDFView/Open
title page.pdf45.31 kBAdobe PDFView/Open

Items in Shodhganga are protected by copyright, with all rights reserved, unless otherwise indicated.