SlideShare a Scribd company logo
1 of 49
ICRTIT-2011 Half-day Tutorial on  Wireless Security in Medical Devices   Dr G V Rangaraj, IEEE Senior Member Senior Technical Manager HCL Technologies, Chennai, INDIA
Motivation & Objective Scope  Generally in telecommunications, the security design is complex and requires a deep study of the cryptography theory. However due the time constraint in the production cycle it is necessary to come with an elegant design that also meets the standard constraints in a relatively short duration. This tutorial would help to overcome this issue by providing brief and precise security algorithm concepts necessary for the design of such pragmatic WPAN/WBAN sensor based medical device receiver.
Abstract Wireless communication is playing a key role in connecting medical devices to the outside world and has various advantages over the wired-connections.  However it still has only a slow acceptance in the medical equipment market due to its vulnerable nature of security attacks in such environments compared to its wired counterpart. In this tutorial we would be providing a comprehensive overview of the security attacks possible in the various layers of the wireless embedded medical devices network and the corresponding counter-measures. We would then provide an overview of the wireless security issues in a Zigbee healthcare network, which, is being projected as the most common wireless technology for next generation embedded medical devices. The main challenge in the embedded medical device community is the wireless body area network (WBAN) which typically deals with implantable medical devices like implantable cardioverter-defibrillator (ICD). In this tutorial, we would also discuss some of the wireless security solutions proposed in the currently evolving IEEE 802.15 TG 6 WBAN initiatives in an implant environment.
Tutorial Outline: (Duration: 3 hours) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
INTRODUCTION
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],FDA Guidelines
[object Object],[object Object],[object Object],EMC (Electromagnetic Compatibility)
TYPICAL WIRELESS MEDICAL DEVICES NETWORK
Medical Devices Network
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],MD Network Components
SECURITY THREATS IN A WIRELESS MEDICAL DEVICES NETWORK
Physical Layer ,[object Object],[object Object],[object Object],[object Object],[object Object]
Data Link/MAC Layer ,[object Object],[object Object],[object Object],[object Object]
Data Link/MAC Layer ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Higher Layer ,[object Object],[object Object],[object Object],[object Object],[object Object]
Higher Layer ,[object Object],[object Object],[object Object],[object Object],[object Object]
Security threats - Summary Layers DoS Attacks Defenses Physical Jamming Spread-Spectrum, priority messages, lower duty cycle, region mapping, mode changes Link Tampering Tamper proof, hiding Collision Error Correction Code Unfairness Small frames Network Exhaustion Rate limitation Neglect and greed Redundancy, probing Homing Encryption Misdirection Egress filtering, authorization monitoring Black holes Authorization monitoring, redundancy Transport Flooding Client Puzzles Desynchronisation Authentication
SECURITY SOLUTIONS
Security Requirements & Solutions Security Requirements  Possible Security Solutions  Data Confidentiality and Privacy Symmetric Key Encryption/Decryption Data Integrity and Authenticity  Secure Symmetric Key Hashing Digital signature  Freshness and Availability  Encrypted counter Redundancy  Secure Management Random Key Distribution, Public Key Cryptography,  Secure Group Communication, Intrusion detection
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Data Confidentiality and Privacy
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Data Integrity and Authenticity
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Freshness and Availability
[object Object],[object Object],[object Object],[object Object],[object Object],Secure Management
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Security Solutions - Summary
