Previous Page  47 / 61 Next Page
Information
Show Menu
Previous Page 47 / 61 Next Page
Page Background

46

Reference source not found.

. Many medical devices have much less resources than wireless sensor nodes. Hence, security

schemes designed for sensors are not suitable for most of these medical devices.

Second, existing pre-shared-key-based security schemes do not work well for medical devices. A pre-shared-key-based security

scheme let two devices pre-share a secret key, thus the communication between the two devices can be secured. This kind of

security schemes have been widely used for security in wireless sensor networks as well as other wireless networks. However,

this approach does not work well for implantable medical devices, even though some may have the resource to run crypto

algorithms. For a medical device, if it has a pre-shared key with a reader/controller, the key may be used to run security operations.

However, a pre-shared key will bond a medical device to a particular reader. This means that if the patient is out of town and goes

to see a different doctor who does not have the key, there is no way to authenticate and communicate. Storing the key in an online

server will have some problems: (1) a reader may not have Internet access at all times, and (2) it is expensive to run and keep up

a global online server. Hence, this approach does not work well for tiny medical devices.

Third, security schemes for medical devices should be able to handle patients’ emergency situations. During an emergency (a

coma for instance), a patient may be

unconscious and cannot provide the required

credentials (such as a security key or a token)

to the medical personnel, nor can the patient

tell the doctor about his/her medical condition.

In addition, neither device-based schemes nor

family-based schemes can be used if the

patient has an emergency outside his home

city/country. In this case, the patient’s safety

outweighs the security concerns of medical

devices. A good security scheme should

satisfy security, privacy and safety

requirements.

To mitigate some of the above challenges, we

got an NPRP project to study this situation and

come up with potential solutions. After which

we embarked on developing (1) a general data

analytic approaches and models of medical

data as well as proof-of-concept security

schemes for medical devices. We collaborated with medical hospitals that provided us with real medical device data. Using this

data allowed us to develop proof-of-concept security schemes for these devices; (2) we designed effective security schemes for

patients in emergency situations. For the above two cases, we used the system shown in the Figure referring to an Insulin Pump

System. Finally and in order to generalize our findings, we developed effective security schemes for the general purpose wireless

medical devices.

This project was a great success in terms of publications and the developed prototypes. A total of 11 journal publications and 13

conference papers were accomplished. Members of the team from our department are: Prof. Amr Mohamed, Dr. Abdulla Al-Ali

and Prof. Mohsen Guizani. The outside collaborator was at Temple University in the USA represented by Prof. James Du as the

PI. For more information on the research details and the achievements of this project, readers are referred to the publications

available online.