2018 IEEE Conference on Communications and Network Security (CNS) 2018
DOI: 10.1109/cns.2018.8433213
|View full text |Cite
|
Sign up to set email alerts
|

e-SAFE: Secure, Efficient and Forensics-Enabled Access to Implantable Medical Devices

Abstract: To facilitate monitoring and management, modern Implantable Medical Devices (IMDs) are often equipped with wireless capabilities, which raise the risk of malicious access to IMDs. Although schemes are proposed to secure the IMD access, some issues are still open. First, pre-sharing a long-term key between a patient's IMD and a doctor's programmer is vulnerable since once the doctor's programmer is compromised, all of her patients suffer; establishing a temporary key by leveraging proximity gets rid of pre-shar… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
10
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(10 citation statements)
references
References 36 publications
(40 reference statements)
0
10
0
Order By: Relevance
“…Chi et al’s protocol [ 14 ] e-SAFE aims to provide secure, efficient, and forensics-enabled access to IMDs. The system uses a smartphone as a proxy to undertake most of the security-related tasks and establishes a trusted channel between the IMD and the smartphone by sharing a secret key derived from a master key that is physically inaccessible to attackers.…”
Section: Related Workmentioning
confidence: 99%
“…Chi et al’s protocol [ 14 ] e-SAFE aims to provide secure, efficient, and forensics-enabled access to IMDs. The system uses a smartphone as a proxy to undertake most of the security-related tasks and establishes a trusted channel between the IMD and the smartphone by sharing a secret key derived from a master key that is physically inaccessible to attackers.…”
Section: Related Workmentioning
confidence: 99%
“…This protocol [25] uses a compressing-based encryption mechanism and public key infrastructure, and other cryptographic protocols, such as RSA, AES, and HMAC. The protocol comprises three participants-IMD, smartphone, and programmer.…”
Section: Chi Et Al's Protocolmentioning
confidence: 99%
“…Next, we used two well-known security verification approaches, BAN logic [21] and AVISPA [22], to formally analyze the authentication protocols. Unfortunately, many security protocols designed for IMDs are not formally verified, or they use only one verification method [23][24][25][26][27][28][29][30].…”
Section: Introductionmentioning
confidence: 99%
“…Chi et al [10] propose a protocol that relies on the patient's smartphone for the reader access. However, requiring the patient to be in possession of this additional device (i.e., the smartphone) all the time, including during emergencies, puts a significant burden on the patient.…”
Section: Related Workmentioning
confidence: 99%