Security Solutions - Summary Security Threats Security Requirements Possible security solutions Unauthenticated or unauthorized access Key establishment and trust setup Random key distribution Public key cryptography Message disclosure Confidentiality and privacy Link/network layer encryption Access control Message modification Integrity and authenticity Keyed secure hash function Digital signature Denial of Service (DoS) Availability Intrusion detection Redundancy Node capture & compromised node Resilience to node compromise Inconsistency detection of node and revocation Tamper-proofing Routing attacks Secure routing Secure routing protocols Intrusion and high level security attacks Secure group management, intrusion detection, secure data aggregation Secure group communication Intrusion detection
CASE STUDY – I WPAN - Zigbee
WPAN ,[object Object],[object Object],[object Object],[object Object],[object Object],Security Modes Description Null No security AES-CTR Encryption only, CTR Mode AES-CBC-MAC-128 128 bit MAC AES-CBC-MAC-64 64 bit MAC AES-CBC-MAC-32 32 bit MAC AES-CCM-128 Encryption & 128 bit MAC AES-CCM-64 Encryption & 64 bit MAC AES-CCM-32 Encryption & 32 bit MAC
AES - CTR ,[object Object],[object Object],[object Object],[object Object],[object Object]
AES - CTR ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
AES – CBS - MAC ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
AES – CBS - MAC ,[object Object],[object Object],[object Object],[object Object]
AES - CCM ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
AES - CCM ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CASE STUDY – II WBAN – IEEE 802.15 WG 6
[object Object],[object Object],[object Object],[object Object],Need for WBAN?
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],IEEE 802.15 WG 6 - WBAN
WBAN PHY & MAC ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],WBAN Nodes
[object Object],WBAN Channels
WBAN Frequency Bands Scenario Description Frequency Band  Channel Model S1 Implant to Implant 402-405 MHz CM1 S2 Implant to Body Surface 402-405 MHz CM2 S3 Implant to External 402-405 MHz CM2 S4 Body Surface to Body Surface (LOS) 13.5,50,400,600, 900 MHz 2.4,3.1-10.6 GHz CM3 S5 Body Surface to Body Surface (NLOS) 13.5,50,400,600, 900 MHz 2.4,3.1-10.6 GHz CM3 S6 Body Surface to External (LOS) 900 MHz 2.4,3.1-10.6 GHz CM4 S7 Body Surface to External (NLOS) 900 MHz 2.4,3.1-10.6 GHz CM4
WBAN ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
WBAN Architecture ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Security in WBAN ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Key Security Differences from WPAN ,[object Object],[object Object],[object Object],[object Object],[object Object]
Secure Management in WBAN ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CONCLUSIONS
Thank you!  QUESTIONS & ANSWERS
Biography Rangaraj  received his B.Tech in Electrical Engineering from Indian Institute of Technology (IIT) Madras, India in 1998, M.S in Electrical and Computer Engineering from Georgia Tech, U.S.A. in 2000 and PhD in Electrical Engineering from IIT Madras, India in 2005 with specialization in communication systems. His current areas of interest include design and development of wireless solutions/ PHY/MAC layer chipsets for future wireless systems involving wireless personal/body area networks and signal processing algorithms for 4G wireless communication systems. During his doctoral studies, he also worked as Project Officer for the DECT Wireless in Local Loop project with the Tenet Group. After graduation, he worked as Technical Lead Engineer at HCL Technologies, Chennai, where he was developing physical layer of MBOA UWB wireless system on FPGA platforms and at NXP Semiconductors, Bangalore developing physical layer for Wireless LAN on embedded vector processors. He then worked as Wireless Specialist at Tata Elxsi, Chennai in design of Physical layer for LTE wireless systems and other 4G wireless systems on DSP platforms. Currently he is working as Senior Technical Manager at HCL Technologies, Chennai in design of wireless solutions in medical, automotive and industrial verticals. He has published more than ten papers in various national and international conferences and journals and also an active reviewer. He is the recipient of the Philips award and Seimens award for being the student with best academic record in Electrical Engineering Department at IIT Madras during 1994–1998. He is also the recipient of the Colonel Oscar Cleaver award for being the outstanding graduate student in the School of Electrical and Computer Engineering, Georgia Institute of Technology during 1998–1999.  
Thank You

