SlideShare a Scribd company logo
1 of 20
AJAY Karri
AJITH Joseph Jose
Overview

Problem Resource Depletion
Proposed Solution
Features of Shield
Security Model
Ticket Format
Security Issues Addressed
Demo
Test Cases
Future Enhancements
References
Problem- Resource Depletion




IMD                Wireless Attacker
Why Prevent Resource Depletion?

• Attacks can cause serious fatalities to the patient
• The lifetime of IMD reduces from several years to weeks
• Replacing an IMD requires major surgery and will put
   patient at risk
• Attacker may try to gain access to patient privacy
   information
Proposed Solution




IMD    SHIELD         WIRELESS ATTACKER
Features of Shield

 Prevents against the resource depletion attacks .
 Provides user authentication.
 Provides confidentiality to the IMD data.
 Acts as an gateway to the IMD.
 Maintains the user log.
 Acts as a session manager for IMD.
Security Model


         6                              3
Shield                 User                               TGS
         5                              4


               1               2
                                   Assumption:
                                    Shared Secret shared securely
                                      shared between the users.
                                    AES used as encryption algorithm.
 IMD               Authenticator
User                     Authenticator                TGS                    SHIELD



       E[Name,Idc]
                                                            K * - SHARED SECRED
                                                            IDc - CLIENT ID
       E[K*,Tickettgs]


       E[IDc, Tickettgs]


                                E[K*,Ticketshield ]


  E[IDc, Ticketshield]

                                                            Begin Communication
TICKET FORMAT

Authentication                                     Client
    Server
                 E[K*, IDC, TIMESTAMP, LIFETIME]
Access Pattern
Authenticator

                                                    User




                                   Request Access



                                                      Allow or Deny
                                                          Access
                                                       Verify the user with
              Request TGS shared                                the
                    secret                                   database         User access
Shared Keys                              Authenticator          Valid/          Pattern
                                                               Invalid
              TGS Shared secret
Shield
 Session Management:
     Date and Time the user requested the access .
     Duration of the user request.
     Ticket lifetime.
 User logs: [ Time, User, Session Time, Access/Denied ]
 Establishes a secure communication channel between User and IMD by
  acting as a relay.



                                      Shield
     User        Secure Channel                  Secure Channel   IMD
Start




                       Listen to the
                    incoming request




             Deny                      Accept                 Accept
                         Check                   Validate
 Block the
                        the log                  the user
connection

                                                               Initiate
                                                             Connection

                                                 Deny the
                                                connection

                        Add to log
Security Issues Addressed

• Attacker Directly contacts the IMD

• Using Fake User ID and Password to authenticate

• Sending Expired Ticket to TGS or Shield Server

• Sending Fake Ticket to TGS or Shield Server
DEMO
SHIELD       USER                           TGS




                          Communication between
                           devices via Sockets
                          Programing Language: Java
                          Java CryptoX package used for
                           security.

 IMD     AUTHENTICATOR
Test Cases


 Expired Ticket
 Invalid Ticket
 Invalid User access Pattern
 User Trying to Contact the IMD Directly
 Session Management
Future Enhancements

   System needs to handle simultaneous user request
   The user and shield can to be implemented on a mobile device.
   Incorporate Key Exchange.
   Incorporate Log Auditing.
   The Log File At the Shield can be synchronized with the
    Authentication server
Sources
[1] Daniel Halperin, Thomas S. Heydt-benjamin, Kevin Fu, Tadayoshi Kohno, William H. Maisel
“Security and Privacy for Implantable Medical Devices”, IEEE Pervasive Computing, vol 7, no.1,
pp. 30-39, 2008.
[2] Daniel Halperin, Kevin Fu, Shaun S.Clark, Pacemakers and Implantable Cardiac
Defibrillators: Software Radio Attacks and Zero-Power Defenses, IEEE Symposium on Security
and Privacy 2008.
[3] http://www.ists.dartmouth.edu/events/abstract-kevinfu.html
[4] K. Fu, “Inside risks: reducing risks of implantable medical devices,” Communications of the
ACM,vol. 52, pp: 25-27, Jun. 2009.
[5] K. Malasri and L. Wang, “Securing wireless implantable devices for healthcare: ideas and
challenges,” IEEE Communications, vol. 47, pp: 74-80, Jul. 2009
[6] Xiali Hei, Xiaojiang Du, Jie Wu, Fei Hu “Defending Resource Depletion Attacks on
Implantable edical Devices”, Global Telecommunication Conference-GLOBECOM,pMp 1-5,
2010.
[7] B. E. Boser, I. M. Guyon, and V. N. Vapnik, “A training algorithm for optimal margin
classifiers,” In Proc. of the 5th Annual ACM Workshop on COLT, pp: 144-152, 1992.
[8] S. Cherukuri, K. K. Venkatasubramanian, and S. K. S. Gupta, “Biosec: a biometric based
approach for securing communication in wireless networks of biosensors implanted in the
human body,” In Proc. of Intl. Conf. on Parallel Processing Workshops, pp: 432-439, 2003.
Secure Communication In Imd
Secure Communication In Imd

