They Can Hear Your Heartbeats: Non-Invasive Security for Implantable Medical Devices Shyamnath Gollakota, Haitham Hassanieh, Benjamin Ransford, Dina Katabi,

Slides:



Advertisements
Similar presentations
Technical Issues Regarding Near Field Communication Group 16 Tyler Swofford Matthew Kotan.
Advertisements

RFID Security and Privacy. RFID Radio Frequency IDentification Warning: "RFID tag" can mean a lot of things.
SoK: Security and Privacy in Implantable Medical Devices and Body Area Networks 0 Fall 2014 Presenter: Kun Sun, Ph.D. Michael Rushanan*, Denis Foo Kune,
Cynthia Kuo, Mark Luk, Rohit Negi, Adrian Perrig Carnegie Mellon University Message-In-a-Bottle: User-Friendly and Secure Cryptographic Key Deployment.
KAIS T Message-In-a-Bottle: User-Friendly and Secure Key Deployment for Sensor Nodes Cynthia Kuo, Mark Luk, Rohit Negi, Adrian Perrig(CMU), Sensys
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses Authors: Daniel Halperin, Thomas S. Heydt-Benjamin, Benjamin.
Embedded Wireless Sensors Tony Arous Vincent Yu. Introduction  Sensors help to easily keep track of various information PeoplePeople ProductsProducts.
Raphael Frank 20 October 2007 Authentication & Intrusion Prevention for Multi-Link Wireless Networks.
Tsunamis Detection The Mission  Tsunamis Detection can help to minimize loss of life and property from future tsunamis. Mission Introduction Mechanism.
Chapter 14 Wireless Attacks, Intrusion Monitoring and Policy
RFID Security CMPE 209, Spring 2009 Presented by:- Snehal Patel Hitesh Patel Submitted to:- Prof Richard Sinn.
Adaptive Security for Wireless Sensor Networks Master Thesis – June 2006.
Security Awareness: Applying Practical Security in Your World
Business Data Communications, Fourth Edition Chapter 10: Network Security.
Wireless Security.
INSENS: Intrusion-Tolerant Routing For Wireless Sensor Networks By: Jing Deng, Richard Han, Shivakant Mishra Presented by: Daryl Lonnon.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Wearable Computing Manuel Probst Barbara Schwarz.
Smart Kitchen Suppakrit Forbes Chatchayanusorn Charles Christopher Onyeama Nachiket Shelgikar Saravana Sivasankaran.
Improving Security. Networking Terms Node –Any device on a network Protocol –Communication standards Host –A node on a network Workstation 1.A PC 2.A.
University of Massachusetts Amherst InteLock TM Team: Emmanuel Seguin Josh Coffin Anh-Kiet Huynh Christos Tsiokos Remote Access and Proximity Key Advisor:
GPS Chips and Implants By: Evan Kelly.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses Zac Chupka Jeff Signore.
Data Integrity and Security. Data integrity  data that has a complete or whole structure  a condition in which data has not been altered or destroyed.
Combating Cross-Technology Interference Shyamnath Gollakota Fadel Adib Dina Katabi Srinivasan Seshan.
David Molnar, David Wagner - Authors Eric McCambridge - Presenter.
Radio Frequency Identification By Bhagyesh Lodha Vinit Mahedia Vishnu Saran Mitesh Bhawsar.
Computer Networks. Network Connections Ethernet Networks Single wire (or bus) runs to all machines Any computer can send info to another computer Header.
Neighborhood Watch: Security and Privacy Analysis of Automatic Meter Reading Systems Ishtiaq Rouf, Hossen Mustafa Rob Miller Marco Grutese Presented By.
A Quantitative Analysis of the Insecurity of Embedded Network Devices: Results of a Wide-Area Scan Ang Cui and Salvatore J. Stolfo Department of Computer.
