SlideShare a Scribd company logo
1 of 43
ICACT-2011 Half-day Tutorial on  Wireless Security in Medical Devices   Dr G V Rangaraj, IEEE Senior Member Medical Devices Practice Team HCL Technologies, Chennai, INDIA
Motivation & Objective Scope  Generally in telecommunications, the security design is complex and requires a deep study of the cryptography theory. However due the time constraint in the production cycle it is necessary to come with an elegant design that also meets the standard constraints in a relatively short duration. This tutorial would help to overcome this issue by providing brief and precise security algorithm concepts necessary for the design of such pragmatic WPAN/WBAN sensor based medical device receiver.
Abstract Wireless communication is playing a key role in connecting medical devices to the outside world and has various advantages over the wired-connections.  However it still has only a slow acceptance in the medical equipment market due to its vulnerable nature of security attacks in such environments compared to its wired counterpart. In this tutorial we would be providing a comprehensive overview of the security attacks possible in the various layers of the wireless embedded medical devices network and the corresponding counter-measures. We would then provide an overview of the wireless security issues in a Zigbee healthcare network, which, is being projected as the most common wireless technology for next generation embedded medical devices. The main challenge in the embedded medical device community is the wireless body area network (WBAN) which typically deals with implantable medical devices like implantable cardioverter-defibrillator (ICD). In this tutorial, we would also discuss some of the wireless security solutions proposed in the currently evolving IEEE 802.15 TG 6 WBAN initiatives in an implant environment.
Tutorial Outline: (Duration: 3 hours) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
INTRODUCTION
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],FDA Guidelines
[object Object],[object Object],[object Object],EMC (Electromagnetic Compatibility)
TYPICAL WIRELESS MEDICAL DEVICES NETWORK
Medical Devices Network
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],MD Network Components
SECURITY THREATS IN A WIRELESS MEDICAL DEVICES NETWORK
Physical Layer ,[object Object],[object Object],[object Object],[object Object],[object Object]
Data Link/MAC Layer ,[object Object],[object Object],[object Object],[object Object]
Data Link/MAC Layer ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Higher Layer ,[object Object],[object Object],[object Object],[object Object],[object Object]
Higher Layer ,[object Object],[object Object],[object Object],[object Object],[object Object]
Security threats - Summary Layers DoS Attacks Defenses Physical Jamming Spread-Spectrum, priority messages, lower duty cycle, region mapping, mode changes Link Tampering Tamper proof, hiding Collision Error Correction Code Unfairness Small frames Network Exhaustion Rate limitation Neglect and greed Redundancy, probing Homing Encryption Misdirection Egress filtering, authorization monitoring Black holes Authorization monitoring, redundancy Transport Flooding Client Puzzles Desynchronisation Authentication
SECURITY SOLUTIONS
Security Requirements & Solutions Security Requirements  Possible Security Solutions  Data Confidentiality and Privacy Symmetric Key Encryption/Decryption Data Integrity and Authenticity  Secure Symmetric Key Hashing Digital signature  Freshness and Availability  Encrypted counter Redundancy  Secure Management Random Key Distribution, Public Key Cryptography,  Secure Group Communication, Intrusion detection
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Data Confidentiality and Privacy
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Data Integrity and Authenticity
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Freshness and Availability
[object Object],[object Object],[object Object],[object Object],[object Object],Secure Management
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Security Solutions - Summary
Security Solutions - Summary Security Threats Security Requirements Possible security solutions Unauthenticated or unauthorized access Key establishment and trust setup Random key distribution Public key cryptography Message disclosure Confidentiality and privacy Link/network layer encryption Access control Message modification Integrity and authenticity Keyed secure hash function Digital signature Denial of Service (DoS) Availability Intrusion detection Redundancy Node capture & compromised node Resilience to node compromise Inconsistency detection of node and revocation Tamper-proofing Routing attacks Secure routing Secure routing protocols Intrusion and high level security attacks Secure group management, intrusion detection, secure data aggregation Secure group communication Intrusion detection
CASE STUDY – I WPAN - Zigbee
WPAN ,[object Object],[object Object],[object Object],[object Object],[object Object],Security Modes Description Null No security AES-CTR Encryption only, CTR Mode AES-CBC-MAC-128 128 bit MAC AES-CBC-MAC-64 64 bit MAC AES-CBC-MAC-32 32 bit MAC AES-CCM-128 Encryption & 128 bit MAC AES-CCM-64 Encryption & 64 bit MAC AES-CCM-32 Encryption & 32 bit MAC
AES - CTR ,[object Object],[object Object],[object Object],[object Object],[object Object]
AES - CTR ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
AES – CBS - MAC ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
AES – CBS - MAC ,[object Object],[object Object],[object Object],[object Object]
AES - CCM ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
AES - CCM ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CASE STUDY – II WBAN – IEEE 802.15 WG 6
WBAN ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
WBAN Architecture ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Security in WBAN ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Key Security Differences from WPAN ,[object Object],[object Object],[object Object],[object Object],[object Object]
Secure Management in WBAN ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CONCLUSIONS
QUESTIONS & ANSWERS
Biography Rangaraj  received his B.Tech in Electrical Engineering from Indian Institute of Technology (IIT) Madras, India in 1998, M.S in Electrical and Computer Engineering from Georgia Tech, U.S.A. in 2000 and PhD in Electrical Engineering from IIT Madras, India in 2005 with specialization in communication systems. His current areas of interest include design and development of wireless solutions/ PHY/MAC layer chipsets for future wireless systems involving wireless personal/body area networks and signal processing algorithms for 4G wireless communication systems. During his doctoral studies, he also worked as Project Officer for the DECT Wireless in Local Loop project with the Tenet Group. After graduation, he worked as Technical Lead Engineer at HCL Technologies, Chennai, where he was developing physical layer of MBOA UWB wireless system on FPGA platforms and at NXP Semiconductors, Bangalore developing physical layer for Wireless LAN on embedded vector processors. He then worked as Wireless Specialist at Tata Elxsi, Chennai in design of Physical layer for LTE wireless systems and other 4G wireless systems on DSP platforms. Currently he is working as Senior Technical Manager at HCL Technologies, Chennai in design of wireless solutions in medical, automotive and industrial verticals. He has published more than ten papers in various national and international conferences and journals and also an active reviewer. He is the recipient of the Philips award and Seimens award for being the student with best academic record in Electrical Engineering Department at IIT Madras during 1994–1998. He is also the recipient of the Colonel Oscar Cleaver award for being the outstanding graduate student in the School of Electrical and Computer Engineering, Georgia Institute of Technology during 1998–1999.  
Thank You