More Related Content

What's hot

Webinar - Easy multi factor authentication strategies and PCI DSS
Webinar - Easy multi factor authentication strategies and PCI DSSWebinar - Easy multi factor authentication strategies and PCI DSS
Webinar - Easy multi factor authentication strategies and PCI DSSonionid12
 
Smart Card Authentication
Smart Card AuthenticationSmart Card Authentication
Smart Card AuthenticationDan Usher
 
DS-Entrust-SSL-Document-Signing-APR16-WEB2
DS-Entrust-SSL-Document-Signing-APR16-WEB2DS-Entrust-SSL-Document-Signing-APR16-WEB2
DS-Entrust-SSL-Document-Signing-APR16-WEB2Lucas Gritziotis
 
Enabling Web Apps For DoD Security via PKI/CAC Enablement (Forge.Mil case study)
Enabling Web Apps For DoD Security via PKI/CAC Enablement (Forge.Mil case study)Enabling Web Apps For DoD Security via PKI/CAC Enablement (Forge.Mil case study)
Enabling Web Apps For DoD Security via PKI/CAC Enablement (Forge.Mil case study)Richard Bullington-McGuire
 
Ynamono Hs Lecture
Ynamono Hs LectureYnamono Hs Lecture
Ynamono Hs Lectureynamoto
 
Context Automation (with video demos)
Context Automation (with video demos)Context Automation (with video demos)
Context Automation (with video demos)Phil Windley
 
digital-water-marking-created-by-subrat&rubi
digital-water-marking-created-by-subrat&rubidigital-water-marking-created-by-subrat&rubi
digital-water-marking-created-by-subrat&rubimishrasubrat
 
Smart Cards & Devices Forum 2012 - Securing Cloud Computing
Smart Cards & Devices Forum 2012 - Securing Cloud ComputingSmart Cards & Devices Forum 2012 - Securing Cloud Computing
Smart Cards & Devices Forum 2012 - Securing Cloud ComputingOKsystem
 
FrontOne our new and different solutions
FrontOne our new and different solutionsFrontOne our new and different solutions
FrontOne our new and different solutionsfrontone
 
Kerberos-PKI-Federated identity
Kerberos-PKI-Federated identityKerberos-PKI-Federated identity
Kerberos-PKI-Federated identityWAFAA AL SALMAN
 
Digital signature
Digital  signatureDigital  signature
Digital signatureAJAL A J
 
Digital signature 3
Digital signature 3Digital signature 3
Digital signature 3Ankita Dave
 
Securing online services by combining smart cards and web-based applications
Securing online services by combining smart cards and web-based applicationsSecuring online services by combining smart cards and web-based applications
Securing online services by combining smart cards and web-based applicationsOlivier Potonniée
 

What's hot (19)

Webinar - Easy multi factor authentication strategies and PCI DSS
Webinar - Easy multi factor authentication strategies and PCI DSSWebinar - Easy multi factor authentication strategies and PCI DSS
Webinar - Easy multi factor authentication strategies and PCI DSS
 
Topic 6 authentication2 12_dec_2012-1
Topic 6 authentication2 12_dec_2012-1Topic 6 authentication2 12_dec_2012-1
Topic 6 authentication2 12_dec_2012-1
 
Smart Card Authentication
Smart Card AuthenticationSmart Card Authentication
Smart Card Authentication
 
DS-Entrust-SSL-Document-Signing-APR16-WEB2
DS-Entrust-SSL-Document-Signing-APR16-WEB2DS-Entrust-SSL-Document-Signing-APR16-WEB2
DS-Entrust-SSL-Document-Signing-APR16-WEB2
 
Enabling Web Apps For DoD Security via PKI/CAC Enablement (Forge.Mil case study)
Enabling Web Apps For DoD Security via PKI/CAC Enablement (Forge.Mil case study)Enabling Web Apps For DoD Security via PKI/CAC Enablement (Forge.Mil case study)
Enabling Web Apps For DoD Security via PKI/CAC Enablement (Forge.Mil case study)
 
