Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses Authors: Daniel Halperin, Thomas S. Heydt-Benjamin, Benjamin.

Slides:



Advertisements
Similar presentations
NFC Security What is NFC? NFC Possible Security Attacks. NFC Security Attacks Countermeasures. Conclusion. References.
Advertisements

Denial of Service in Sensor Networks Szymon Olesiak.
SoK: Security and Privacy in Implantable Medical Devices and Body Area Networks 0 Fall 2014 Presenter: Kun Sun, Ph.D. Michael Rushanan*, Denis Foo Kune,
Cynthia Kuo, Mark Luk, Rohit Negi, Adrian Perrig Carnegie Mellon University Message-In-a-Bottle: User-Friendly and Secure Cryptographic Key Deployment.
1 FCC RFID Workshop RFID Discussions September 7, 2004 Kevin Powell, Symbol Technologies.
Packet Leashes: Defense Against Wormhole Attacks Authors: Yih-Chun Hu (CMU), Adrian Perrig (CMU), David Johnson (Rice)
CS426Fall 2010/Lecture 81 Computer Security CS 426 Lecture 8 User Authentication.
Lecture 1: Overview modified from slides of Lawrie Brown.
Daniel E. Holcomb, Wayne P. Burleson and Kevin Fu
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
ITEC 810 Overview of Micropayment Technology
Implantable Cardioverter Defibrillator Rebecca Boduch Biomedical Engineering University of Rhode Island.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
Applied Cryptography for Network Security
Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses Zac Chupka Jeff Signore.
Pacemakers and Implanted Defibrillators Mike Harlan.
Chip tag A radio-frequency identification system uses tags readers send a signal to the tag and read its response RFID tags can be either passive active.
Radio Frequency Identification By Bhagyesh Lodha Vinit Mahedia Vishnu Saran Mitesh Bhawsar.
Neighborhood Watch: Security and Privacy Analysis of Automatic Meter Reading Systems Ishtiaq Rouf, Hossen Mustafa Rob Miller Marco Grutese Presented By.
A Quantitative Analysis of the Insecurity of Embedded Network Devices: Results of a Wide-Area Scan Ang Cui and Salvatore J. Stolfo Department of Computer.
Introduction Implantable Medical Devices (IMDs) are vulnerable to exploitation (last paper) Unauthorized data retrieval Malicious commands Millions of.
Wireless and Security CSCI 5857: Encoding and Encryption.
A Feasible IMD Communication Protocol: Security without Obscurity REU fellow(s):, Jason Wang 1, Keyon Mohebzad 2, Luke Johnson 3, Faculty mentor: N. Sertac.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
多媒體網路安全實驗室 An Efficient RFID Authentication Protocol for Low-cost Tags Date : Reporter : Hong Ji Wei Authors : Yanfei Liu From : 2008 IEEE/IFIP.
Cullen College of Engineering RFID-Based Solutions for Piping Technology Piping Tech & UH July, 2007.
September, 2006Doc: IEEE BAN Zhen, Li, and Kohno Slide1 Implanted applications of IG-BAN Bin Zhen, Huan-Bang Li and Ryuji Kohno National.
Enhancing the Security of Corporate Wi-Fi Networks using DAIR PRESENTED BY SRAVANI KAMBAM 1.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 1 – Overview.
Computer Security: Principles and Practice
Distributed systems – Part 2  Bluetooth 4 Anila Mjeda.
Using Directional Antennas to Prevent Wormhole Attacks Lingxuan HuDavid Evans Department of Computer Science University of Virginia.
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
Security and Privacy for Implantable Medical Devices Presented by : Dilip Simha.C.R.
EMERGENCY VEHICLE ALERT SYSTEM ECE 495C Digital Systems Senior Design Project Proposal Team #3 Spring 2008 January 09, 2008.
Wireless Cardiac Device Monitoring Presented by: Ashley D. Solomon, RN Nursing 457: Nursing Informatics Fall 2009.
This presentation is an outgrowth of work done under contract to the Institute for Telecommunication Sciences and does not represent the views or policies.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Computer and Network Security Rabie A. Ramadan. Organization of the Course (Cont.) 2 Textbooks William Stallings, “Cryptography and Network Security,”
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
They Can Hear Your Heartbeats: Non-Invasive Security for Implantable Medical Devices Shyamnath Gollakota, Haitham Hassanieh, Benjamin Ransford, Dina Katabi,
Securing Wireless Medical Implants Shyamnath Gollakota Haitham Hassanieh Benjamin Ransford Dina Katabi Kevin Fu.
The Secure, Automated Home Project Team: Alec Kulbacki Project Advisor: W. Thomas Miller.
Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero- Power Defenses By: Halperin, Heydt—Benjamin, Ransford, Clark, Defend,
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
IMPLANTABLE DEFIBRILLATOR By: Victor J. Gabbidon.
Qinghan Xiao, Cam Boulet and Thomas Gibbons Second International Conference on Availability, Reliability and Security, 2007 Speaker : 黃韋綸 RFID Security.
331: STUDY DATA COMMUNICATIONS AND NETWORKS.  1. Discuss computer networks (5 hrs)  2. Discuss data communications (15 hrs)
Heart Failure Devices: Staying Connected Lisa D. Rathman, MSN, CRNP, CCRN, CHFN The Heart Group of Lancaster General Health Lancaster, PA.
A Critical Analysis on the Security of IoTs
1 Protecting Your Privacy with a Mobile Agent Device in RFID Environment Authors: Sang-Soo Yeo, Soo-Cheol Kim, Sung Kwon Kim, Gilcheol Park, Seok Soo Kim,
Wireless Network Security CSIS 5857: Encoding and Encryption.
EDGE™ Final Project Plan Presentation P09001 – RFID Reader & Active Tag Philip Davenport (Industrial and Systems Engineering)
Forms of Network Attacks Gabriel Owens COSC 352 February 24, 2011.
Implantable Cardioverter Defibrillator (ICD) Reprogramming Guidelines Lauren Butler.
Security and Privacy for Implantable Medical Devices Presented by Tuo Yu 1.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
1 Security problems on RFID tags (short introduction) Sakurai Lab., Kyushu Univ. Junichiro SAITO
What is an Implantable Medical Device?
Packet Leashes: Defense Against Wormhole Attacks
A robust and anonymous patient monitoring system using wireless medical sensor networks Source: Future Generation Computer Systems, Available online 8.
Proximity-based Access Control for Implantable Medical Devices
DANGER Strong Magnetic and Radio-Frequency Fields Present
Volume 6, Issue 10, Pages (October 2009)
Privacy for Public Transportation
They Can Hear Your Heartbeats: Non-Invasive Security for Implantable Medical Devices Shyamnath Gollakota, Haitham Hassanieh, Benjamin Ransford, Dina Katabi,
Presentation transcript:

Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses Authors: Daniel Halperin, Thomas S. Heydt-Benjamin, Benjamin Ransford, Shane S. Clark, Benessa Defend, Will Morgan, Kevin Fu, Tadayoshi Kohno, William H. Maisel Presenter: Raghu Rangan

Implantable Medical Device Can control heart rate, deliver medication, etc. Sophisticated devices with radios But are they secure? What Are IMDs?

Implantable Cardiac Devices Radio-enabled, wirelessly programmable Pacemaking, defibrillation (steady shocks vs. single large shock) Communicates with a device programmer ICDs

Commercial ICD programmer Passive RF listener Active RF attacker Adversaries

Most research has focused on preventing unintentional failures RC5 on WISP Work using software radios to receive transmissions from commercial wireless protocols Related Work

Device programmers can be used directly Programmers can read all ICD information, change all settings No technological controls to ensure authorized use Insider Attack

Black box: watch communication between ICD and programmer Done using inexpensive components:  Oscilloscope  Universal Software Radio Peripheral  Software: GNU Radio, Perl, Matlab Cost: less than $1000 Reverse Engineering

Patient data transmitted cleartext Challenge: modulation, encoding  Not so difficult, standard schemes are used. Name, birth date, ID number, patient history, diagnosis, treating physician... Passive Monitoring

In order to eavesdrop, need to establish timeline for bidirectional comms between ICD and programmer Do not need to decipher transmissions, can infer meanings and some content Transaction Timeline

Eavesdropping Setup

Replay attacks–attacker needs little knowledge Trigger information disclosure Change patient name, ICD clock Change therapies  Can disable functions  Quitely change device state Induce fibrillation  Patient safety at risk Active Attack: Replay

Presence of strong magnet makes ICD transmit telemetry data Can also be triggered without magnet Radio use might run out battery faster DoS could be quite dangerous–replacing the battery requires surgery Active Attack: Denial of Service

Prevent attacks from insiders and outsiders Draw no power from primary battery Security events should be detectable by patient Defense Goals

Use RFID tag (WISPer) to guard ICD communication WISPer harvests power from reader, can perform computations Three applications:  Notification  Authentication  Sensible key exchange Zero Power Defense

When WISPer is activated, beep via piezoelectric speaker After beep, notify ICD it can start using radio Patient aware when ICD is being programmed Can be deterrent for attacker Notification

Challenge/response protocol using RC5 Only if authentication is successful will ICD be told to activate No power is used until authentication succeeds. Authentication

Use audio as a channel for crypto key exchange Modulate sound wave using same scheme as radio Audible to patient, hard to hear at a distance Also uses no power Key Exchange

Still many open problems: key management, failure modes Security problems can have life-threatening consequences IMDs should be treated as what they are computers Conclusion and Future Work

Questions/Comments/Discussion