SlideShare a Scribd company logo
1 of 49
ICRTIT-2011 Half-day Tutorial on  Wireless Security in Medical Devices   Dr G V Rangaraj, IEEE Senior Member Senior Technical Manager HCL Technologies, Chennai, INDIA
Motivation & Objective Scope  Generally in telecommunications, the security design is complex and requires a deep study of the cryptography theory. However due the time constraint in the production cycle it is necessary to come with an elegant design that also meets the standard constraints in a relatively short duration. This tutorial would help to overcome this issue by providing brief and precise security algorithm concepts necessary for the design of such pragmatic WPAN/WBAN sensor based medical device receiver.
Abstract Wireless communication is playing a key role in connecting medical devices to the outside world and has various advantages over the wired-connections.  However it still has only a slow acceptance in the medical equipment market due to its vulnerable nature of security attacks in such environments compared to its wired counterpart. In this tutorial we would be providing a comprehensive overview of the security attacks possible in the various layers of the wireless embedded medical devices network and the corresponding counter-measures. We would then provide an overview of the wireless security issues in a Zigbee healthcare network, which, is being projected as the most common wireless technology for next generation embedded medical devices. The main challenge in the embedded medical device community is the wireless body area network (WBAN) which typically deals with implantable medical devices like implantable cardioverter-defibrillator (ICD). In this tutorial, we would also discuss some of the wireless security solutions proposed in the currently evolving IEEE 802.15 TG 6 WBAN initiatives in an implant environment.
Tutorial Outline: (Duration: 3 hours) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
INTRODUCTION
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],FDA Guidelines
[object Object],[object Object],[object Object],EMC (Electromagnetic Compatibility)
TYPICAL WIRELESS MEDICAL DEVICES NETWORK
Medical Devices Network
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],MD Network Components
SECURITY THREATS IN A WIRELESS MEDICAL DEVICES NETWORK
Physical Layer ,[object Object],[object Object],[object Object],[object Object],[object Object]
Data Link/MAC Layer ,[object Object],[object Object],[object Object],[object Object]
Data Link/MAC Layer ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Higher Layer ,[object Object],[object Object],[object Object],[object Object],[object Object]
Higher Layer ,[object Object],[object Object],[object Object],[object Object],[object Object]
Security threats - Summary Layers DoS Attacks Defenses Physical Jamming Spread-Spectrum, priority messages, lower duty cycle, region mapping, mode changes Link Tampering Tamper proof, hiding Collision Error Correction Code Unfairness Small frames Network Exhaustion Rate limitation Neglect and greed Redundancy, probing Homing Encryption Misdirection Egress filtering, authorization monitoring Black holes Authorization monitoring, redundancy Transport Flooding Client Puzzles Desynchronisation Authentication
SECURITY SOLUTIONS
Security Requirements & Solutions Security Requirements  Possible Security Solutions  Data Confidentiality and Privacy Symmetric Key Encryption/Decryption Data Integrity and Authenticity  Secure Symmetric Key Hashing Digital signature  Freshness and Availability  Encrypted counter Redundancy  Secure Management Random Key Distribution, Public Key Cryptography,  Secure Group Communication, Intrusion detection
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Data Confidentiality and Privacy
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Data Integrity and Authenticity
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Freshness and Availability
[object Object],[object Object],[object Object],[object Object],[object Object],Secure Management
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Security Solutions - Summary
