Trust-Based DoS Mitigation Technique for Medical Implants in Wireless Body Area Networks

被引:0
作者
Usman, Muhammad [1 ]
Asghar, Muhammad Rizwan [2 ]
Ansari, Imran Shafique [3 ]
Granelli, Fabrizio [4 ]
Qaraqe, Marwa [1 ]
机构
[1] HBKU, Coll Sci & Engn, Div Informat & Comp Technol, Doha 34110, Qatar
[2] Univ Auckland, Dept Comp Sci, Auckland 1142, New Zealand
[3] Univ Glasgow, Sch Engn, Glasgow G12 8QQ, Lanark, Scotland
[4] Univ Trento, Dept Informat Engn & Comp Sci, I-38123 Trento, Italy
来源
ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC) | 2019年
关键词
DoS attack; Environment sensing; Trust; WBAN; privacy; Security; Healthcare systems; Remote monitoring; Implants; Wearables; ATTACKS;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Medical implants are an important part of Wireless Body Area Networks (WBANs) and play an important role to monitor, diagnose, and control various medical conditions. These tiny sensors are injected inside human body to measure and communicate various vital signs of a human body. Since the information transmitted by implants is very sensitive and critical in nature, both availability and confidentiality of such information are of prime importance. A possible security threat in medical implants that can breach the availability of the medical implants is a Denial of Service (DoS) attack. In this work, we propose a solution to mitigate DoS attack in the Medical Implant Communication Service (MICS) network. We propose a three-level trust model for a MICS network based on its environment and couple a threshold of maximum allowed data rate to each environment. The simulation results show that DoS attacks can be seamlessly mitigated in many MICS settings.
引用
收藏
页数:6
相关论文
共 20 条
  • [1] Nano-Communication for Biomedical Applications: A Review on the State-of-the-Art From Physical Layers to Novel Networking Concepts
    Abbasi, Qammer H.
    Yang, Ke
    Chopra, Nishtha
    Jornet, Josep Miquel
    Abuali, Najah Abed
    Qaraqe, Khalid A.
    Alomainy, Akram
    [J]. IEEE ACCESS, 2016, 4 : 3920 - 3935
  • [2] Abbasi Qammer H., 2016, Advances in body-centric wireless communication: Applications and state-of-the-art
  • [3] Ahmad A., 2009, P WORLD C COMP SCI I, V01, P529
  • [4] [Anonymous], IEEE ACCESS
  • [5] [Anonymous], 2017, P SCA 2017 ACM SIGGR
  • [6] Denning T, 2010, CHI2010: PROCEEDINGS OF THE 28TH ANNUAL CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS, VOLS 1-4, P917
  • [7] Goodrich M.T., 2006, Distributed Computing Systems, P10
  • [8] Gopalan Sai Anand, 2010, 2010 International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT 2010), P739, DOI 10.1109/ICUMT.2010.5676554
  • [9] On Pairing Constrained Wireless Devices Based on Secrecy of Auxiliary Channels: The Case of Acoustic Eavesdropping
    Halevi, Tzipora
    Saxena, Nitesh
    [J]. PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, : 97 - 108
  • [10] Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses
    Halperin, Daniel
    Clark, Shane S.
    Fu, Kevin
    Heydt-Benjamin, Thomas S.
    Defend, Benessa
    Kohno, Tadayoshi
    Ransford, Benjamin
    Morgan, Will
    Maisel, William H.
    [J]. PROCEEDINGS OF THE 2008 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2008, : 129 - +