More Related Content

What's hot

Security Analysis and Improvement for IEEE 802.11i
Security Analysis and Improvement for IEEE 802.11iSecurity Analysis and Improvement for IEEE 802.11i
Security Analysis and Improvement for IEEE 802.11iinventionjournals
 
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...IJTET Journal
 
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...IJCNCJournal
 
A review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkA review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkAlexander Decker
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) ijceronline
 
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...IRJET Journal
 
Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...
Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...
Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...Kumar Goud
 
A NEW GENERATION OF DRIVER ASSISTANCE AND SECURITY
A NEW GENERATION OF DRIVER ASSISTANCE AND SECURITYA NEW GENERATION OF DRIVER ASSISTANCE AND SECURITY
A NEW GENERATION OF DRIVER ASSISTANCE AND SECURITYIJCI JOURNAL
 
Iaetsd baack better adaptive
Iaetsd baack better adaptiveIaetsd baack better adaptive
Iaetsd baack better adaptiveIaetsd Iaetsd
 
IJSRED-V2I5P18
IJSRED-V2I5P18IJSRED-V2I5P18
IJSRED-V2I5P18IJSRED
 
Classification and review of security schemes
Classification and review of security schemesClassification and review of security schemes
Classification and review of security schemesHabitamuAsimare
 
Securing information in wireless sensor networks
Securing information in wireless sensor networksSecuring information in wireless sensor networks
Securing information in wireless sensor networkseSAT Publishing House
 
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...IRJET Journal
 
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGESA SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGESEditor IJCTER
 
A Survey Paper on Jamming Attacks and its Countermeasures in Wireless Networks
A Survey Paper on Jamming Attacks and its Countermeasures in Wireless NetworksA Survey Paper on Jamming Attacks and its Countermeasures in Wireless Networks
A Survey Paper on Jamming Attacks and its Countermeasures in Wireless NetworksIRJET Journal
 
Analysis of wireless sensor networks
Analysis of wireless sensor networksAnalysis of wireless sensor networks
Analysis of wireless sensor networkseSAT Journals
 
Analysis of wireless sensor networks security, attacks and challenges
Analysis of wireless sensor networks security, attacks and challengesAnalysis of wireless sensor networks security, attacks and challenges
Analysis of wireless sensor networks security, attacks and challengeseSAT Publishing House
 

What's hot (18)

Ijcet 06 07_001
Ijcet 06 07_001Ijcet 06 07_001
Ijcet 06 07_001
 
Security Analysis and Improvement for IEEE 802.11i
Security Analysis and Improvement for IEEE 802.11iSecurity Analysis and Improvement for IEEE 802.11i
Security Analysis and Improvement for IEEE 802.11i
 
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
 
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
 
A review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkA review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor network
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
 
Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...
Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...
Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...
 
A NEW GENERATION OF DRIVER ASSISTANCE AND SECURITY
A NEW GENERATION OF DRIVER ASSISTANCE AND SECURITYA NEW GENERATION OF DRIVER ASSISTANCE AND SECURITY
A NEW GENERATION OF DRIVER ASSISTANCE AND SECURITY
 
Iaetsd baack better adaptive
Iaetsd baack better adaptiveIaetsd baack better adaptive
Iaetsd baack better adaptive
 
IJSRED-V2I5P18
IJSRED-V2I5P18IJSRED-V2I5P18
IJSRED-V2I5P18
 
Classification and review of security schemes
Classification and review of security schemesClassification and review of security schemes
Classification and review of security schemes
 
Securing information in wireless sensor networks
Securing information in wireless sensor networksSecuring information in wireless sensor networks
Securing information in wireless sensor networks
 
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
 
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGESA SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
 
A Survey Paper on Jamming Attacks and its Countermeasures in Wireless Networks
A Survey Paper on Jamming Attacks and its Countermeasures in Wireless NetworksA Survey Paper on Jamming Attacks and its Countermeasures in Wireless Networks
A Survey Paper on Jamming Attacks and its Countermeasures in Wireless Networks
 
Analysis of wireless sensor networks
Analysis of wireless sensor networksAnalysis of wireless sensor networks
Analysis of wireless sensor networks
 