Security Solutions - Summary Security Threats Security Requirements Possible security solutions Unauthenticated or unauthorized access Key establishment and trust setup Random key distribution Public key cryptography Message disclosure Confidentiality and privacy Link/network layer encryption Access control Message modification Integrity and authenticity Keyed secure hash function Digital signature Denial of Service (DoS) Availability Intrusion detection Redundancy Node capture & compromised node Resilience to node compromise Inconsistency detection of node and revocation Tamper-proofing Routing attacks Secure routing Secure routing protocols Intrusion and high level security attacks Secure group management, intrusion detection, secure data aggregation Secure group communication Intrusion detection
CASE STUDY – I WPAN - Zigbee
WPAN ,[object Object],[object Object],[object Object],[object Object],[object Object],Security Modes Description Null No security AES-CTR Encryption only, CTR Mode AES-CBC-MAC-128 128 bit MAC AES-CBC-MAC-64 64 bit MAC AES-CBC-MAC-32 32 bit MAC AES-CCM-128 Encryption & 128 bit MAC AES-CCM-64 Encryption & 64 bit MAC AES-CCM-32 Encryption & 32 bit MAC
AES - CTR ,[object Object],[object Object],[object Object],[object Object],[object Object]
AES - CTR ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
AES – CBS - MAC ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
AES – CBS - MAC ,[object Object],[object Object],[object Object],[object Object]
AES - CCM ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
AES - CCM ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CASE STUDY – II WBAN – IEEE 802.15 WG 6
[object Object],[object Object],[object Object],[object Object],Need for WBAN?
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],IEEE 802.15 WG 6 - WBAN
WBAN PHY & MAC ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],WBAN Nodes
[object Object],WBAN Channels
WBAN Frequency Bands Scenario Description Frequency Band  Channel Model S1 Implant to Implant 402-405 MHz CM1 S2 Implant to Body Surface 402-405 MHz CM2 S3 Implant to External 402-405 MHz CM2 S4 Body Surface to Body Surface (LOS) 13.5,50,400,600, 900 MHz 2.4,3.1-10.6 GHz CM3 S5 Body Surface to Body Surface (NLOS) 13.5,50,400,600, 900 MHz 2.4,3.1-10.6 GHz CM3 S6 Body Surface to External (LOS) 900 MHz 2.4,3.1-10.6 GHz CM4 S7 Body Surface to External (NLOS) 900 MHz 2.4,3.1-10.6 GHz CM4
WBAN ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
WBAN Architecture ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Security in WBAN ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Key Security Differences from WPAN ,[object Object],[object Object],[object Object],[object Object],[object Object]
Secure Management in WBAN ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CONCLUSIONS
Thank you!  QUESTIONS & ANSWERS
Biography Rangaraj  received his B.Tech in Electrical Engineering from Indian Institute of Technology (IIT) Madras, India in 1998, M.S in Electrical and Computer Engineering from Georgia Tech, U.S.A. in 2000 and PhD in Electrical Engineering from IIT Madras, India in 2005 with specialization in communication systems. His current areas of interest include design and development of wireless solutions/ PHY/MAC layer chipsets for future wireless systems involving wireless personal/body area networks and signal processing algorithms for 4G wireless communication systems. During his doctoral studies, he also worked as Project Officer for the DECT Wireless in Local Loop project with the Tenet Group. After graduation, he worked as Technical Lead Engineer at HCL Technologies, Chennai, where he was developing physical layer of MBOA UWB wireless system on FPGA platforms and at NXP Semiconductors, Bangalore developing physical layer for Wireless LAN on embedded vector processors. He then worked as Wireless Specialist at Tata Elxsi, Chennai in design of Physical layer for LTE wireless systems and other 4G wireless systems on DSP platforms. Currently he is working as Senior Technical Manager at HCL Technologies, Chennai in design of wireless solutions in medical, automotive and industrial verticals. He has published more than ten papers in various national and international conferences and journals and also an active reviewer. He is the recipient of the Philips award and Seimens award for being the student with best academic record in Electrical Engineering Department at IIT Madras during 1994–1998. He is also the recipient of the Colonel Oscar Cleaver award for being the outstanding graduate student in the School of Electrical and Computer Engineering, Georgia Institute of Technology during 1998–1999.  
Thank You

