Abstract-In this paper we derive an engineering specification for functionality, security, and implementation demands for RFID Implantable Medical Devices (IMD) requiring medical data storage and wireless communication. We illustrate the specification by sketching a secure communication protocol for RFID IMDs. The specification follows from our requirements analysis of application characteristics, legal restrictions, security requirements and ethical concerns of IMDs. In our analysis we have recognized three main types of IMD applications: identification, financial and medical/emergency. The hardware implementation constraints and security level requirements of IMD systems differ from mainstream applications of RFID. The presented specification that considers the special operating environment, delicate use cases and safety-critical functionality of IMD systems is aimed to be a conceptual platform for designing robust security schemes and long-term functional and physical reliability.Index Terms-RFID implant systems, security and privacy, hardware limitations, ethical concerns, lightweight cryptography.
I. INTRODUCTIONThe developments of mobile and wireless technologies have set the infrastructure for the communication systems universally. Radio Frequency Identification (RFID), one of the recent new wireless technologies, can be used to identify items tagged with an RFID tag. The identification process of RFID is executed by three major modules: an RFID tag, an RFID reader, and a back-end database system. An RFID tag communicates with an RFID reader wirelessly to identify it. The information required to complete the identification process is provided by the back-end database system, which the readers access through the Internet.Currently RFID technology is deployed in widespread applications, such as electronic passports, asset tracking, toll payments, and entrance access control. RFID tags have for some time been used for identifying animals, and analogous solutions for humans are emerging.RFID enabled implants are medical devices implanted into a human body through a surgical procedure. One of the prominent implant brands is Positive ID (formerly VeriChip). It was approved by the U.S. Food and Drug Administration (FDA) read from a distance of up to 10-15 cm. Other essential data associated to the owner of the tag is kept in a centralized database. VeriMed, the commercial application of VeriChip RFID implants, is designed to be used for patient identification in healthcare.Like all wireless applications and devices, also RFID is vulnerable to interception or eavesdropping by unauthorized parties. This quite justifiably raises privacy and security concerns. If no countermeasures are in place, it is possible to read some or even all information on an RFID tag without consent, and subsequently acquire relevant information on the item bearing the tag. It is also possible to track an individual tag if its ID is known. Once a tag has been read by an attacker, if the same tag ID is identified later, it is very likel...