Ynamono Hs Lecture
Ynamono Hs LectureYnamono Hs Lecture
Ynamono Hs Lecture
 
Context Automation (with video demos)
Context Automation (with video demos)Context Automation (with video demos)
Context Automation (with video demos)
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
Sms passcode
Sms passcodeSms passcode
Sms passcode
 
Ijcnc050205
Ijcnc050205Ijcnc050205
Ijcnc050205
 
Pragmatic approach to_dds_security_2008
Pragmatic approach to_dds_security_2008Pragmatic approach to_dds_security_2008
Pragmatic approach to_dds_security_2008
 
digital-water-marking-created-by-subrat&rubi
digital-water-marking-created-by-subrat&rubidigital-water-marking-created-by-subrat&rubi
digital-water-marking-created-by-subrat&rubi
 
Smart Cards & Devices Forum 2012 - Securing Cloud Computing
Smart Cards & Devices Forum 2012 - Securing Cloud ComputingSmart Cards & Devices Forum 2012 - Securing Cloud Computing
Smart Cards & Devices Forum 2012 - Securing Cloud Computing
 
FrontOne our new and different solutions
FrontOne our new and different solutionsFrontOne our new and different solutions
FrontOne our new and different solutions
 
Kerberos-PKI-Federated identity
Kerberos-PKI-Federated identityKerberos-PKI-Federated identity
Kerberos-PKI-Federated identity
 
Digital signature
Digital  signatureDigital  signature
Digital signature
 
Digital signature 3
Digital signature 3Digital signature 3
Digital signature 3
 
Securing online services by combining smart cards and web-based applications
Securing online services by combining smart cards and web-based applicationsSecuring online services by combining smart cards and web-based applications
Securing online services by combining smart cards and web-based applications
 
Identity Assertions Draftv5
Identity Assertions Draftv5Identity Assertions Draftv5
Identity Assertions Draftv5
 

Viewers also liked

5 Dan Berman USDA Perspectiva Agricola entre Estados Unidos y México
5 Dan Berman USDA Perspectiva Agricola entre Estados Unidos y México5 Dan Berman USDA Perspectiva Agricola entre Estados Unidos y México
5 Dan Berman USDA Perspectiva Agricola entre Estados Unidos y MéxicoConsejo MexicanodelaCarne
 
Secure communication in imd
Secure communication in imdSecure communication in imd
Secure communication in imdAjay Karri
 
Online Social Netowrks- report
Online Social Netowrks- reportOnline Social Netowrks- report
Online Social Netowrks- reportAjay Karri
 
9 Patrick Boyle AMI Situación y Retos del Sector Cárnico
9 Patrick Boyle AMI  Situación y Retos del Sector Cárnico9 Patrick Boyle AMI  Situación y Retos del Sector Cárnico
9 Patrick Boyle AMI Situación y Retos del Sector CárnicoConsejo MexicanodelaCarne
 

Viewers also liked (10)

Disney Portfolio
Disney PortfolioDisney Portfolio
Disney Portfolio
 
5 Dan Berman USDA Perspectiva Agricola entre Estados Unidos y México
5 Dan Berman USDA Perspectiva Agricola entre Estados Unidos y México5 Dan Berman USDA Perspectiva Agricola entre Estados Unidos y México
5 Dan Berman USDA Perspectiva Agricola entre Estados Unidos y México
 
Wagby10point
Wagby10pointWagby10point
Wagby10point
 
Secure communication in imd
Secure communication in imdSecure communication in imd
Secure communication in imd
 
Branka i zoka
Branka i zokaBranka i zoka
Branka i zoka
 
Wagby10min2011
Wagby10min2011Wagby10min2011
Wagby10min2011
 
Online Social Netowrks- report
Online Social Netowrks- reportOnline Social Netowrks- report
Online Social Netowrks- report
 
WagbyCampaign2015
WagbyCampaign2015WagbyCampaign2015
WagbyCampaign2015
 
9 Patrick Boyle AMI Situación y Retos del Sector Cárnico
9 Patrick Boyle AMI  Situación y Retos del Sector Cárnico9 Patrick Boyle AMI  Situación y Retos del Sector Cárnico
9 Patrick Boyle AMI Situación y Retos del Sector Cárnico
 
