Table of Contents Author Guidelines Submit a Manuscript
BioMed Research International
Volume 2014, Article ID 543051, 12 pages
http://dx.doi.org/10.1155/2014/543051
Research Article

Security Mechanism Based on Hospital Authentication Server for Secure Application of Implantable Medical Devices

Department of Computer Science, Dankook University, Cheonan 330-714, Republic of Korea

Received 31 December 2013; Revised 1 June 2014; Accepted 20 June 2014; Published 24 July 2014

Academic Editor: Hesham H. Ali

Copyright © 2014 Chang-Seop Park. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. U. Lakshmanadoss, A. Shah, and J. P. Daubert, “Telemonitoring of the pacemakers,” in Modern Pacemakers—Present and Future, M. R. Das, Ed., pp. 129–146, InTech, 2011. View at Google Scholar
  2. D. Halperin, T. Kohno, T. S. Heydt-Benjamin, K. Fu, and W. H. Maisel, “Security and privacy for implantable medical devices,” IEEE Pervasive Computing, vol. 7, no. 1, pp. 30–39, 2008. View at Publisher · View at Google Scholar · View at Scopus
  3. FDA, “FDA Safety Communication: Cybersecurity for Medical Devices and Hospital Networks,” June 2013, http://www.fda.gov/MedicalDevices/Safety/AlertsandNotices/ucm356423.htm.
  4. D. Halperin, T. S. Heydt-Benjamin, B. Ransford et al., “Pacemakers and implantable cardiac defibrillators: software radio attacks and zero-power defenses,” in Proceedings of the IEEE Symposium on Security and Privacy (SP '08), pp. 129–142, Oakland, Calif, USA, May 2008. View at Publisher · View at Google Scholar · View at Scopus
  5. C. Li, A. Raghunathan, and N. K. Jha, “Hijacking an insulin pump: security attacks and defenses for a diabetes therapy system,” in Proceeding of the IEEE 13th International Conference on e-Health Networking, Applications and Services (HEALTHCOM '11), pp. 150–156, Columbia, MO, USA, June 2011. View at Publisher · View at Google Scholar · View at Scopus
  6. K. B. Rasmussen, C. Castelluccia, T. S. Heydt-Benjamin, and S. Capkun, “Proximity-based access control for implantable medical devices,” in Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS '09), pp. 410–419, Chicago, Ill, USA, November 2009. View at Publisher · View at Google Scholar · View at Scopus
  7. R. A. Balczewski and K. Lent, “Security system for implantable medical devices,” U.S. Patent 6,880,085, 2005.
  8. J. A. von Arx, A. T. Koshiol, and J. E. Bange, “Secure long-range telemetry for implantable medical device,” U.S. Patent 7,155,290, 2006. View at Google Scholar
  9. F. Xu, Z. Qin, C. C. Tan, B. Wang, and Q. Li, “IMDGuard: securing implantable medical devices with the external wearable guardian,” in Proceedings of the 30th IEEE International Conference on Computer Communications, pp. 1862–1870, Shanghai, China, April 2011. View at Publisher · View at Google Scholar · View at Scopus
  10. T. Denning, K. Fu, and T. Kohno, “Absence makes the heart grow fonder: new directions for implantable medical device security,” in Proceedings of the 3rd Conference on Hot Topics in Security, pp. 1–7, Boston, Mass, USA, 2008.
  11. S. Gollakota, H. Hassanieh, B. Ransford, D. Katabi, and K. Fu, “They can hear your heartbeats: non-invasive security for implantable medical devices,” ACM Computer Communication Review, vol. 41, no. 4, pp. 2–13, 2011. View at Publisher · View at Google Scholar
  12. T. Denning, A. Borning, B. Friedman, B. T. Gill, T. Kohno, and W. H. Maisel, “Patients, pacemakers, and implantable defibrillators: human values and security for wireless implantable medical devices,” in Proceedings of the 28th Annual SIGCHI Conference on Human Factors in Computing Systems, pp. 917–926, Atlanta, Ga, USA, April 2010. View at Publisher · View at Google Scholar · View at Scopus
  13. S. Schechter, “Security that is meant to be skin deep: using ultraviolet micropigmentation to store emergency-access keys for implantable medical devices,” in Proceedings of the 1st USENIX Workshop on Health Security and Privacy, pp. 1–2, Washington, DC, USA, August 2010.
  14. Medtronic CareLink Network, https://world.medtroniccarelink.net/.
  15. Biotronik, Home Monitoring Service Center, http://www.biotronik.com/.
  16. D. Panescu, “Emerging technologies: wireless communication systems for implantable medical devices,” IEEE Engineering in Medicine and Biology Magazine, vol. 27, no. 2, pp. 96–101, 2008. View at Publisher · View at Google Scholar · View at Scopus
  17. S. Brands and D. Chaum, “Distance-bounding protocols,” in Advances in Cryptology—EUROCRYPT '93: Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques Lofthus, Norway, May 23–27, 1993, vol. 765 of Lecture Notes in Computer Science, pp. 344–359, Springer, New York, NY, USA, 1994. View at Publisher · View at Google Scholar
  18. N. Sastry, U. Shankar, and D. Wagner, “Secure Verification of Location Claims,” in Proceedings of the ACM Workshop on Wireless Security, pp. 1–10, San Diego, Calif, USA, September 2003. View at Scopus
  19. K. Malasri and L. Wang, “Securing wireless implantable devices for healthcare: ideas and challenges,” IEEE Communications Magazine, vol. 47, no. 7, pp. 74–80, 2009. View at Publisher · View at Google Scholar · View at Scopus
  20. M. Burrow, M. Abadi, and R. Needham, “A logic of authentication,” ACM Transactions on Computer Systems, vol. 8, no. 1, pp. 18–36, 1990. View at Google Scholar
  21. C. Neuman, T. Yu, S. Hartman, and K. Raeburn, “The Kerberos Network Authentication Service,” RFC 4120, July 2005.