More Related Content

What's hot

Security Analysis and Improvement for IEEE 802.11i
Security Analysis and Improvement for IEEE 802.11iSecurity Analysis and Improvement for IEEE 802.11i
Security Analysis and Improvement for IEEE 802.11iinventionjournals
 
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...IJTET Journal
 
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...IJCNCJournal
 
A review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkA review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkAlexander Decker
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) ijceronline
 
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...IRJET Journal
 
Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...
Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...
Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...Kumar Goud
 
A NEW GENERATION OF DRIVER ASSISTANCE AND SECURITY
A NEW GENERATION OF DRIVER ASSISTANCE AND SECURITYA NEW GENERATION OF DRIVER ASSISTANCE AND SECURITY
A NEW GENERATION OF DRIVER ASSISTANCE AND SECURITYIJCI JOURNAL
 
Iaetsd baack better adaptive
Iaetsd baack better adaptiveIaetsd baack better adaptive
Iaetsd baack better adaptiveIaetsd Iaetsd
 
IJSRED-V2I5P18
IJSRED-V2I5P18IJSRED-V2I5P18
IJSRED-V2I5P18IJSRED
 
Classification and review of security schemes
Classification and review of security schemesClassification and review of security schemes
Classification and review of security schemesHabitamuAsimare
 
Securing information in wireless sensor networks
Securing information in wireless sensor networksSecuring information in wireless sensor networks
Securing information in wireless sensor networkseSAT Publishing House
 
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...IRJET Journal
 
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGESA SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGESEditor IJCTER
 
A Survey Paper on Jamming Attacks and its Countermeasures in Wireless Networks
A Survey Paper on Jamming Attacks and its Countermeasures in Wireless NetworksA Survey Paper on Jamming Attacks and its Countermeasures in Wireless Networks
A Survey Paper on Jamming Attacks and its Countermeasures in Wireless NetworksIRJET Journal
 
Analysis of wireless sensor networks
Analysis of wireless sensor networksAnalysis of wireless sensor networks
Analysis of wireless sensor networkseSAT Journals
 
Analysis of wireless sensor networks security, attacks and challenges
Analysis of wireless sensor networks security, attacks and challengesAnalysis of wireless sensor networks security, attacks and challenges
Analysis of wireless sensor networks security, attacks and challengeseSAT Publishing House
 

What's hot (18)

Ijcet 06 07_001
Ijcet 06 07_001Ijcet 06 07_001
Ijcet 06 07_001
 
Security Analysis and Improvement for IEEE 802.11i
Security Analysis and Improvement for IEEE 802.11iSecurity Analysis and Improvement for IEEE 802.11i
Security Analysis and Improvement for IEEE 802.11i
 
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
 
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
 
A review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkA review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor network
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
 
Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...
Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...
Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...
 
A NEW GENERATION OF DRIVER ASSISTANCE AND SECURITY
A NEW GENERATION OF DRIVER ASSISTANCE AND SECURITYA NEW GENERATION OF DRIVER ASSISTANCE AND SECURITY
A NEW GENERATION OF DRIVER ASSISTANCE AND SECURITY
 
Iaetsd baack better adaptive
Iaetsd baack better adaptiveIaetsd baack better adaptive
Iaetsd baack better adaptive
 
IJSRED-V2I5P18
IJSRED-V2I5P18IJSRED-V2I5P18
IJSRED-V2I5P18
 
Classification and review of security schemes
Classification and review of security schemesClassification and review of security schemes
Classification and review of security schemes
 
Securing information in wireless sensor networks
Securing information in wireless sensor networksSecuring information in wireless sensor networks
Securing information in wireless sensor networks
 
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
 
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGESA SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
 
A Survey Paper on Jamming Attacks and its Countermeasures in Wireless Networks
A Survey Paper on Jamming Attacks and its Countermeasures in Wireless NetworksA Survey Paper on Jamming Attacks and its Countermeasures in Wireless Networks
A Survey Paper on Jamming Attacks and its Countermeasures in Wireless Networks
 
Analysis of wireless sensor networks
Analysis of wireless sensor networksAnalysis of wireless sensor networks
Analysis of wireless sensor networks
 
