Securing Wireless Medical Devices

被引:0
作者
Kaadan, Asaad [1 ]
Refai, Hazem H. [1 ]
机构
[1] Univ Oklahoma, Tulsa, OK 74136 USA
来源
2012 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM) | 2012年
关键词
security; medical devices; efficiency; onetime pad; key distribution; authentication;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Portable Wireless Devices (PWDs) and Portable Medical Devices (PMDs) are rapidly becoming an integral part of our lives, and even our bodies. Security issues raise great concerns among customers, manufacturers, regulating bodies and civil rights organizations. Another grave concern of PWDs manufacturers is extending the battery life of these systems by reducing power consumption and computing requirements. For this reason, simple but yet highly secure cryptosystems are absent from present day PWDs. The research presented herein addresses this dilemma by combining the most secure cryptography system available -the onetime pad cipher- with a novel key distribution and authentication scheme. The result is a system with military-grade security and PWD-grade power and processing capabilities.
引用
收藏
页码:942 / 948
页数:7
相关论文
共 31 条
[1]  
[Anonymous], 2008, ESTREAM PROJ
[2]  
[Anonymous], 2011, 2011 IEEE 13th International Conference on e-Health Networking, Applications and Services, DOI [DOI 10.1109/HEALTH.2011.6026732, 10.1109/HEALTH.2011.6026732]
[3]  
Bao SD, 2005, P ANN INT IEEE EMBS, P2455
[4]  
Biham E., 1993, DIIFFERENTIAL CRYPTA, P213
[5]  
Bogdanov A, 2007, LECT NOTES COMPUT SC, V4727, P450
[6]  
Chae Hoon Lim, 2005, Information Security Applications. 6th International Workshop, WISA 2005. Revised Selected Papers (Lecture Notes in Computer Science Vol. 3786), P243
[7]   BioSec: A biometric based approach for securing communication in wireless networks of biosensors implanted in the human body [J].
Cherukuri, S ;
Venkatasubramanian, KK ;
Gupta, SKS .
2003 INTERNATIONAL CONFERENCE ON PARALLEL PROCESSING WORKSHOPS, PROCEEDINGS, 2003, :432-439
[8]  
Denning T., 2008, USENIX WORKSH HOT TO
[9]   EXHAUSTIVE CRYPT-ANALYSIS OF NBS DATA ENCRYPTION STANDARD [J].
DIFFIE, W ;
HELLMAN, ME .
COMPUTER, 1977, 10 (06) :74-84
[10]  
Ecuyer P. L., 2012, OPER RES, V44, P816