Pmt20151027 seminar
Pmt20151027 seminarPmt20151027 seminar
Pmt20151027 seminar
 

Similar to Secure Communication In Imd

Cost effective authentic and anonymous
Cost effective authentic and anonymousCost effective authentic and anonymous
Cost effective authentic and anonymousnexgentech15
 
Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
 Cost-Effective Authentic and Anonymous Data Sharing with Forward Security Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
Cost-Effective Authentic and Anonymous Data Sharing with Forward Securitynexgentechnology
 
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYNexgen Technology
 
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...Editor IJMTER
 
Mutual Authentication For Wireless Communication
Mutual Authentication For Wireless CommunicationMutual Authentication For Wireless Communication
Mutual Authentication For Wireless Communicationmanish kumar
 
Lecture 9 key distribution and user authentication
Lecture 9 key distribution and user authentication Lecture 9 key distribution and user authentication
Lecture 9 key distribution and user authentication rajakhurram
 
New Trends in Web Security
New Trends in Web SecurityNew Trends in Web Security
New Trends in Web SecurityOliver Pfaff
 
Implementation of public key cryptography in kerberos with prevention 2
Implementation of public key cryptography in kerberos with prevention 2Implementation of public key cryptography in kerberos with prevention 2
Implementation of public key cryptography in kerberos with prevention 2IAEME Publication
 
Implementation of public key cryptography in kerberos with prevention of secu...
Implementation of public key cryptography in kerberos with prevention of secu...Implementation of public key cryptography in kerberos with prevention of secu...
Implementation of public key cryptography in kerberos with prevention of secu...abhijeetguptaa
 
Efficient and Secure Single Sign on Mechanism for Distributed Network
Efficient and Secure Single Sign on Mechanism for Distributed NetworkEfficient and Secure Single Sign on Mechanism for Distributed Network
Efficient and Secure Single Sign on Mechanism for Distributed NetworkIJERA Editor
 
Cued click point image based kerberos authentication protocol
Cued click point image based kerberos authentication protocolCued click point image based kerberos authentication protocol
Cued click point image based kerberos authentication protocolIAEME Publication
 
Security patterns with wso2 esb
Security patterns with wso2 esbSecurity patterns with wso2 esb
Security patterns with wso2 esbHasiniG
 

Similar to Secure Communication In Imd (20)

Week3 lecture
Week3 lectureWeek3 lecture
Week3 lecture
 
325 330
325 330325 330
325 330
 
Cost effective authentic and anonymous
Cost effective authentic and anonymousCost effective authentic and anonymous
Cost effective authentic and anonymous
 
Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
 Cost-Effective Authentic and Anonymous Data Sharing with Forward Security Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
 
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
 
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...
 
3D PASSWORD
3D PASSWORD 3D PASSWORD
3D PASSWORD
 
Session10part1 Server Intro
Session10part1 Server IntroSession10part1 Server Intro
Session10part1 Server Intro
 
Mutual Authentication For Wireless Communication
Mutual Authentication For Wireless CommunicationMutual Authentication For Wireless Communication
Mutual Authentication For Wireless Communication
 
Lecture 9 key distribution and user authentication
Lecture 9 key distribution and user authentication Lecture 9 key distribution and user authentication
Lecture 9 key distribution and user authentication
 
New Trends in Web Security
New Trends in Web SecurityNew Trends in Web Security
New Trends in Web Security
 
Implementation of public key cryptography in kerberos with prevention 2
Implementation of public key cryptography in kerberos with prevention 2Implementation of public key cryptography in kerberos with prevention 2
Implementation of public key cryptography in kerberos with prevention 2
 
Implementation of public key cryptography in kerberos with prevention of secu...
Implementation of public key cryptography in kerberos with prevention of secu...Implementation of public key cryptography in kerberos with prevention of secu...
Implementation of public key cryptography in kerberos with prevention of secu...
 
3D-Password
3D-Password 3D-Password
3D-Password
 
Efficient and Secure Single Sign on Mechanism for Distributed Network
Efficient and Secure Single Sign on Mechanism for Distributed NetworkEfficient and Secure Single Sign on Mechanism for Distributed Network
Efficient and Secure Single Sign on Mechanism for Distributed Network
 
Jdbc 6
Jdbc 6Jdbc 6
Jdbc 6
 
Kerberos
KerberosKerberos
Kerberos
 
Ch15
Ch15Ch15
Ch15
 
Cued click point image based kerberos authentication protocol
Cued click point image based kerberos authentication protocolCued click point image based kerberos authentication protocol
Cued click point image based kerberos authentication protocol
 