Analysis of wireless sensor networks security, attacks and challenges
Analysis of wireless sensor networks security, attacks and challengesAnalysis of wireless sensor networks security, attacks and challenges
Analysis of wireless sensor networks security, attacks and challenges
 

Viewers also liked

Monster zomb presentation a w c
Monster zomb presentation a w c Monster zomb presentation a w c
Monster zomb presentation a w c ASGroup5
 
How a Web Redesign 
Drives Organizational Change: A Cautionary Tale
How a Web Redesign 
Drives Organizational Change: A Cautionary TaleHow a Web Redesign 
Drives Organizational Change: A Cautionary Tale
How a Web Redesign 
Drives Organizational Change: A Cautionary TaleSorel Denholtz
 
Paseo por microsoft word
Paseo por microsoft wordPaseo por microsoft word
Paseo por microsoft wordsantiagocb
 
Trabajo unificado internacional (3)
Trabajo unificado internacional (3)Trabajo unificado internacional (3)
Trabajo unificado internacional (3)fredyloza
 
Syllabus informatica-i-octubre2015 (1) (1)
Syllabus informatica-i-octubre2015 (1) (1)Syllabus informatica-i-octubre2015 (1) (1)
Syllabus informatica-i-octubre2015 (1) (1)mariaestrada96
 
Análisis en la estructura del tráfico portuario
 Análisis en la estructura del tráfico portuario Análisis en la estructura del tráfico portuario
Análisis en la estructura del tráfico portuarioYc G
 
Documentos primaria-sesiones-unidad06-cuarto grado-integrados-4g-u6-sesion33
Documentos primaria-sesiones-unidad06-cuarto grado-integrados-4g-u6-sesion33Documentos primaria-sesiones-unidad06-cuarto grado-integrados-4g-u6-sesion33
Documentos primaria-sesiones-unidad06-cuarto grado-integrados-4g-u6-sesion33Teresa Clotilde Ojeda Sánchez
 
Fiche de données de sécurité France du Liquide de Frein Marchal DOT3 référenc...
Fiche de données de sécurité France du Liquide de Frein Marchal DOT3 référenc...Fiche de données de sécurité France du Liquide de Frein Marchal DOT3 référenc...
Fiche de données de sécurité France du Liquide de Frein Marchal DOT3 référenc...Hugo Vallet
 
Intoxicacion alimentaria no bacteriana
Intoxicacion alimentaria no bacterianaIntoxicacion alimentaria no bacteriana
Intoxicacion alimentaria no bacterianaDeyanira Trinidad
 
Fiche de données de sécurité France Liquide de Frein Marchal DOT4 Basse Visco...
Fiche de données de sécurité France Liquide de Frein Marchal DOT4 Basse Visco...Fiche de données de sécurité France Liquide de Frein Marchal DOT4 Basse Visco...
Fiche de données de sécurité France Liquide de Frein Marchal DOT4 Basse Visco...Hugo Vallet
 
Fiche de données de sécurité France Liquide Minéral Hydraulique Marchal LHM r...
Fiche de données de sécurité France Liquide Minéral Hydraulique Marchal LHM r...Fiche de données de sécurité France Liquide Minéral Hydraulique Marchal LHM r...
Fiche de données de sécurité France Liquide Minéral Hydraulique Marchal LHM r...Hugo Vallet
 
Ecosystem of higher education in india
Ecosystem of higher education in indiaEcosystem of higher education in india
Ecosystem of higher education in indiaAnup Singh
 

Viewers also liked (20)

informatica
informaticainformatica
informatica
 
Monster zomb presentation a w c
Monster zomb presentation a w c Monster zomb presentation a w c
Monster zomb presentation a w c
 
PROYECTO
PROYECTOPROYECTO
PROYECTO
 
PROYECTO
PROYECTOPROYECTO
PROYECTO
 
How a Web Redesign 
Drives Organizational Change: A Cautionary Tale
How a Web Redesign 
Drives Organizational Change: A Cautionary TaleHow a Web Redesign 
Drives Organizational Change: A Cautionary Tale
How a Web Redesign 
Drives Organizational Change: A Cautionary Tale
 
