A System Architecture, Processor, and Communication Protocol for Secure Implants

被引:14
|
作者
Strydis, Christos [1 ,3 ]
Seepers, Robert M. [1 ]
Peris-Lopez, Pedro [2 ]
Siskos, Dimitrios [3 ]
Sourdis, Ioannis [4 ]
机构
[1] Erasmus MC, Dept Neurosci, NL-3015 GE Rotterdam, Netherlands
[2] Univ Carlos III Madrid, Dept Comp Sci, Madrid 28911, Spain
[3] Delft Univ Technol, SCT Dept, NL-2600 GA Delft, Netherlands
[4] Chalmers Univ Technol, Dept Comp Sci & Engn, S-41296 Gothenburg, Sweden
关键词
Implantable device; security; ultra-low power; system on chip; ENERGY-EFFICIENT SECURITY; MEDICAL DEVICES; PLATFORM; PRIVACY;
D O I
10.1145/2555289.2555313
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Secure and energy-efficient communication between Implantable Medical Devices (IMDs) and authorized external users is attracting increasing attention these days. However, there currently exists no systematic approach to the problem, while solutions from neighboring fields, such as wireless sensor networks, are not directly transferable due to the peculiarities of the IMD domain. This work describes an original, efficient solution for secure IMD communication. A new implant system architecture is proposed, where security and main-implant functionality are made completely decoupled by running the tasks onto two separate cores. Wireless communication goes through a custom security ASIP, called SISC (Smart-Implant Security Core), which runs an energy-efficient security protocol. The security core is powered by RF-harvested energy until it performs external-reader authentication, providing an elegant defense mechanism against battery Denial-of-Service (DoS) and other, more common attacks. The system has been evaluated based on a realistic case study involving an artificial pancreas implant. When synthesized for a UMC 90nm CMOS ASIC technology, our system architecture achieves defense against unauthorized accesses having zero energy cost, running entity authentication through harvesting only 7.45 mu J of RF energy from the requesting entity. In all other successfully authenticated accesses, our architecture achieves secure data exchange without affecting the performance of the main IMD functionality, adding less than 1% (1.3mJ) to the daily energy consumption of a typical implant. Compared to a singe-core, secure reference IMD, which would still be more vulnerable to some types of attacks, our secure system on chip (SoC) achieves high security levels at 56% energy savings and at an area overhead of less than 15%.
引用
收藏
页数:23
相关论文
共 50 条
  • [1] A secure Protocol for Traffic Police Mobile Communication System
    Rad, Habibollah Arasteh
    Samsudin, Khairulmizam
    Ramli, Abdul Rahman B.
    Tehrani, Mohamad Bagher
    Tavalai, Mohamad Ali
    INTERNATIONAL CONFERENCE ON FUTURE COMPUTER AND COMMUNICATIONS, PROCEEDINGS, 2009, : 533 - 539
  • [2] Novel secure communication protocol for conditional access system
    Department of Computer Science and Engineering, Harbin Institute of Technology Harbin, No.8, Xue Qing Rd., Hai Dian District, Beijing, 100085, China
    Int. J. Netw. Secur., 2007, 2 (121-127):
  • [3] The architecture of a secure group communication system based on intrusion tolerance
    Correia, M
    Veríssimo, P
    Neves, NF
    21ST INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS, PROCEEDINGS, 2001, : 17 - 22
  • [4] Cryptanalysis and improvement of a secure communication protocol for smart healthcare system
    Kumar, Devender
    Sharma, Deepak Kumar
    Jain, Parth
    Bhati, Sumit
    Kumar, Amit
    INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2024, 25 (3-4) : 265 - 291
  • [5] Proposal of Secure Business Architecture by Visible Light Communication System
    Tanimoto, Shigeaki
    Nakamura, Chise
    Iwashita, Motoi
    Matsui, Shinsuke
    Hatashima, Takashi
    Fuji, Hitoshi
    Ohkubo, Kazuhiko
    Egawa, Junichi
    Kinouchi, Yohsuke
    2018 7TH INTERNATIONAL CONGRESS ON ADVANCED APPLIED INFORMATICS (IIAI-AAI 2018), 2018, : 817 - 822
  • [6] Secure Protocol for VANETs Communication
    Kumar, Manish
    Patil, Shriniwas
    Parmar, Keyur
    2022 IEEE 19TH INDIA COUNCIL INTERNATIONAL CONFERENCE, INDICON, 2022,
  • [7] PGSP: A protocol for secure communication in peer-to-peer system
    Arora, N
    Shyamasundar, RK
    2005 IEEE Wireless Communications and Networking Conference, Vols 1-4: WCNC 2005: BROADBAND WIRELESS FOR THE MASSES READY FOR TAKE-OFF., 2005, : 2094 - 2099
  • [8] A secure communication protocol for low-cost RFID system
    Oh, Jung-Hyun
    Kim, Hyun-Seok
    Choi, Jin-Young
    2007 CIT: 7TH IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY, PROCEEDINGS, 2007, : 949 - 954
  • [9] ARCHITECTURE OF A COMMUNICATION-NETWORK PROCESSOR
    MOOIJ, WGP
    LECTURE NOTES IN COMPUTER SCIENCE, 1989, 365 : 238 - 250
  • [10] Hash function and DSRC based secure communication protocol for VANET-WAVE architecture
    Kumar, Surender
    Singh, Vikram
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2023, 26 (03): : 829 - 839