Analysis of wireless sensor networks security, attacks and challenges
Analysis of wireless sensor networks security, attacks and challengesAnalysis of wireless sensor networks security, attacks and challenges
Analysis of wireless sensor networks security, attacks and challenges
 

Viewers also liked

Monster zomb presentation a w c
Monster zomb presentation a w c Monster zomb presentation a w c
Monster zomb presentation a w c ASGroup5
 
How a Web Redesign 
Drives Organizational Change: A Cautionary Tale
How a Web Redesign 
Drives Organizational Change: A Cautionary TaleHow a Web Redesign 
Drives Organizational Change: A Cautionary Tale
How a Web Redesign 
Drives Organizational Change: A Cautionary TaleSorel Denholtz
 
Paseo por microsoft word
Paseo por microsoft wordPaseo por microsoft word
Paseo por microsoft wordsantiagocb
 
Trabajo unificado internacional (3)
Trabajo unificado internacional (3)Trabajo unificado internacional (3)
Trabajo unificado internacional (3)fredyloza
 
Syllabus informatica-i-octubre2015 (1) (1)
Syllabus informatica-i-octubre2015 (1) (1)Syllabus informatica-i-octubre2015 (1) (1)
Syllabus informatica-i-octubre2015 (1) (1)mariaestrada96
 
Análisis en la estructura del tráfico portuario
 Análisis en la estructura del tráfico portuario Análisis en la estructura del tráfico portuario
Análisis en la estructura del tráfico portuarioYc G
 
Documentos primaria-sesiones-unidad06-cuarto grado-integrados-4g-u6-sesion33
Documentos primaria-sesiones-unidad06-cuarto grado-integrados-4g-u6-sesion33Documentos primaria-sesiones-unidad06-cuarto grado-integrados-4g-u6-sesion33
Documentos primaria-sesiones-unidad06-cuarto grado-integrados-4g-u6-sesion33Teresa Clotilde Ojeda Sánchez
 
Fiche de données de sécurité France du Liquide de Frein Marchal DOT3 référenc...
Fiche de données de sécurité France du Liquide de Frein Marchal DOT3 référenc...Fiche de données de sécurité France du Liquide de Frein Marchal DOT3 référenc...
Fiche de données de sécurité France du Liquide de Frein Marchal DOT3 référenc...Hugo Vallet
 
Intoxicacion alimentaria no bacteriana
Intoxicacion alimentaria no bacterianaIntoxicacion alimentaria no bacteriana
Intoxicacion alimentaria no bacterianaDeyanira Trinidad
 
Fiche de données de sécurité France Liquide de Frein Marchal DOT4 Basse Visco...
Fiche de données de sécurité France Liquide de Frein Marchal DOT4 Basse Visco...Fiche de données de sécurité France Liquide de Frein Marchal DOT4 Basse Visco...
Fiche de données de sécurité France Liquide de Frein Marchal DOT4 Basse Visco...Hugo Vallet
 
Fiche de données de sécurité France Liquide Minéral Hydraulique Marchal LHM r...
Fiche de données de sécurité France Liquide Minéral Hydraulique Marchal LHM r...Fiche de données de sécurité France Liquide Minéral Hydraulique Marchal LHM r...
Fiche de données de sécurité France Liquide Minéral Hydraulique Marchal LHM r...Hugo Vallet
 
Ecosystem of higher education in india
Ecosystem of higher education in indiaEcosystem of higher education in india
Ecosystem of higher education in indiaAnup Singh
 

Viewers also liked (20)

informatica
informaticainformatica
informatica
 
Monster zomb presentation a w c
Monster zomb presentation a w c Monster zomb presentation a w c
Monster zomb presentation a w c
 