Introduction Implantable Medical Devices (IMDs) are vulnerable to exploitation (last paper) Unauthorized data retrieval Malicious commands Millions of.
Wireless Network Security By Patrick Yount and CIS 4360 Fall 2009 CIS 4360 Fall 2009.
CS556 Idris Khames. What is RFID? RFID stands for radio frequency identification. It is one of automated systems which used to collect data The beginning.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 50 – The Wireless LAN.
A Feasible IMD Communication Protocol: Security without Obscurity REU fellow(s):, Jason Wang 1, Keyon Mohebzad 2, Luke Johnson 3, Faculty mentor: N. Sertac.
Cell Phone Jammer Sick of cell phones? Then jam them!
WHAT IS JAMMER ?  Jammer are the device by which we can creat a temporary “dead zone”in there immediate proxcimity.  There are three type of jammer.
Wireless Network Security. What is a Wireless Network Wireless networks serve as the transport mechanism between devices and among devices and the traditional.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
Network Coding Testbed Jeremy Bergan, Ben Green, Alex Lee.
Security and Privacy for Implantable Medical Devices Presented by : Dilip Simha.C.R.
Chapter 4 Application Level Security in Cellular Networks.
Submitted By: A.Anjaneyulu INTRODUCTION Near Field Communication (NFC) is based on a short-range wireless connectivity, designed for.
Wireless Network Security Presented by: Prabhakaran Theertharaman.
Securing Wireless Medical Implants Shyamnath Gollakota Haitham Hassanieh Benjamin Ransford Dina Katabi Kevin Fu.
Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero- Power Defenses By: Halperin, Heydt—Benjamin, Ransford, Clark, Defend,
Wireless Security. Traditional method A computer with network card a cable connecting network card and the network.
CIS 325: Data Communications1 Chapter Seventeen Network Security.
Azam Supervisor : Prof. Raj Jain
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
Quantum cryptography How could you transmit information safety? Thanks to codes.
Blood Glucose Sensor System -Yashwanth Prakash. Application Establish a wireless communication link between an implantable glucose-sensor and a phone/computer.
How are Computers Connected? Chapter 8. How do you connect computers? Run wires between two computers Power Cord Plug into a power outlet Two wires needed.
Security in Wireless Network MSIT 526 Cuong Quoc Le December 15, 2005.
By Chris Zachor CS 650.  Introduction  SSH Overview  Scenarios  How To:  Results  Conclusion.
Securing a Wireless Home Network BY: ARGA PRIBADI.
I’m back ! Had a nice Holiday? I’m back ! Had a nice Holiday? Today we are talking PROXIMITY TECHNOLOGY Today we are talking PROXIMITY TECHNOLOGY.
Security and Privacy for Implantable Medical Devices Presented by Tuo Yu 1.
An Brief Overview – Medtronic Wireless Medical Applications Prepared for: U.S. Federal Communications Commission U.S. Food and Drug Administration Public.
What is an Implantable Medical Device?
Cochlear Implants.
Securing Wireless Medical Implants
Proximity-based Access Control for Implantable Medical Devices
Enhancing Web Application Security with Secure Hardware Tokens
Mobile ad hoc networking: imperatives and challenges
They Can Hear Your Heartbeats: Non-Invasive Security for Implantable Medical Devices Shyamnath Gollakota, Haitham Hassanieh, Benjamin Ransford, Dina Katabi,
Ghostbuster: Detecting the Presence of Hidden Eavesdroppers
Presentation transcript:

