Learning Centre

Access Control for Implantable Medical Devices

 |  Login

Show simple item record

dc.contributor Aalto-yliopisto fi
dc.contributor Aalto University en
dc.contributor.author Camara, Carmen
dc.contributor.author Peris-Lopez, Pedro
dc.contributor.author De Fuentes, Jose Maria
dc.contributor.author Marchal, Samuel
dc.date.accessioned 2021-02-02T09:12:26Z
dc.date.available 2021-02-02T09:12:26Z
dc.date.issued 2021
dc.identifier.citation Camara , C , Peris-Lopez , P , De Fuentes , J M & Marchal , S 2021 , ' Access Control for Implantable Medical Devices ' , IEEE Transactions on Emerging Topics in Computing , vol. 9 , no. 3 , pp. 1126-1138 . https://doi.org/10.1109/TETC.2020.2982461 en
dc.identifier.issn 2168-6750
dc.identifier.other PURE UUID: ea362a3e-e46f-404c-a97c-fb79ff1c71e7
dc.identifier.other PURE ITEMURL: https://research.aalto.fi/en/publications/access-control-for-implantable-medical-devices(ea362a3e-e46f-404c-a97c-fb79ff1c71e7).html
dc.identifier.other PURE LINK: http://www.scopus.com/inward/record.url?scp=85082037348&partnerID=8YFLogxK
dc.identifier.other PURE FILEURL: https://research.aalto.fi/files/55556720/SCI_Marchal_Access_Control.09044351_1_.pdf
dc.identifier.uri https://aaltodoc.aalto.fi/handle/123456789/102612
dc.description.abstract The telemetry incorporate in the new generation of Implantable Medical Devices (IMDs) allows remote access and re-programming without interfering with the daily routine of their holders. Despite the benefits of this new feature, such remote access raises new threats related to the access of unauthorized entities to IMDs. Cardiac implants represent the most deployed types of IMD nowadays. Current solutions, to control their remote access, usually use a single feature for authentication. However, this feature is easily replicable, making these authentication schemes vulnerable to attacks. To overcome this limitation, we propose in this article a distance bounding protocol to manage access control of IMDs: ACIMD. ACIMD combines two security mechanisms, namely, identity verification (authentication) and proximity verification (distance checking). The authentication mechanism, formally and informally verified, conforms to the ISO/IEC 9798-2 standard. The distance checking is performed using the whole Electrocardiogram (ECG) signal and relies on the correlation coefficient (comparing an external versus an internal ECG signal) in the Hadamard domain. We evaluate the accuracy and security of ACIMD access control using ECG signals of 199 individuals recorded over 24 hours while considering three adversary strategies. Our results show that ACIMD is 92.92% accurate. en
dc.format.mimetype application/pdf
dc.language.iso en en
dc.publisher IEEE Computer Society
dc.relation.ispartofseries IEEE Transactions on Emerging Topics in Computing en
dc.rights openAccess en
dc.title Access Control for Implantable Medical Devices en
dc.type A1 Alkuperäisartikkeli tieteellisessä aikakauslehdessä fi
dc.description.version Peer reviewed en
dc.contributor.department Universidad Carlos III de Madrid
dc.contributor.department Department of Computer Science
dc.contributor.department Professorship Aura Tuomas
dc.subject.keyword Cybersecurity
dc.subject.keyword Distance Bounding
dc.subject.keyword E-health
dc.subject.keyword Implantable Medical Devices (IMDs)
dc.subject.keyword Remote Access
dc.identifier.urn URN:NBN:fi:aalto-202102021914
dc.identifier.doi 10.1109/TETC.2020.2982461
dc.type.version acceptedVersion

Files in this item

Files Size Format View

There are no open access files associated with this item.

This item appears in the following Collection(s)

Show simple item record

Search archive

Advanced Search

article-iconSubmit a publication