More Related Content

What's hot

Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...
Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...
Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...
Kumar Goud
 
A review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkA review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor network
Alexander Decker
 
Wireless sensor network security issues
Wireless sensor network security issuesWireless sensor network security issues
Wireless sensor network security issues
Maha Saad
 

What's hot (17)

Ijcet 06 07_001
Ijcet 06 07_001Ijcet 06 07_001
Ijcet 06 07_001
 
Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...
Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...
Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...
 
A NEW GENERATION OF DRIVER ASSISTANCE AND SECURITY
A NEW GENERATION OF DRIVER ASSISTANCE AND SECURITYA NEW GENERATION OF DRIVER ASSISTANCE AND SECURITY
A NEW GENERATION OF DRIVER ASSISTANCE AND SECURITY
 
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
 
A review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkA review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor network
 
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
 
Iaetsd baack better adaptive
Iaetsd baack better adaptiveIaetsd baack better adaptive
Iaetsd baack better adaptive
 
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
 
Classification and review of security schemes
Classification and review of security schemesClassification and review of security schemes
Classification and review of security schemes
 
IJSRED-V2I5P18
IJSRED-V2I5P18IJSRED-V2I5P18
IJSRED-V2I5P18
 
Securing information in wireless sensor networks
Securing information in wireless sensor networksSecuring information in wireless sensor networks
Securing information in wireless sensor networks
 
