A System Architecture, Processor, and Communication Protocol for Secure Implants

被引:14
|
作者
Strydis, Christos [1 ,3 ]
Seepers, Robert M. [1 ]
Peris-Lopez, Pedro [2 ]
Siskos, Dimitrios [3 ]
Sourdis, Ioannis [4 ]
机构
[1] Erasmus MC, Dept Neurosci, NL-3015 GE Rotterdam, Netherlands
[2] Univ Carlos III Madrid, Dept Comp Sci, Madrid 28911, Spain
[3] Delft Univ Technol, SCT Dept, NL-2600 GA Delft, Netherlands
[4] Chalmers Univ Technol, Dept Comp Sci & Engn, S-41296 Gothenburg, Sweden
关键词
Implantable device; security; ultra-low power; system on chip; ENERGY-EFFICIENT SECURITY; MEDICAL DEVICES; PLATFORM; PRIVACY;
D O I
10.1145/2555289.2555313
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Secure and energy-efficient communication between Implantable Medical Devices (IMDs) and authorized external users is attracting increasing attention these days. However, there currently exists no systematic approach to the problem, while solutions from neighboring fields, such as wireless sensor networks, are not directly transferable due to the peculiarities of the IMD domain. This work describes an original, efficient solution for secure IMD communication. A new implant system architecture is proposed, where security and main-implant functionality are made completely decoupled by running the tasks onto two separate cores. Wireless communication goes through a custom security ASIP, called SISC (Smart-Implant Security Core), which runs an energy-efficient security protocol. The security core is powered by RF-harvested energy until it performs external-reader authentication, providing an elegant defense mechanism against battery Denial-of-Service (DoS) and other, more common attacks. The system has been evaluated based on a realistic case study involving an artificial pancreas implant. When synthesized for a UMC 90nm CMOS ASIC technology, our system architecture achieves defense against unauthorized accesses having zero energy cost, running entity authentication through harvesting only 7.45 mu J of RF energy from the requesting entity. In all other successfully authenticated accesses, our architecture achieves secure data exchange without affecting the performance of the main IMD functionality, adding less than 1% (1.3mJ) to the daily energy consumption of a typical implant. Compared to a singe-core, secure reference IMD, which would still be more vulnerable to some types of attacks, our secure system on chip (SoC) achieves high security levels at 56% energy savings and at an area overhead of less than 15%.
引用
收藏
页数:23
相关论文
共 50 条
  • [11] A Key-centric Processor Architecture for Secure Computing
    Whelihan, David
    Thurmer, Kate
    Vai, Michael
    PROCEEDINGS OF THE 2016 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2016, : 173 - 178
  • [12] A Secure Watermark Protocol for Multiparty Architecture
    Song, Chun-lin
    Cui, Ya-wen
    Sang, Jie
    2015 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND MANAGEMENT ENGINEERING (ICISME 2015), 2015, : 5 - 10
  • [13] Secure spread: An integrated architecture for secure group communication
    Amir, Y
    Nita-Rotaru, C
    Stanton, J
    Tsudik, G
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2005, 2 (03) : 248 - 261
  • [14] Robust secure communication protocol for smart healthcare system with FPGA implementation
    Sureshkumar, Venkatasamy
    Amin, Ruhul
    Vijaykumar, V. R.
    Sekar, S. Raja
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 100 : 938 - 951
  • [15] Secure communication architecture for GSM networks
    Lo, Chi-Chun
    Chen, Yu-Jen
    IEEE Pacific RIM Conference on Communications, Computers, and Signal Processing - Proceedings, 1999, : 221 - 224
  • [16] A Secure Short Message Communication Protocol
    Chang, Chao-Wen
    Pan, Heng
    Jia, Hong-Yong
    INTERNATIONAL JOURNAL OF AUTOMATION AND COMPUTING, 2008, 5 (02) : 202 - 207
  • [17] Development of system architecture and communication protocol for unmanned ground vehicle
    Moon, Hee Chang
    Woo, Hoon Je
    Kim, Jung Ha
    J. Inst. Control Rob. Syst., 2008, 9 (873-880): : 873 - 880
  • [18] Quantum wireless secure communication protocol
    Lin, Tien-Sheng
    Lin, Tien-Sheng
    Kuo, Sy-Yen
    41ST ANNUAL IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2007, : 146 - +
  • [19] Protocol independent lightweight secure communication
    Guvensan, M. Amac
    Yavuz, A. Gokhan
    SECRYPT 2006: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2006, : 211 - +
  • [20] Graphene: A Secure Cloud Communication Architecture
    Faisal, Abu
    Zulkernine, Mohammad
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, 2019, 11605 : 51 - 69