Paseo por microsoft word
Paseo por microsoft wordPaseo por microsoft word
Paseo por microsoft word
 
Trabajo unificado internacional (3)
Trabajo unificado internacional (3)Trabajo unificado internacional (3)
Trabajo unificado internacional (3)
 
Syllabus informatica-i-octubre2015 (1) (1)
Syllabus informatica-i-octubre2015 (1) (1)Syllabus informatica-i-octubre2015 (1) (1)
Syllabus informatica-i-octubre2015 (1) (1)
 
Ots prese
Ots preseOts prese
Ots prese
 
tesis
tesistesis
tesis
 
Análisis en la estructura del tráfico portuario
 Análisis en la estructura del tráfico portuario Análisis en la estructura del tráfico portuario
Análisis en la estructura del tráfico portuario
 
Documentos primaria-sesiones-unidad06-cuarto grado-integrados-4g-u6-sesion33
Documentos primaria-sesiones-unidad06-cuarto grado-integrados-4g-u6-sesion33Documentos primaria-sesiones-unidad06-cuarto grado-integrados-4g-u6-sesion33
Documentos primaria-sesiones-unidad06-cuarto grado-integrados-4g-u6-sesion33
 
Fiche de données de sécurité France du Liquide de Frein Marchal DOT3 référenc...
Fiche de données de sécurité France du Liquide de Frein Marchal DOT3 référenc...Fiche de données de sécurité France du Liquide de Frein Marchal DOT3 référenc...
Fiche de données de sécurité France du Liquide de Frein Marchal DOT3 référenc...
 
PROYECTO
PROYECTOPROYECTO
PROYECTO
 
Mi tren
Mi trenMi tren
Mi tren
 
Intoxicacion alimentaria no bacteriana
Intoxicacion alimentaria no bacterianaIntoxicacion alimentaria no bacteriana
Intoxicacion alimentaria no bacteriana
 
Fiche de données de sécurité France Liquide de Frein Marchal DOT4 Basse Visco...
Fiche de données de sécurité France Liquide de Frein Marchal DOT4 Basse Visco...Fiche de données de sécurité France Liquide de Frein Marchal DOT4 Basse Visco...
Fiche de données de sécurité France Liquide de Frein Marchal DOT4 Basse Visco...
 
PROYECTO
PROYECTO PROYECTO
PROYECTO
 
Fiche de données de sécurité France Liquide Minéral Hydraulique Marchal LHM r...
Fiche de données de sécurité France Liquide Minéral Hydraulique Marchal LHM r...Fiche de données de sécurité France Liquide Minéral Hydraulique Marchal LHM r...
Fiche de données de sécurité France Liquide Minéral Hydraulique Marchal LHM r...
 
Ecosystem of higher education in india
Ecosystem of higher education in indiaEcosystem of higher education in india
Ecosystem of higher education in india
 

Similar to Tutorial on Wirless Security in Medical Devices

Wireless Device and Network level security
Wireless Device and Network level securityWireless Device and Network level security
Wireless Device and Network level securityChetan Kumar S
 
Wireless Communiction Security
Wireless Communiction SecurityWireless Communiction Security
Wireless Communiction SecurityMeet Soni
 
Security protocols & platform for wsn based medical applications
Security protocols & platform for wsn based medical applicationsSecurity protocols & platform for wsn based medical applications
Security protocols & platform for wsn based medical applicationsaviiandevil
 
Security protocols & platform for wsn based medical applications
Security protocols & platform for wsn based medical applicationsSecurity protocols & platform for wsn based medical applications
Security protocols & platform for wsn based medical applicationsaviiandevil7
 