Security patterns with wso2 esb
Security patterns with wso2 esbSecurity patterns with wso2 esb
Security patterns with wso2 esb
 

Secure Communication In Imd

  • 2. Overview Problem Resource Depletion Proposed Solution Features of Shield Security Model Ticket Format Security Issues Addressed Demo Test Cases Future Enhancements References
  • 4. Why Prevent Resource Depletion? • Attacks can cause serious fatalities to the patient • The lifetime of IMD reduces from several years to weeks • Replacing an IMD requires major surgery and will put patient at risk • Attacker may try to gain access to patient privacy information
  • 5. Proposed Solution IMD SHIELD WIRELESS ATTACKER
  • 6. Features of Shield  Prevents against the resource depletion attacks .  Provides user authentication.  Provides confidentiality to the IMD data.  Acts as an gateway to the IMD.  Maintains the user log.  Acts as a session manager for IMD.
  • 7. Security Model 6 3 Shield User TGS 5 4 1 2 Assumption:  Shared Secret shared securely shared between the users.  AES used as encryption algorithm. IMD Authenticator
  • 8. User Authenticator TGS SHIELD E[Name,Idc] K * - SHARED SECRED IDc - CLIENT ID E[K*,Tickettgs] E[IDc, Tickettgs] E[K*,Ticketshield ] E[IDc, Ticketshield] Begin Communication
  • 9. TICKET FORMAT Authentication Client Server E[K*, IDC, TIMESTAMP, LIFETIME]
  • 11. Authenticator User Request Access Allow or Deny Access Verify the user with Request TGS shared the secret database User access Shared Keys Authenticator Valid/ Pattern Invalid TGS Shared secret
  • 12. Shield  Session Management:  Date and Time the user requested the access .  Duration of the user request.  Ticket lifetime.  User logs: [ Time, User, Session Time, Access/Denied ]  Establishes a secure communication channel between User and IMD by acting as a relay. Shield User Secure Channel Secure Channel IMD
  • 13. Start Listen to the incoming request Deny Accept Accept Check Validate Block the the log the user connection Initiate Connection Deny the connection Add to log
  • 14. Security Issues Addressed • Attacker Directly contacts the IMD • Using Fake User ID and Password to authenticate • Sending Expired Ticket to TGS or Shield Server • Sending Fake Ticket to TGS or Shield Server
  • 15. DEMO SHIELD USER TGS  Communication between devices via Sockets  Programing Language: Java  Java CryptoX package used for security. IMD AUTHENTICATOR
  • 16. Test Cases  Expired Ticket  Invalid Ticket  Invalid User access Pattern  User Trying to Contact the IMD Directly  Session Management
  • 17. Future Enhancements  System needs to handle simultaneous user request  The user and shield can to be implemented on a mobile device.  Incorporate Key Exchange.  Incorporate Log Auditing.  The Log File At the Shield can be synchronized with the Authentication server
  • 18. Sources [1] Daniel Halperin, Thomas S. Heydt-benjamin, Kevin Fu, Tadayoshi Kohno, William H. Maisel “Security and Privacy for Implantable Medical Devices”, IEEE Pervasive Computing, vol 7, no.1, pp. 30-39, 2008. [2] Daniel Halperin, Kevin Fu, Shaun S.Clark, Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses, IEEE Symposium on Security and Privacy 2008. [3] http://www.ists.dartmouth.edu/events/abstract-kevinfu.html [4] K. Fu, “Inside risks: reducing risks of implantable medical devices,” Communications of the ACM,vol. 52, pp: 25-27, Jun. 2009. [5] K. Malasri and L. Wang, “Securing wireless implantable devices for healthcare: ideas and challenges,” IEEE Communications, vol. 47, pp: 74-80, Jul. 2009 [6] Xiali Hei, Xiaojiang Du, Jie Wu, Fei Hu “Defending Resource Depletion Attacks on Implantable edical Devices”, Global Telecommunication Conference-GLOBECOM,pMp 1-5, 2010. [7] B. E. Boser, I. M. Guyon, and V. N. Vapnik, “A training algorithm for optimal margin classifiers,” In Proc. of the 5th Annual ACM Workshop on COLT, pp: 144-152, 1992. [8] S. Cherukuri, K. K. Venkatasubramanian, and S. K. S. Gupta, “Biosec: a biometric based approach for securing communication in wireless networks of biosensors implanted in the human body,” In Proc. of Intl. Conf. on Parallel Processing Workshops, pp: 432-439, 2003.