Difference between revisions of "Rostami2013"

From ACES

(Import from BibTeX)
 
m (Default pdf)
 
(One intermediate revision by the same user not shown)
Line 4: Line 4:
|doi=10.1145/2463209.2488750
|doi=10.1145/2463209.2488750
|abstract=<p>Implantable Medical Devices (IMDs) are being embedded increasingly often in patients\&rsquo; bodies to monitor and help treat medical conditions. To facilitate monitoring and control, IMDs are often equipped with wireless interfaces. While convenient, wireless connectivity raises the risk of malicious access to an IMD that can potentially infringe patients\&rsquo; privacy and even endanger their lives. Thus, while ease of access to IMDs can be vital for timely medical intervention, too much ease is dangerous. Obvious approaches, such as passwords and certificates, are unworkable at large scale given the lack of central authorities and frequent emergencies in medical settings. Additionally, IMDs are heavily constrained in their power consumption and computational capabilities. Designing access-control mechanisms for IMDs that can meet the many constraints of real-world deployment is an important research challenge. In this paper, we review proposed approaches to the accesscontrol problem for IMDs, including the problem of secure pairing (and key distribution) between an IMD and another device, such as a programmer. (We also treat related technologies, such as bodyarea networks.) We describe some limitations of well-conceived proposals and reveal security weaknesses in two proposed cryptographic pairing schemes. Our intention is to stimulate yet more inventive and rigorous research in the intriguing and challenging areas of IMD security and medical-device security in general.\&nbsp;</p>
|abstract=<p>Implantable Medical Devices (IMDs) are being embedded increasingly often in patients\&rsquo; bodies to monitor and help treat medical conditions. To facilitate monitoring and control, IMDs are often equipped with wireless interfaces. While convenient, wireless connectivity raises the risk of malicious access to an IMD that can potentially infringe patients\&rsquo; privacy and even endanger their lives. Thus, while ease of access to IMDs can be vital for timely medical intervention, too much ease is dangerous. Obvious approaches, such as passwords and certificates, are unworkable at large scale given the lack of central authorities and frequent emergencies in medical settings. Additionally, IMDs are heavily constrained in their power consumption and computational capabilities. Designing access-control mechanisms for IMDs that can meet the many constraints of real-world deployment is an important research challenge. In this paper, we review proposed approaches to the accesscontrol problem for IMDs, including the problem of secure pairing (and key distribution) between an IMD and another device, such as a programmer. (We also treat related technologies, such as bodyarea networks.) We describe some limitations of well-conceived proposals and reveal security weaknesses in two proposed cryptographic pairing schemes. Our intention is to stimulate yet more inventive and rigorous research in the intriguing and challenging areas of IMD security and medical-device security in general.\&nbsp;</p>
|month=6
|year=2013
|journal=Design Automation Conference
|journal=Design Automation Conference
|title=Balancing Security and Utility in Medical Devices?
|title=Balancing Security and Utility in Medical Devices?
|entry=conference
|entry=conference
|date=2013-Ju-01
|pdf=Rostami2013.pdf
}}
}}

Latest revision as of 17:38, 9 November 2021

Rostami2013
entryconference
address
annote
authorMasoud Rostami and Wayne Burleson and Ari Juels and Farinaz Koushanfar
booktitle
chapter
edition
editor
howpublished
institution
journalDesign Automation Conference
month6
note
number
organization
pages
publisher
school
series
titleBalancing Security and Utility in Medical Devices?
type
volume
year2013
doi10.1145/2463209.2488750
issn
isbn
urlhttp://dl.acm.org/citation.cfm?id=2488750
pdfRostami2013.pdf

File:Rostami2013.pdf

Icon-email.png
Email:
farinaz@ucsd.edu
Icon-addr.png
Address:
Electrical & Computer Engineering
University of California, San Diego
9500 Gilman Drive, MC 0407
Jacobs Hall, Room 6401
La Jolla, CA 92093-0407
Icon-addr.png
Lab Location: EBU1-2514
University of California San Diego
9500 Gilman Dr, La Jolla, CA 92093