|
|
|
|
LEADER |
02733 am a22003253u 4500 |
001 |
72549 |
042 |
|
|
|a dc
|
100 |
1 |
0 |
|a Gollakota, Shyamnath
|e author
|
100 |
1 |
0 |
|a Massachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratory
|e contributor
|
100 |
1 |
0 |
|a Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science
|e contributor
|
100 |
1 |
0 |
|a Katabi, Dina
|e contributor
|
100 |
1 |
0 |
|a Gollakota, Shyamnath
|e contributor
|
100 |
1 |
0 |
|a Hassanieh, Haitham
|e contributor
|
100 |
1 |
0 |
|a Katabi, Dina
|e contributor
|
100 |
1 |
0 |
|a Fu, Kevin
|e contributor
|
700 |
1 |
0 |
|a Hassanieh, Haitham
|e author
|
700 |
1 |
0 |
|a Ransford, Benjamin
|e author
|
700 |
1 |
0 |
|a Katabi, Dina
|e author
|
700 |
1 |
0 |
|a Fu, Kevin
|e author
|
245 |
0 |
0 |
|a They Can Hear Your Heartbeats: Non-Invasive Security for Implantable Medical Devices
|
260 |
|
|
|b Institute of Electrical and Electronics Engineers (IEEE),
|c 2012-09-06T17:54:43Z.
|
856 |
|
|
|z Get fulltext
|u http://hdl.handle.net/1721.1/72549
|
520 |
|
|
|a Wireless communication has become an intrinsic part of modern implantable medical devices (IMDs). Recent work, however, has demonstrated that wireless connectivity can be exploited to compromise the confidentiality of IMDs' transmitted data or to send unauthorized commands to IMDs---even commands that cause the device to deliver an electric shock to the patient. The key challenge in addressing these attacks stems from the difficulty of modifying or replacing already-implanted IMDs. Thus, in this paper, we explore the feasibility of protecting an implantable device from such attacks without modifying the device itself. We present a physical-layer solution that delegates the security of an IMD to a personal base station called the shield. The shield uses a novel radio design that can act as a jammer-cum-receiver. This design allows it to jam the IMD's messages, preventing others from decoding them while being able to decode them itself. It also allows the shield to jam unauthorized commands---even those that try to alter the shield's own transmissions. We implement our design in a software radio and evaluate it with commercial IMDs. We find that it effectively provides confidentiality for private data and protects the IMD from unauthorized commands.
|
520 |
|
|
|a National Science Foundation (U.S.). (Grant number CNS-0831244)
|
520 |
|
|
|a National Science Foundation (U.S.). Graduate Research Fellowship Program
|
520 |
|
|
|a Alfred P. Sloan Foundation. Fellowship
|
520 |
|
|
|a United States. Dept. of Health and Human Services. Cooperative Agreement (90TR0003/01)
|
546 |
|
|
|a en_US
|
655 |
7 |
|
|a Article
|
773 |
|
|
|t Proceedings of the ACM SIGCOMM 2011 Conference (SIGCOMM '11)
|