Cyber Security and Confidentiality Concerns with Implants
Many lifesaving implantable devices are equipped with wireless technology. This technology enables remote device checks and relieves patients from recurrent consultant visits. But this convenience is associated with unforeseen hazards. These hazards are the security and privacy of data. The labor needed to defend patients from exploits of stealing or nastiness gains more significance. This is especially so with increasing use of wireless telecommunication facilities and the services of global computer network or Internet by implanted devices. The susceptibilities of medical devices are of two types, viz., control or privacy susceptibilities. In control susceptibilities, an unauthorized person acquires control of device operation. The unlicensed person reprograms the device without the patients’ knowledge to disable its therapeutic services. In privacy susceptibilities, confidential patient data are disclosed to an unsanctioned party. Both vulnerabilities are detrimental to patient’s health outcome. Both are avoidable by incorporating well-thought-out measures in device design.
KeywordsSecurity Confidentiality Privacy Encryption Cryptography Jamming Hijacking Insulin pump ICD Biosensor Shield
- 1.Daniluk K, Niewiadomska-Szynkiewicz E (2012) Energy efficient security in implantable medical devices. In: Proceedings of the federated conference on computer science and information systems, 9–12 Sep, Wroclaw, pp 773–778Google Scholar
- 3.Burleson W, Clark SS, Ransford B (2012) Design challenges for secure implantable medical devices. In: 49th ACM/EDAC/IEEE Design automation conference (DAC), 3–7 June, San Francisco, CA, pp 12–17Google Scholar
- 5.Li C, Raghunathan A, Jha NK (2011) Hijacking an insulin pump: security attacks and defenses for a diabetes therapy system. In: 13th International conference on e-health networking, applications and services. Columbia, MO 13–15 June, pp 150–156Google Scholar
- 8.Foo Kune D, Backes J, Clarke SS et al (2013) Ghost talk: mitigating EMI signal rejection attacks against analog sensors. In: Proceedings of the 34th IEEE annual symposium on security and privacy, Berkley, CA, 19–22 May, pp 145–159. doi: 10.1109/SP.2013.20
- 9.Gollakota S, Hassanieh H, Ransford B et al. (2011) They can hear your heartbeats: non-invasive security for implantable medical devices. In: SIGCOMM’11, August 15–19, Toronto, 12 pGoogle Scholar