A Survey Paper on Jamming Attacks and its Countermeasures in Wireless Networks
A Survey Paper on Jamming Attacks and its Countermeasures in Wireless NetworksA Survey Paper on Jamming Attacks and its Countermeasures in Wireless Networks
A Survey Paper on Jamming Attacks and its Countermeasures in Wireless Networks
 
Bi33349355
Bi33349355Bi33349355
Bi33349355
 
Wireless sensor network security issues
Wireless sensor network security issuesWireless sensor network security issues
Wireless sensor network security issues
 
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGESA SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
 
Research paper
Research paperResearch paper
Research paper
 
Evaluation of enhanced security solutions in
Evaluation of enhanced security solutions inEvaluation of enhanced security solutions in
Evaluation of enhanced security solutions in
 

Viewers also liked

Wireless Body Area Networking
Wireless Body Area NetworkingWireless Body Area Networking
Wireless Body Area Networking
subhradeep mitra
 
Wireless Body Area network
Wireless Body Area networkWireless Body Area network
Wireless Body Area network
Rajeev N
 

Viewers also liked (11)

WSN IN BODY AREA NETWORK BASED ON EGERGY CONSERVATION
WSN IN BODY AREA NETWORK BASED ON EGERGY CONSERVATIONWSN IN BODY AREA NETWORK BASED ON EGERGY CONSERVATION
WSN IN BODY AREA NETWORK BASED ON EGERGY CONSERVATION
 
Wireless body area network
Wireless body area networkWireless body area network
Wireless body area network
 
Wireless Body Area Networks
Wireless Body Area Networks Wireless Body Area Networks
Wireless Body Area Networks
 
Wireless Body Area Network (WBAN)
Wireless Body Area Network (WBAN)Wireless Body Area Network (WBAN)
Wireless Body Area Network (WBAN)
 
Wban
WbanWban
Wban
 
Wireless Body Area Network
Wireless Body Area NetworkWireless Body Area Network
Wireless Body Area Network
 
Wireless Body Area Networking
Wireless Body Area NetworkingWireless Body Area Networking
Wireless Body Area Networking
 
Wireless Body Area network
Wireless Body Area networkWireless Body Area network
Wireless Body Area network
 
Wireless body area network
Wireless body area networkWireless body area network
Wireless body area network
 
Body Area Network
Body Area NetworkBody Area Network
Body Area Network
 
wireless body area networks(WBAN)
wireless body area networks(WBAN)wireless body area networks(WBAN)
wireless body area networks(WBAN)
 

Similar to Tutorial Dr G V Rangaraj Wireless Security in Medical Devices

Security protocols & platform for wsn based medical applications
Security protocols & platform for wsn based medical applicationsSecurity protocols & platform for wsn based medical applications
Security protocols & platform for wsn based medical applications
aviiandevil7
 

Similar to Tutorial Dr G V Rangaraj Wireless Security in Medical Devices (20)

Three Tire Proxy Re - Encryption Secret Key (PRESK) Generation for Secure Tr...
Three Tire Proxy Re - Encryption Secret Key (PRESK)  Generation for Secure Tr...Three Tire Proxy Re - Encryption Secret Key (PRESK)  Generation for Secure Tr...
Three Tire Proxy Re - Encryption Secret Key (PRESK) Generation for Secure Tr...
 
Wireless Device and Network level security
Wireless Device and Network level securityWireless Device and Network level security
Wireless Device and Network level security
 
Wireless Communiction Security
Wireless Communiction SecurityWireless Communiction Security
Wireless Communiction Security
 
Security protocols & platform for wsn based medical applications
Security protocols & platform for wsn based medical applicationsSecurity protocols & platform for wsn based medical applications
Security protocols & platform for wsn based medical applications
 
Security protocols & platform for wsn based medical applications
Security protocols & platform for wsn based medical applicationsSecurity protocols & platform for wsn based medical applications
Security protocols & platform for wsn based medical applications
 
Wireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesWireless LAN Deployment Best Practices
Wireless LAN Deployment Best Practices
 
Protocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its SecurityProtocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its Security
 
Moving From Contactless to Wireless Technologies in Secure, Over-the-Air Tran...
Moving From Contactless to Wireless Technologies in Secure, Over-the-Air Tran...Moving From Contactless to Wireless Technologies in Secure, Over-the-Air Tran...
Moving From Contactless to Wireless Technologies in Secure, Over-the-Air Tran...
 