Moving From Contactless to Wireless Technologies in Secure, Over-the-Air Tran...
Moving From Contactless to Wireless Technologies in Secure, Over-the-Air Tran...Moving From Contactless to Wireless Technologies in Secure, Over-the-Air Tran...
Moving From Contactless to Wireless Technologies in Secure, Over-the-Air Tran...Underwriters Laboratories
 
Protocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its SecurityProtocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its SecurityIJERA Editor
 
Wireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesWireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesMichael Boman
 
Adhoc and Sensor Networks - Chapter 10
Adhoc and Sensor Networks - Chapter 10Adhoc and Sensor Networks - Chapter 10
Adhoc and Sensor Networks - Chapter 10Ali Habeeb
 
A review of security protocols in m health wireless body area networks (wban)...
A review of security protocols in m health wireless body area networks (wban)...A review of security protocols in m health wireless body area networks (wban)...
A review of security protocols in m health wireless body area networks (wban)...James Kang
 
Analysis Of Security In Wireless Network
Analysis Of Security In Wireless NetworkAnalysis Of Security In Wireless Network
Analysis Of Security In Wireless NetworkSteven Wallach
 
A Survey On Wireless security
A Survey On Wireless securityA Survey On Wireless security
A Survey On Wireless securitySarath K Sukumar
 
Security in Wireless Sensor Networks Using Broadcasting
Security in Wireless Sensor Networks Using BroadcastingSecurity in Wireless Sensor Networks Using Broadcasting
Security in Wireless Sensor Networks Using BroadcastingIJMER
 
Analysis of network_security_threats_and_vulnerabilities_by_development__impl...
Analysis of network_security_threats_and_vulnerabilities_by_development__impl...Analysis of network_security_threats_and_vulnerabilities_by_development__impl...
Analysis of network_security_threats_and_vulnerabilities_by_development__impl...Tương Hoàng
 
WLAN Attacks and Protection
WLAN Attacks and ProtectionWLAN Attacks and Protection
WLAN Attacks and ProtectionChandrak Trivedi
 
Wi fi security
Wi fi securityWi fi security
Wi fi securitygruzabb
 
Meletis Belsis - Wireless Security: Common Protocols and Vulnerabilities
Meletis Belsis - Wireless Security: Common Protocols and VulnerabilitiesMeletis Belsis - Wireless Security: Common Protocols and Vulnerabilities
Meletis Belsis - Wireless Security: Common Protocols and VulnerabilitiesMeletis Belsis MPhil/MRes/BSc
 

Similar to Tutorial on Wirless Security in Medical Devices (20)

Wireless Device and Network level security
Wireless Device and Network level securityWireless Device and Network level security
Wireless Device and Network level security
 
Wireless Communiction Security
Wireless Communiction SecurityWireless Communiction Security
Wireless Communiction Security
 
Security protocols & platform for wsn based medical applications
Security protocols & platform for wsn based medical applicationsSecurity protocols & platform for wsn based medical applications
Security protocols & platform for wsn based medical applications
 
Security protocols & platform for wsn based medical applications
Security protocols & platform for wsn based medical applicationsSecurity protocols & platform for wsn based medical applications
Security protocols & platform for wsn based medical applications
 
Moving From Contactless to Wireless Technologies in Secure, Over-the-Air Tran...
Moving From Contactless to Wireless Technologies in Secure, Over-the-Air Tran...Moving From Contactless to Wireless Technologies in Secure, Over-the-Air Tran...
Moving From Contactless to Wireless Technologies in Secure, Over-the-Air Tran...
 
Protocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its SecurityProtocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its Security
 
Wireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesWireless LAN Deployment Best Practices
Wireless LAN Deployment Best Practices
 
Adhoc and Sensor Networks - Chapter 10
Adhoc and Sensor Networks - Chapter 10Adhoc and Sensor Networks - Chapter 10
Adhoc and Sensor Networks - Chapter 10
 
A review of security protocols in m health wireless body area networks (wban)...
A review of security protocols in m health wireless body area networks (wban)...A review of security protocols in m health wireless body area networks (wban)...
A review of security protocols in m health wireless body area networks (wban)...
 