PROYECTO
PROYECTOPROYECTO
PROYECTO
 
PROYECTO
PROYECTOPROYECTO
PROYECTO
 
How a Web Redesign 
Drives Organizational Change: A Cautionary Tale
How a Web Redesign 
Drives Organizational Change: A Cautionary TaleHow a Web Redesign 
Drives Organizational Change: A Cautionary Tale
How a Web Redesign 
Drives Organizational Change: A Cautionary Tale
 
Paseo por microsoft word
Paseo por microsoft wordPaseo por microsoft word
Paseo por microsoft word
 
Trabajo unificado internacional (3)
Trabajo unificado internacional (3)Trabajo unificado internacional (3)
Trabajo unificado internacional (3)
 
Syllabus informatica-i-octubre2015 (1) (1)
Syllabus informatica-i-octubre2015 (1) (1)Syllabus informatica-i-octubre2015 (1) (1)
Syllabus informatica-i-octubre2015 (1) (1)
 
Ots prese
Ots preseOts prese
Ots prese
 
tesis
tesistesis
tesis
 
Análisis en la estructura del tráfico portuario
 Análisis en la estructura del tráfico portuario Análisis en la estructura del tráfico portuario
Análisis en la estructura del tráfico portuario
 
Documentos primaria-sesiones-unidad06-cuarto grado-integrados-4g-u6-sesion33
Documentos primaria-sesiones-unidad06-cuarto grado-integrados-4g-u6-sesion33Documentos primaria-sesiones-unidad06-cuarto grado-integrados-4g-u6-sesion33
Documentos primaria-sesiones-unidad06-cuarto grado-integrados-4g-u6-sesion33
 
Fiche de données de sécurité France du Liquide de Frein Marchal DOT3 référenc...
Fiche de données de sécurité France du Liquide de Frein Marchal DOT3 référenc...Fiche de données de sécurité France du Liquide de Frein Marchal DOT3 référenc...
Fiche de données de sécurité France du Liquide de Frein Marchal DOT3 référenc...
 
PROYECTO
PROYECTOPROYECTO
PROYECTO
 
Mi tren
Mi trenMi tren
Mi tren
 
Intoxicacion alimentaria no bacteriana
Intoxicacion alimentaria no bacterianaIntoxicacion alimentaria no bacteriana
Intoxicacion alimentaria no bacteriana
 
Fiche de données de sécurité France Liquide de Frein Marchal DOT4 Basse Visco...
Fiche de données de sécurité France Liquide de Frein Marchal DOT4 Basse Visco...Fiche de données de sécurité France Liquide de Frein Marchal DOT4 Basse Visco...
Fiche de données de sécurité France Liquide de Frein Marchal DOT4 Basse Visco...
 
PROYECTO
PROYECTO PROYECTO
PROYECTO
 
Fiche de données de sécurité France Liquide Minéral Hydraulique Marchal LHM r...
Fiche de données de sécurité France Liquide Minéral Hydraulique Marchal LHM r...Fiche de données de sécurité France Liquide Minéral Hydraulique Marchal LHM r...
Fiche de données de sécurité France Liquide Minéral Hydraulique Marchal LHM r...
 
Ecosystem of higher education in india
Ecosystem of higher education in indiaEcosystem of higher education in india
Ecosystem of higher education in india
 

Similar to Tutorial on Wirless Security in Medical Devices

Wireless Device and Network level security
Wireless Device and Network level securityWireless Device and Network level security
Wireless Device and Network level securityChetan Kumar S
 
Wireless Communiction Security
Wireless Communiction SecurityWireless Communiction Security
Wireless Communiction SecurityMeet Soni
 
Security protocols & platform for wsn based medical applications
Security protocols & platform for wsn based medical applicationsSecurity protocols & platform for wsn based medical applications
Security protocols & platform for wsn based medical applicationsaviiandevil
 
Security protocols & platform for wsn based medical applications
Security protocols & platform for wsn based medical applicationsSecurity protocols & platform for wsn based medical applications
Security protocols & platform for wsn based medical applicationsaviiandevil7
 
