Details

ECG Based Data Encryption Scheme for Implantable Medical Devices

Keerthi Raj

M TECH Student, Department of Electronics and Communication Engineering, GISAT Engineering College,Kottayam, Kerala, India

Baby John

HOD and professor, Department of Electronics and Communication Engineering, GISAT Engineering College, Kottayam, Kerala, India

97-109

Vol: 6, Issue: 4, 2016

Receiving Date: 2016-08-07 Acceptance Date:

2016-10-12

Publication Date:

2016-11-14

Download PDF

Abstract

New Technologies are appearing to provide a more efficient treatment of diseases or human deficiencies. Implantable medical devices constitute one example, these being devices with more computing, decision making and communication capabilities. Several research works in the computer security field have identified serious security and privacy risks in IMDs that could compromise the implant and even the health of patient who carries it. Implantable Medical Devices (IMDs), such as pacemakers, implantable cardiac defibrillators, neuro-stimulators, drug delivery systems perform a variety of health monitoring and therapeutic functions. Currently wireless communication capabilities have been embedded as an intrinsic part of many modern IMDs. The ECG based data encryption is designed with the ability to provide information-theoretically unbreakable encryption .Here ECG features are used to facilitate a key distribution. The random binary strings generated from ECG signals are directly used as key for encryption. The IMD encrypts its secret data with one key before transmission and after receiving the ciphertext, a programmer decrypts the secret data using another synchronously generated key.

Keywords: Encryption; Decryption; Ciphertext; Implantable medical devices (IMDs); Electrocardiogram (ECG).

References

  1. D. Halperin, T. Kohno, T. S. Heydt-Benjamin, K. Fu, and W. H. Maisel, ‘‘Security and privacy for implantable medical devices,’’ IEEE Pervasive Comput., vol. 7, no. 1, pp. 30–39, Jan./Mar. 2008.
  2. G. Zheng, G. Fang, M. A. Orgun, and R. Shankaran, ‘‘A non-key based security scheme supporting emergency treatment of wireless implants,’’ in Proc. IEEE Int. Conf. Commun. (ICC), Jun. 2014, pp. 647–652
  3. S. Hosseini-Khayat, ‘‘A lightweight security protocol for ultra-low power ASIC implementation for wireless implantable medical devices,’’ in Proc. 5th Int. Symp. Med. Inf. Commun. Technol. (ISMICT), Mar. 2011, pp. 6–9.
  4. N. Ellouze, M. Allouche, H. Ben Ahmed, S. Rekhis, and N. Boudriga, ‘‘Securing implantable cardiac medical devices: Use of radio frequency energy harvesting,’’ in Proc. 3rd Int. Workshop Trustworthy Embedded Devices, 2013, pp. 35–42.
  5. C. Strydis, R. M. Seepers, P. Peris-Lopez, D. Siskos, and I. Sourdis, ‘‘A system architecture, processor, and communication protocol for secure implants,’’ ACM Trans. Archit. Code Optim. (TACO), vol. 10, no. 4, 2013, Art. ID 57.
  6. G. Zheng, G. Fang, M. A. Orgun, R. Shankaran, and E. Dutkiewicz, ‘‘Securing wireless medical implants using an ECG-based secret data sharing scheme,’’ in Proc. 14th Int. Symp. Commun. Inf. Technol. (ISCIT), Sep. 2014, pp. 373–377.
  7. C. E. Shannon, ‘‘Communication theory of secrecy systems,’’ Bell Syst. Tech. J., vol. 28, no. 4, pp. 656–715, 1949
  8. F.-G. Deng and G. L. Long, ‘‘Secure direct communication with a quantum one-time pad,’’ Phys. Rev. A, vol. 69, no. 5, p. 052319, 2004.
  9. R. Horstmeyer, B. Judkewitz, C. Yang, and I. M. Vellekoop, ‘‘Physical key- protected one time pad,’’ U.S. Patent 20130243187, Feb. 21, 2013.
  10. Z. Zhang, H. Wang, A. V. Vasilakos, and H. Fang, ‘‘ECG-cryptography and authentication in body area networks,’’ IEEE Trans. Inf. Technol. Biomed., vol. 16, no. 6, pp. 1070–1078, Nov. 2012.
  11. W. Burleson, S. S. Clark, B. Ransford, and K. Fu, ‘‘Design challenges for secure implantable medical devices,’’ in Proc. 49th Annu. Design Autom. Conf., Jun. 2012, pp. 12–17
  12. A. S. Wander, N. Gura, H. Eberle,V. Gupta, and S.C. Shantz,``Energy analysis of public-key cryptography for wireless sensor networks,'' in Proc. 3rd IEEE Int. Conf. Pervasive Comput. Commun. (PerCom), Mar. 2005.
Back

Disclaimer: All papers published in IJRST will be indexed on Google Search Engine as per their policy.

We are one of the best in the field of watches and we take care of the needs of our customers and produce replica watches of very good quality as per their demands.