Analysis Of Security In Wireless Network
Analysis Of Security In Wireless NetworkAnalysis Of Security In Wireless Network
Analysis Of Security In Wireless Network
 
Cit877[1]
Cit877[1]Cit877[1]
Cit877[1]
 
Security issues
Security issuesSecurity issues
Security issues
 
A Survey On Wireless security
A Survey On Wireless securityA Survey On Wireless security
A Survey On Wireless security
 
Securing the Use of Wireless Fidelity (WiFi) in Libraries
Securing the Use of Wireless Fidelity (WiFi) in LibrariesSecuring the Use of Wireless Fidelity (WiFi) in Libraries
Securing the Use of Wireless Fidelity (WiFi) in Libraries
 
Security in Wireless Sensor Networks Using Broadcasting
Security in Wireless Sensor Networks Using BroadcastingSecurity in Wireless Sensor Networks Using Broadcasting
Security in Wireless Sensor Networks Using Broadcasting
 
Analysis of network_security_threats_and_vulnerabilities_by_development__impl...
Analysis of network_security_threats_and_vulnerabilities_by_development__impl...Analysis of network_security_threats_and_vulnerabilities_by_development__impl...
Analysis of network_security_threats_and_vulnerabilities_by_development__impl...
 
Wi Fi Technology
Wi Fi TechnologyWi Fi Technology
Wi Fi Technology
 
WLAN Attacks and Protection
WLAN Attacks and ProtectionWLAN Attacks and Protection
WLAN Attacks and Protection
 
Wi fi security
Wi fi securityWi fi security
Wi fi security
 
Meletis Belsis - Wireless Security: Common Protocols and Vulnerabilities
Meletis Belsis - Wireless Security: Common Protocols and VulnerabilitiesMeletis Belsis - Wireless Security: Common Protocols and Vulnerabilities
Meletis Belsis - Wireless Security: Common Protocols and Vulnerabilities
 

Recently uploaded

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 

Recently uploaded (20)