Adhoc and Sensor Networks - Chapter 10
Adhoc and Sensor Networks - Chapter 10Adhoc and Sensor Networks - Chapter 10
Adhoc and Sensor Networks - Chapter 10
 
A review of security protocols in m health wireless body area networks (wban)...
A review of security protocols in m health wireless body area networks (wban)...A review of security protocols in m health wireless body area networks (wban)...
A review of security protocols in m health wireless body area networks (wban)...
 
Analysis Of Security In Wireless Network
Analysis Of Security In Wireless NetworkAnalysis Of Security In Wireless Network
Analysis Of Security In Wireless Network
 
Cit877[1]
Cit877[1]Cit877[1]
Cit877[1]
 
Security issues
Security issuesSecurity issues
Security issues
 
Security in Wireless Sensor Networks Using Broadcasting
Security in Wireless Sensor Networks Using BroadcastingSecurity in Wireless Sensor Networks Using Broadcasting
Security in Wireless Sensor Networks Using Broadcasting
 
Wi Fi Technology
Wi Fi TechnologyWi Fi Technology
Wi Fi Technology
 
A Survey On Wireless security
A Survey On Wireless securityA Survey On Wireless security
A Survey On Wireless security
 
Analysis of network_security_threats_and_vulnerabilities_by_development__impl...
Analysis of network_security_threats_and_vulnerabilities_by_development__impl...Analysis of network_security_threats_and_vulnerabilities_by_development__impl...
Analysis of network_security_threats_and_vulnerabilities_by_development__impl...
 
Securing the Use of Wireless Fidelity (WiFi) in Libraries
Securing the Use of Wireless Fidelity (WiFi) in LibrariesSecuring the Use of Wireless Fidelity (WiFi) in Libraries
Securing the Use of Wireless Fidelity (WiFi) in Libraries
 
Meletis Belsis - Wireless Security: Common Protocols and Vulnerabilities
Meletis Belsis - Wireless Security: Common Protocols and VulnerabilitiesMeletis Belsis - Wireless Security: Common Protocols and Vulnerabilities
Meletis Belsis - Wireless Security: Common Protocols and Vulnerabilities
 
WLAN Attacks and Protection
WLAN Attacks and ProtectionWLAN Attacks and Protection
WLAN Attacks and Protection
 

Recently uploaded

Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Peter Udo Diehl
 

Recently uploaded (20)

Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. Startups
 
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomSalesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
The UX of Automation by AJ King, Senior UX Researcher, Ocado
The UX of Automation by AJ King, Senior UX Researcher, OcadoThe UX of Automation by AJ King, Senior UX Researcher, Ocado
The UX of Automation by AJ King, Senior UX Researcher, Ocado
 
Connecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAKConnecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAK
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
 
Top 10 Symfony Development Companies 2024
Top 10 Symfony Development Companies 2024Top 10 Symfony Development Companies 2024
Top 10 Symfony Development Companies 2024
 
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
Strategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering TeamsStrategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering Teams
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCustom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 