Moving From Contactless to Wireless Technologies in Secure, Over-the-Air Tran...
Moving From Contactless to Wireless Technologies in Secure, Over-the-Air Tran...Moving From Contactless to Wireless Technologies in Secure, Over-the-Air Tran...
Moving From Contactless to Wireless Technologies in Secure, Over-the-Air Tran...Underwriters Laboratories
 
Protocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its SecurityProtocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its SecurityIJERA Editor
 
Wireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesWireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesMichael Boman
 
Adhoc and Sensor Networks - Chapter 10
Adhoc and Sensor Networks - Chapter 10Adhoc and Sensor Networks - Chapter 10
Adhoc and Sensor Networks - Chapter 10Ali Habeeb
 
A review of security protocols in m health wireless body area networks (wban)...
A review of security protocols in m health wireless body area networks (wban)...A review of security protocols in m health wireless body area networks (wban)...
A review of security protocols in m health wireless body area networks (wban)...James Kang
 
Analysis Of Security In Wireless Network
Analysis Of Security In Wireless NetworkAnalysis Of Security In Wireless Network
Analysis Of Security In Wireless NetworkSteven Wallach
 
A Survey On Wireless security
A Survey On Wireless securityA Survey On Wireless security
A Survey On Wireless securitySarath K Sukumar
 
Security in Wireless Sensor Networks Using Broadcasting
Security in Wireless Sensor Networks Using BroadcastingSecurity in Wireless Sensor Networks Using Broadcasting
Security in Wireless Sensor Networks Using BroadcastingIJMER
 
Analysis of network_security_threats_and_vulnerabilities_by_development__impl...
Analysis of network_security_threats_and_vulnerabilities_by_development__impl...Analysis of network_security_threats_and_vulnerabilities_by_development__impl...
Analysis of network_security_threats_and_vulnerabilities_by_development__impl...Tương Hoàng
 
WLAN Attacks and Protection
WLAN Attacks and ProtectionWLAN Attacks and Protection
WLAN Attacks and ProtectionChandrak Trivedi
 
Wi fi security
Wi fi securityWi fi security
Wi fi securitygruzabb
 
Meletis Belsis - Wireless Security: Common Protocols and Vulnerabilities
Meletis Belsis - Wireless Security: Common Protocols and VulnerabilitiesMeletis Belsis - Wireless Security: Common Protocols and Vulnerabilities
Meletis Belsis - Wireless Security: Common Protocols and VulnerabilitiesMeletis Belsis MPhil/MRes/BSc
 

Similar to Tutorial on Wirless Security in Medical Devices (20)

Wireless Device and Network level security
Wireless Device and Network level securityWireless Device and Network level security
Wireless Device and Network level security
 
Wireless Communiction Security
Wireless Communiction SecurityWireless Communiction Security
Wireless Communiction Security
 
Security protocols & platform for wsn based medical applications
Security protocols & platform for wsn based medical applicationsSecurity protocols & platform for wsn based medical applications
Security protocols & platform for wsn based medical applications
 
Security protocols & platform for wsn based medical applications
Security protocols & platform for wsn based medical applicationsSecurity protocols & platform for wsn based medical applications
Security protocols & platform for wsn based medical applications
 
Moving From Contactless to Wireless Technologies in Secure, Over-the-Air Tran...
Moving From Contactless to Wireless Technologies in Secure, Over-the-Air Tran...Moving From Contactless to Wireless Technologies in Secure, Over-the-Air Tran...
Moving From Contactless to Wireless Technologies in Secure, Over-the-Air Tran...
 
Protocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its SecurityProtocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its Security
 
Wireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesWireless LAN Deployment Best Practices
Wireless LAN Deployment Best Practices
 
Adhoc and Sensor Networks - Chapter 10
Adhoc and Sensor Networks - Chapter 10Adhoc and Sensor Networks - Chapter 10
Adhoc and Sensor Networks - Chapter 10
 
A review of security protocols in m health wireless body area networks (wban)...
A review of security protocols in m health wireless body area networks (wban)...A review of security protocols in m health wireless body area networks (wban)...
A review of security protocols in m health wireless body area networks (wban)...
 