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 

Tutorial on Wirless Security in Medical Devices

  • 1. ICRTIT-2011 Half-day Tutorial on Wireless Security in Medical Devices Dr G V Rangaraj, IEEE Senior Member Senior Technical Manager HCL Technologies, Chennai, INDIA
  • 2. Motivation & Objective Scope Generally in telecommunications, the security design is complex and requires a deep study of the cryptography theory. However due the time constraint in the production cycle it is necessary to come with an elegant design that also meets the standard constraints in a relatively short duration. This tutorial would help to overcome this issue by providing brief and precise security algorithm concepts necessary for the design of such pragmatic WPAN/WBAN sensor based medical device receiver.
  • 3. Abstract Wireless communication is playing a key role in connecting medical devices to the outside world and has various advantages over the wired-connections. However it still has only a slow acceptance in the medical equipment market due to its vulnerable nature of security attacks in such environments compared to its wired counterpart. In this tutorial we would be providing a comprehensive overview of the security attacks possible in the various layers of the wireless embedded medical devices network and the corresponding counter-measures. We would then provide an overview of the wireless security issues in a Zigbee healthcare network, which, is being projected as the most common wireless technology for next generation embedded medical devices. The main challenge in the embedded medical device community is the wireless body area network (WBAN) which typically deals with implantable medical devices like implantable cardioverter-defibrillator (ICD). In this tutorial, we would also discuss some of the wireless security solutions proposed in the currently evolving IEEE 802.15 TG 6 WBAN initiatives in an implant environment.
  • 4.
  • 6.
  • 7.
  • 8. TYPICAL WIRELESS MEDICAL DEVICES NETWORK
  • 10.
  • 11. SECURITY THREATS IN A WIRELESS MEDICAL DEVICES NETWORK
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17. Security threats - Summary Layers DoS Attacks Defenses Physical Jamming Spread-Spectrum, priority messages, lower duty cycle, region mapping, mode changes Link Tampering Tamper proof, hiding Collision Error Correction Code Unfairness Small frames Network Exhaustion Rate limitation Neglect and greed Redundancy, probing Homing Encryption Misdirection Egress filtering, authorization monitoring Black holes Authorization monitoring, redundancy Transport Flooding Client Puzzles Desynchronisation Authentication
  • 19. Security Requirements & Solutions Security Requirements Possible Security Solutions Data Confidentiality and Privacy Symmetric Key Encryption/Decryption Data Integrity and Authenticity Secure Symmetric Key Hashing Digital signature Freshness and Availability Encrypted counter Redundancy Secure Management Random Key Distribution, Public Key Cryptography, Secure Group Communication, Intrusion detection
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25. Security Solutions - Summary Security Threats Security Requirements Possible security solutions Unauthenticated or unauthorized access Key establishment and trust setup Random key distribution Public key cryptography Message disclosure Confidentiality and privacy Link/network layer encryption Access control Message modification Integrity and authenticity Keyed secure hash function Digital signature Denial of Service (DoS) Availability Intrusion detection Redundancy Node capture & compromised node Resilience to node compromise Inconsistency detection of node and revocation Tamper-proofing Routing attacks Secure routing Secure routing protocols Intrusion and high level security attacks Secure group management, intrusion detection, secure data aggregation Secure group communication Intrusion detection
  • 26. CASE STUDY – I WPAN - Zigbee
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34. CASE STUDY – II WBAN – IEEE 802.15 WG 6
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40. WBAN Frequency Bands Scenario Description Frequency Band Channel Model S1 Implant to Implant 402-405 MHz CM1 S2 Implant to Body Surface 402-405 MHz CM2 S3 Implant to External 402-405 MHz CM2 S4 Body Surface to Body Surface (LOS) 13.5,50,400,600, 900 MHz 2.4,3.1-10.6 GHz CM3 S5 Body Surface to Body Surface (NLOS) 13.5,50,400,600, 900 MHz 2.4,3.1-10.6 GHz CM3 S6 Body Surface to External (LOS) 900 MHz 2.4,3.1-10.6 GHz CM4 S7 Body Surface to External (NLOS) 900 MHz 2.4,3.1-10.6 GHz CM4
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 47. Thank you! QUESTIONS & ANSWERS
  • 48. Biography Rangaraj received his B.Tech in Electrical Engineering from Indian Institute of Technology (IIT) Madras, India in 1998, M.S in Electrical and Computer Engineering from Georgia Tech, U.S.A. in 2000 and PhD in Electrical Engineering from IIT Madras, India in 2005 with specialization in communication systems. His current areas of interest include design and development of wireless solutions/ PHY/MAC layer chipsets for future wireless systems involving wireless personal/body area networks and signal processing algorithms for 4G wireless communication systems. During his doctoral studies, he also worked as Project Officer for the DECT Wireless in Local Loop project with the Tenet Group. After graduation, he worked as Technical Lead Engineer at HCL Technologies, Chennai, where he was developing physical layer of MBOA UWB wireless system on FPGA platforms and at NXP Semiconductors, Bangalore developing physical layer for Wireless LAN on embedded vector processors. He then worked as Wireless Specialist at Tata Elxsi, Chennai in design of Physical layer for LTE wireless systems and other 4G wireless systems on DSP platforms. Currently he is working as Senior Technical Manager at HCL Technologies, Chennai in design of wireless solutions in medical, automotive and industrial verticals. He has published more than ten papers in various national and international conferences and journals and also an active reviewer. He is the recipient of the Philips award and Seimens award for being the student with best academic record in Electrical Engineering Department at IIT Madras during 1994–1998. He is also the recipient of the Colonel Oscar Cleaver award for being the outstanding graduate student in the School of Electrical and Computer Engineering, Georgia Institute of Technology during 1998–1999.