They Can Hear Your Heartbeats: Non-Invasive Security for Implantable Medical Devices Shyamnath Gollakota, Haitham Hassanieh, Benjamin Ransford, Dina Katabi, and Kevin Fu ACM SIGCOMM 2011

Implantable Medical Devices (IMD) Neurostimulators Cochlear Implants Cardiac Defibrillators

Wireless Interaction in IMD Having wireless in these devices has multiple benefits. First, it makes it easier to communicate with the implant itself. More importantly, it enables remote monitoring of the patient’s status. The patient can be in her home; she would have an implant reader that periodically queries the implant for patient’s vital signals. The reader then forwards this information to the medical professionals over the internet.

Wireless Interaction in IMD Pro: Safety and Cost Con: Security and Privacy Easier communication with implant Remote monitoring Reduces hospital visits by 40% and cost per visit by $1800 [Journal of the American College of Cardiology, 2011] Passive attack: Eavesdrop on private data Active attack: Send unauthorized commands

Possible Security Measurements Cryptography? Problems 1) In emergencies, patient may be taken to a foreign hospital where doctors do not have the secret key 2) Millions of patients already have implants with no crypto; would require surgery to replace

Ideal Solution Cryptography? => The “Shield” Problems 1) In emergencies, patient may be taken to a foreign hospital where doctors do not have the secret key => can be non-intrusively disable 2) Millions of patients already have implants with no crypto; would require surgery to replace => external security module

Traditional System

Shield: Secure Legal Communication Use encryption Doctor configures the shield with a secret key Shield encrypts the implant data and forwards it to doctor  Shield acts as proxy

Shield: Jam Illegal Communication Turn off therapy Implant ID Shield listens on medium Shield jams unauthorized commands  Implants can’t decode or react to illegal commands

Technical Issue Needs to be able to Tx (jam) and Rx at the same time. Needs to be small enough to be portable. ≈ 40 cm wavelength 2

Solution The “Antidote” w/o antidote: 50% BER w/ antidote: 0.2% packet loss

Implementation USRP2 (Universal Software Radio Peripheral) Antenna *2 FPGA Ethernet interface SD card reader

Evaluation IMD: MedtronicTM cardiac implants Legal user: MedtronicTM IMD programmer Attacker: USRP2 Shield: USRP2 Human body: bacon & beef

Test Bed IMD & Shield fixed in one place 20 locations for attacker to test 20cm 30 m

Phase1: Passive Eavesdrop Worst case scenario Attacker is only 20cm away from IMD Average loss rate 0.2%

Phase2: Active Attack Simulating two kinds of attackers 1) Off-the-shelf IMD programmer 2) Self-modified programmer with x100 transmission power

Phase2-1: Off-the-shelf Attacker w/o Shield w/ Shield Less than 14 meters

Without the Shield 14 m Any attack successful No attack successful Here are the results without the shield. As we can the attacker is successful as far 14 meters away and in non-line-of-sight configuration. Thus, an attacker can be in a different room and still mount this attack on an unsuspecting target. 14 m

With the Shield Any attack successful No attack successful 20 cm Next, here are the results in the presence of a shield. As we can see, even at the closest attacker location which is about 20 cm away from the implant, the adversary is unsuccessfully in mount the attack. Thus, we conclude that independent of the location, the shield protects from an adversary mounting active attacks using off-the-shield programmers. 20 cm

Phase2-2: x100 Power Attacker Too powerful, cannot jam it due to limited battery power of Shield However, can warn the wearer by beeping and/or vibration to leave the location

Phase2-2: x100 Power Attacker

Without the Shield 27 m Any attack successful No attack successful First lets look at the result when there is no shield. Now the attack can be mount from farther locations which are as far as 27 meters away. This is expected because the adversary uses much higher power and hence can reach longer distances. Now lets look at the results in the presence of the shield. 27 m

With the Shield Any attack successful No attack successful Here are the result. We can see that the attacker is successful only from nearby locations. Thus, although the shield cannot protect from all high power attacks, now the attacker has to get much closer to the patient to successfully mount its attack. thus, It has significantly raised the bar on the attacker. But, once the attacker gets close enough, it can overwhelm the jamming power and reach the implant. This is a intrinsic limitation of jamming where the shield is constrained by the FCC limitations, while the attacker is not.

Phase2-2: x100 Power Attacker Cannot totally eliminate the hazard But, Raise the bar of active attack Provide detection of hazard

Conclusion First to secure medical implants without modifying them Other applications in RFIDs, small low-power sensors, legacy devices Convergence of wireless and medical devices open up new research problems

Few Comments (kcir) Meticulous foot notes Kind of verbose/repetitive DoS -> wears out the battery Technical invention in disguise of an application work, incurs more attention