Analysis Of Security In Wireless Network
Analysis Of Security In Wireless NetworkAnalysis Of Security In Wireless Network
Analysis Of Security In Wireless Network
 
Cit877[1]
Cit877[1]Cit877[1]
Cit877[1]
 
Security issues
Security issuesSecurity issues
Security issues
 
A Survey On Wireless security
A Survey On Wireless securityA Survey On Wireless security
A Survey On Wireless security
 
Securing the Use of Wireless Fidelity (WiFi) in Libraries
Securing the Use of Wireless Fidelity (WiFi) in LibrariesSecuring the Use of Wireless Fidelity (WiFi) in Libraries
Securing the Use of Wireless Fidelity (WiFi) in Libraries
 
Security in Wireless Sensor Networks Using Broadcasting
Security in Wireless Sensor Networks Using BroadcastingSecurity in Wireless Sensor Networks Using Broadcasting
Security in Wireless Sensor Networks Using Broadcasting
 
Analysis of network_security_threats_and_vulnerabilities_by_development__impl...
Analysis of network_security_threats_and_vulnerabilities_by_development__impl...Analysis of network_security_threats_and_vulnerabilities_by_development__impl...
Analysis of network_security_threats_and_vulnerabilities_by_development__impl...
 
Wi Fi Technology
Wi Fi TechnologyWi Fi Technology
Wi Fi Technology
 
WLAN Attacks and Protection
WLAN Attacks and ProtectionWLAN Attacks and Protection
WLAN Attacks and Protection
 
Wi fi security
Wi fi securityWi fi security
Wi fi security
 
Meletis Belsis - Wireless Security: Common Protocols and Vulnerabilities
Meletis Belsis - Wireless Security: Common Protocols and VulnerabilitiesMeletis Belsis - Wireless Security: Common Protocols and Vulnerabilities
Meletis Belsis - Wireless Security: Common Protocols and Vulnerabilities
 