Tutorial Dr G V Rangaraj Wireless Security in Medical Devices

  • 1. ICACT-2011 Half-day Tutorial on Wireless Security in Medical Devices Dr G V Rangaraj, IEEE Senior Member Medical Devices Practice Team HCL Technologies, Chennai, INDIA
  • 2. Motivation & Objective Scope Generally in telecommunications, the security design is complex and requires a deep study of the cryptography theory. However due the time constraint in the production cycle it is necessary to come with an elegant design that also meets the standard constraints in a relatively short duration. This tutorial would help to overcome this issue by providing brief and precise security algorithm concepts necessary for the design of such pragmatic WPAN/WBAN sensor based medical device receiver.
  • 3. Abstract Wireless communication is playing a key role in connecting medical devices to the outside world and has various advantages over the wired-connections. However it still has only a slow acceptance in the medical equipment market due to its vulnerable nature of security attacks in such environments compared to its wired counterpart. In this tutorial we would be providing a comprehensive overview of the security attacks possible in the various layers of the wireless embedded medical devices network and the corresponding counter-measures. We would then provide an overview of the wireless security issues in a Zigbee healthcare network, which, is being projected as the most common wireless technology for next generation embedded medical devices. The main challenge in the embedded medical device community is the wireless body area network (WBAN) which typically deals with implantable medical devices like implantable cardioverter-defibrillator (ICD). In this tutorial, we would also discuss some of the wireless security solutions proposed in the currently evolving IEEE 802.15 TG 6 WBAN initiatives in an implant environment.
  • 4.
  • 6.
  • 7.
  • 8. TYPICAL WIRELESS MEDICAL DEVICES NETWORK
  • 10.
  • 11. SECURITY THREATS IN A WIRELESS MEDICAL DEVICES NETWORK
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17. Security threats - Summary Layers DoS Attacks Defenses Physical Jamming Spread-Spectrum, priority messages, lower duty cycle, region mapping, mode changes Link Tampering Tamper proof, hiding Collision Error Correction Code Unfairness Small frames Network Exhaustion Rate limitation Neglect and greed Redundancy, probing Homing Encryption Misdirection Egress filtering, authorization monitoring Black holes Authorization monitoring, redundancy Transport Flooding Client Puzzles Desynchronisation Authentication
  • 19. Security Requirements & Solutions Security Requirements Possible Security Solutions Data Confidentiality and Privacy Symmetric Key Encryption/Decryption Data Integrity and Authenticity Secure Symmetric Key Hashing Digital signature Freshness and Availability Encrypted counter Redundancy Secure Management Random Key Distribution, Public Key Cryptography, Secure Group Communication, Intrusion detection
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25. Security Solutions - Summary Security Threats Security Requirements Possible security solutions Unauthenticated or unauthorized access Key establishment and trust setup Random key distribution Public key cryptography Message disclosure Confidentiality and privacy Link/network layer encryption Access control Message modification Integrity and authenticity Keyed secure hash function Digital signature Denial of Service (DoS) Availability Intrusion detection Redundancy Node capture & compromised node Resilience to node compromise Inconsistency detection of node and revocation Tamper-proofing Routing attacks Secure routing Secure routing protocols Intrusion and high level security attacks Secure group management, intrusion detection, secure data aggregation Secure group communication Intrusion detection
  • 26. CASE STUDY – I WPAN - Zigbee
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34. CASE STUDY – II WBAN – IEEE 802.15 WG 6
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 42. Biography Rangaraj received his B.Tech in Electrical Engineering from Indian Institute of Technology (IIT) Madras, India in 1998, M.S in Electrical and Computer Engineering from Georgia Tech, U.S.A. in 2000 and PhD in Electrical Engineering from IIT Madras, India in 2005 with specialization in communication systems. His current areas of interest include design and development of wireless solutions/ PHY/MAC layer chipsets for future wireless systems involving wireless personal/body area networks and signal processing algorithms for 4G wireless communication systems. During his doctoral studies, he also worked as Project Officer for the DECT Wireless in Local Loop project with the Tenet Group. After graduation, he worked as Technical Lead Engineer at HCL Technologies, Chennai, where he was developing physical layer of MBOA UWB wireless system on FPGA platforms and at NXP Semiconductors, Bangalore developing physical layer for Wireless LAN on embedded vector processors. He then worked as Wireless Specialist at Tata Elxsi, Chennai in design of Physical layer for LTE wireless systems and other 4G wireless systems on DSP platforms. Currently he is working as Senior Technical Manager at HCL Technologies, Chennai in design of wireless solutions in medical, automotive and industrial verticals. He has published more than ten papers in various national and international conferences and journals and also an active reviewer. He is the recipient of the Philips award and Seimens award for being the student with best academic record in Electrical Engineering Department at IIT Madras during 1994–1998. He is also the recipient of the Colonel Oscar Cleaver award for being the outstanding graduate student in the School of Electrical and Computer Engineering, Georgia Institute of Technology during 1998–1999.