Security Threats and Cryptographic Protocols for Medical Wearables

被引:8
|
作者
Hernandez-Alvarez, Luis [1 ,2 ]
Bullon Perez, Juan Jose [3 ]
Kristel Batista, Farrah [4 ]
Queiruga-Dios, Araceli [3 ,4 ]
机构
[1] CSIC, Inst Phys & Informat Technol ITEFI, Madrid 28006, Spain
[2] Univ Carlos III Madrid, Comp Secur Lab COSEC, Madrid 28911, Spain
[3] Univ Salamanca, Higher Tech Sch Ind Engn, Salamanca 37700, Spain
[4] Univ Salamanca, Inst Fundamental Phys & Math, Salamanca 37008, Spain
关键词
cryptography; security model; malware spreading; lightweight cryptography; medical wearables; LIGHTWEIGHT CRYPTOGRAPHY; HEALTH-CARE; INTERNET; PRIVACY; SYSTEM; THINGS; ALGORITHMS; SENSORS; DEVICES; TRENDS;
D O I
10.3390/math10060886
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
In the past few years, the use of several medical devices is increasing. This paper will pay attention to a device developed to get measures of the temperature of diabetic foot. These wearables usually do not have cryptographic protocols to guarantee data security. This study analyzes the existing security in these devices, and simulate malware propagation taking into account the vulnerabilities and lack of security in these highly-constrained interconnected devices. A simulation of malware spreading in a network made by 10 and 15 individuals with 6 and 34 sensors each one, respectively, is included in this study. To avoid such attacks, a lightweight cryptographic protocol could be a satisfactory solution. Considering the quick development of quantum computers, several current cryptographic protocols have been compromised.
引用
收藏
页数:17
相关论文
共 50 条
  • [1] Quantifying cryptographic techniques in Radio Frequency Identification protocols and ways of remedying the security threats
    Hurjui, Cristina
    Holban, Stefan
    Graur, Adrian
    WSEAS Transactions on Communications, 2010, 9 (07): : 406 - 417
  • [2] A survey on quantum cryptographic protocols and their security
    Fung, Chi-Hang Fred
    Lo, Hoi-Kwong
    2007 CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1-3, 2007, : 1121 - 1124
  • [3] Security and composition of multiparty cryptographic protocols
    Canetti, R
    JOURNAL OF CRYPTOLOGY, 2000, 13 (01) : 143 - 202
  • [4] The Price of Active Security in Cryptographic Protocols
    Hazay, Carmit
    Venkitasubramaniam, Muthuramakrishnan
    Weiss, Mor
    JOURNAL OF CRYPTOLOGY, 2024, 37 (03)
  • [5] Security and Composition of Multiparty Cryptographic Protocols
    Ran Canetti
    Journal of Cryptology, 2000, 13 : 143 - 202
  • [6] METHODOLOGY FOR ASSESSING THE SECURITY OF CRYPTOGRAPHIC PROTOCOLS
    Nesterenko, A. Yu
    Semenov, A. M.
    PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2022, (56): : 33 - 82
  • [7] The Price of Active Security in Cryptographic Protocols
    Hazay, Carmit
    Venkitasubramaniam, Muthuramakrishnan
    Weiss, Mor
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2020, PT II, 2020, 12106 : 184 - 215
  • [8] Security and composition of cryptographic protocols: A tutorial
    Canetti, R., 1600, IOS Press BV (10):
  • [9] A SYSTEM FOR DECIDING THE SECURITY OF CRYPTOGRAPHIC PROTOCOLS
    WATANABE, H
    FUJIWARA, T
    KASAMI, T
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 1993, E76A (01) : 96 - 103
  • [10] IoT: Communication protocols and security threats
    Gerodimos A.
    Maglaras L.
    Ferrag M.A.
    Ayres N.
    Kantzavelou I.
    Internet of Things and Cyber-Physical Systems, 2023, 3 : 1 - 13