Recently uploaded

Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 

Tutorial on Wirless Security in Medical Devices

  • 1. ICRTIT-2011 Half-day Tutorial on Wireless Security in Medical Devices Dr G V Rangaraj, IEEE Senior Member Senior Technical Manager HCL Technologies, Chennai, INDIA
  • 2. Motivation & Objective Scope Generally in telecommunications, the security design is complex and requires a deep study of the cryptography theory. However due the time constraint in the production cycle it is necessary to come with an elegant design that also meets the standard constraints in a relatively short duration. This tutorial would help to overcome this issue by providing brief and precise security algorithm concepts necessary for the design of such pragmatic WPAN/WBAN sensor based medical device receiver.
  • 3. Abstract Wireless communication is playing a key role in connecting medical devices to the outside world and has various advantages over the wired-connections. However it still has only a slow acceptance in the medical equipment market due to its vulnerable nature of security attacks in such environments compared to its wired counterpart. In this tutorial we would be providing a comprehensive overview of the security attacks possible in the various layers of the wireless embedded medical devices network and the corresponding counter-measures. We would then provide an overview of the wireless security issues in a Zigbee healthcare network, which, is being projected as the most common wireless technology for next generation embedded medical devices. The main challenge in the embedded medical device community is the wireless body area network (WBAN) which typically deals with implantable medical devices like implantable cardioverter-defibrillator (ICD). In this tutorial, we would also discuss some of the wireless security solutions proposed in the currently evolving IEEE 802.15 TG 6 WBAN initiatives in an implant environment.
  • 4.
  • 6.
  • 7.
  • 8. TYPICAL WIRELESS MEDICAL DEVICES NETWORK
  • 10.
  • 11. SECURITY THREATS IN A WIRELESS MEDICAL DEVICES NETWORK
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17. Security threats - Summary Layers DoS Attacks Defenses Physical Jamming Spread-Spectrum, priority messages, lower duty cycle, region mapping, mode changes Link Tampering Tamper proof, hiding Collision Error Correction Code Unfairness Small frames Network Exhaustion Rate limitation Neglect and greed Redundancy, probing Homing Encryption Misdirection Egress filtering, authorization monitoring Black holes Authorization monitoring, redundancy Transport Flooding Client Puzzles Desynchronisation Authentication
  • 19. Security Requirements & Solutions Security Requirements Possible Security Solutions Data Confidentiality and Privacy Symmetric Key Encryption/Decryption Data Integrity and Authenticity Secure Symmetric Key Hashing Digital signature Freshness and Availability Encrypted counter Redundancy Secure Management Random Key Distribution, Public Key Cryptography, Secure Group Communication, Intrusion detection
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25. Security Solutions - Summary Security Threats Security Requirements Possible security solutions Unauthenticated or unauthorized access Key establishment and trust setup Random key distribution Public key cryptography Message disclosure Confidentiality and privacy Link/network layer encryption Access control Message modification Integrity and authenticity Keyed secure hash function Digital signature Denial of Service (DoS) Availability Intrusion detection Redundancy Node capture & compromised node Resilience to node compromise Inconsistency detection of node and revocation Tamper-proofing Routing attacks Secure routing Secure routing protocols Intrusion and high level security attacks Secure group management, intrusion detection, secure data aggregation Secure group communication Intrusion detection
  • 26. CASE STUDY – I WPAN - Zigbee
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34. CASE STUDY – II WBAN – IEEE 802.15 WG 6
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40. WBAN Frequency Bands Scenario Description Frequency Band Channel Model S1 Implant to Implant 402-405 MHz CM1 S2 Implant to Body Surface 402-405 MHz CM2 S3 Implant to External 402-405 MHz CM2 S4 Body Surface to Body Surface (LOS) 13.5,50,400,600, 900 MHz 2.4,3.1-10.6 GHz CM3 S5 Body Surface to Body Surface (NLOS) 13.5,50,400,600, 900 MHz 2.4,3.1-10.6 GHz CM3 S6 Body Surface to External (LOS) 900 MHz 2.4,3.1-10.6 GHz CM4 S7 Body Surface to External (NLOS) 900 MHz 2.4,3.1-10.6 GHz CM4
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 47. Thank you! QUESTIONS & ANSWERS
  • 48. Biography Rangaraj received his B.Tech in Electrical Engineering from Indian Institute of Technology (IIT) Madras, India in 1998, M.S in Electrical and Computer Engineering from Georgia Tech, U.S.A. in 2000 and PhD in Electrical Engineering from IIT Madras, India in 2005 with specialization in communication systems. His current areas of interest include design and development of wireless solutions/ PHY/MAC layer chipsets for future wireless systems involving wireless personal/body area networks and signal processing algorithms for 4G wireless communication systems. During his doctoral studies, he also worked as Project Officer for the DECT Wireless in Local Loop project with the Tenet Group. After graduation, he worked as Technical Lead Engineer at HCL Technologies, Chennai, where he was developing physical layer of MBOA UWB wireless system on FPGA platforms and at NXP Semiconductors, Bangalore developing physical layer for Wireless LAN on embedded vector processors. He then worked as Wireless Specialist at Tata Elxsi, Chennai in design of Physical layer for LTE wireless systems and other 4G wireless systems on DSP platforms. Currently he is working as Senior Technical Manager at HCL Technologies, Chennai in design of wireless solutions in medical, automotive and industrial verticals. He has published more than ten papers in various national and international conferences and journals and also an active reviewer. He is the recipient of the Philips award and Seimens award for being the student with best academic record in Electrical Engineering Department at IIT Madras during 1994–1998. He is also the recipient of the Colonel Oscar Cleaver award for being the outstanding graduate student in the School of Electrical and Computer Engineering, Georgia Institute of Technology during 1998–1999.