46
Securing Wireless Medical Implants Shyamnath Gollakota Haitham Hassanieh Benjamin Ransford Dina Katabi Kevin Fu

Securing Wireless Medical Implants

  • Upload
    loc

  • View
    40

  • Download
    0

Embed Size (px)

DESCRIPTION

Securing Wireless Medical Implants. Shyamnath Gollakota Haitham Hassanieh Benjamin Ransford Dina Katabi Kevin Fu. Modern Implants Have Wireless. Neurostimulators. Cochlear Implants. Cardiac Defibrillators. Benefits of Wireless. Easier communication with implant - PowerPoint PPT Presentation

Citation preview

Page 1: Securing Wireless Medical Implants

Securing Wireless Medical Implants

Shyamnath Gollakota

Haitham HassaniehBenjamin Ransford

Dina Katabi Kevin Fu

Page 2: Securing Wireless Medical Implants

Modern Implants Have Wireless

Cardiac Defibrillators

Neurostimulators

Cochlear Implants

Page 3: Securing Wireless Medical Implants

• Easier communication with implant• Remote monitoring

Benefits of Wireless

Page 4: Securing Wireless Medical Implants

• Easier communication with implant• Remote monitoring

Reduces hospital visits by 40% and cost per visit by $1800

[Journal of the American College of Cardiology, 2011]

What about security?

Benefits of Wireless

Page 5: Securing Wireless Medical Implants

1) Passive attack: Eavesdrop on private data

Patient diagnosis, vital signs

2) Active attack: Send unauthorized commands

Turn off therapies,

Security Attacks

[Halperin’08] demonstrated attacks using software radios

deliver electric shock

Page 6: Securing Wireless Medical Implants

How Do We Protect Against Such Attacks?

Cryptography?

Page 7: Securing Wireless Medical Implants

Problems with Adding Cryptography on Implants

• In emergencies, patient may be taken to a foreign hospital where doctors don’t have the secret key

• Millions of patients already have implants with no crypto; would require surgery to replace

Page 8: Securing Wireless Medical Implants

Ideally, secure implants without modifying them

Page 9: Securing Wireless Medical Implants

Ideally, secure implants without modifying them

Delegate security to an external device

• In emergencies, doctor turns external device off• Helps people who already have implants

Page 10: Securing Wireless Medical Implants

Wireless Device

Solution Idea

Page 11: Securing Wireless Medical Implants

Shield Protects from Active Attacks

Page 12: Securing Wireless Medical Implants

• Shield jams unauthorized commands

Turn off therapy

Implants can’t decode or react to command

Shield Protects from Active Attacks

Implant ID

• Shield listens on medium

Implant protected from active attacks

Page 13: Securing Wireless Medical Implants

But How to Protect from Passive Attacks?

Simply jamming prevents everyone from getting data!

How can we prevent eavesdropper from getting data while delivering data to doctor?

Analog one-time pad

Naïve Sol: Shield jams implant tx so attacker can’t decode

Page 14: Securing Wireless Medical Implants

Only a node that has the key can decrypt

KeyMessage

Encryption

Classic Approach: One-Time Pad

Encrypted Message=

MessageEncrypted Message Key=

Decryption

Page 15: Securing Wireless Medical Implants

Channel sums implant’s signal with shield’s random signal

Implant’s signal

shieldjams

Random Sum

Eavesdropper doesn’t know jamming signal can’t decodeShield knows the jamming signal

subtracts it decodes implant’s transmission

Protect from Passive Attacks: Analog One-Time Pad

Jamming signal acts like the key in one-time pad

Page 16: Securing Wireless Medical Implants

Traditional System

Putting it together

Page 17: Securing Wireless Medical Implants

Our System

Putting it together

Doctor configures the shield with a secret key

Shield acts as proxy

Use encryption

Shield encrypts the implant data and forwards it to doctor

Page 18: Securing Wireless Medical Implants

• First system that secures wireless implants without modifying them

• Design that simultaneously jams and decodes medical implant transmissions

• Implemented and evaluated using commercial cardiac defibrillators Effective at protecting the implants

Contributions

Page 19: Securing Wireless Medical Implants

Need radio that transmits and receives simultaneously, i.e., a full-duplex radio

• Jams the implant’s signal

• Decodes the implant’s signal

Shield simultaneously:

Page 20: Securing Wireless Medical Implants

Medical implant work at 400 MHz

tx1rxtx2d

How to Design Full-Duplex for Medical Implants?

Cancel out

Mobicom’2010

wavelength2

d + wavelength2

d +

≈ 40 cm wavelength2

Too large for portable devices

Page 21: Securing Wireless Medical Implants

rxtx2

Jamming signal

Antidote

tx1tx2 rx

Full-Duplex Without Antenna Separation

Shield

Antidote signal cancels out jamming signal • Shield can simultaneously jam and receive• Design is small and portable

antidoteselfSh

hcross S jamming 0

Santidote hselfhcross

S jamming

Page 22: Securing Wireless Medical Implants

Reduce signal power by 100 million times

• Requires highly linear components

• Expensive

Can we build shield with significantly less cancellation?30–40 dB is sufficient!

But, Full-Duplex Needs 60–80 dB Cancellation

Page 23: Securing Wireless Medical Implants

0 5 10 15 20 25 300

0.10.20.30.40.5

Decode Implant’s signal

• FSK signal• Implant signal has a 10 dB

SNR

• 50% bit error rate

Jamming power / Implant power (in dB)

Bit E

rror

Rat

e

Shield Requirements

Jam eavesdropper

Page 24: Securing Wireless Medical Implants

0 5 10 15 20 25 300

0.10.20.30.40.5

Decode Implant’s signal

• FSK signal• Implant signal has a 10 dB

SNR

• 50% bit error rate• Jamming power 20 dB higher

than implant’s power

Jamming power / Implant power (in dB)

Bit E

rror

Rat

e

Shield Requirements

Jam eavesdropper

Page 25: Securing Wireless Medical Implants

Time

20 dB

10 dB

Shield Requirements

Decode Implant’s signal

• FSK signal• Implant signal has a 10 dB

SNR

• 50% bit error rate• Jamming power 20 dB higher

than implant’s power

Cancel 30 dB

Jam eavesdropper

Shield requires only 30 dB cancellation

Page 26: Securing Wireless Medical Implants

Empirical Results

Page 27: Securing Wireless Medical Implants

• Medtronic cardiac implants

• Medtronic programmer

• Implement attacker and shield on USRP2s

• Simulate human implantation: bacon & beef

Evaluation

Page 28: Securing Wireless Medical Implants

• 20-location test bed

• Fix locations of implant and shield

• Node at every other location acts as adversary

Testbed

30 m

20cm

Page 29: Securing Wireless Medical Implants

Passive Attacks

Eavesdrop on private data

• Decode implant’s transmissions• Use optimal FSK decoder

Page 30: Securing Wireless Medical Implants

0.2 0.4 0.6 0.8 10

0.2

0.4

0.6

0.8

1

Attacker Bit Error Rate

CDF

over

atta

cker

loc

ation

s Can Eavesdropper do Better Than Random Guess?

Page 31: Securing Wireless Medical Implants

0.2 0.4 0.6 0.8 10

0.2

0.4

0.6

0.8

1

Random Guess

Can Eavesdropper do Better Than Random Guess?CD

F ov

er a

ttack

er l

ocati

ons

Attacker Bit Error Rate

Page 32: Securing Wireless Medical Implants

0.2 0.4 0.6 0.8 10

0.2

0.4

0.6

0.8

1

Random GuessWith Jamming

Can Eavesdropper do Better Than Random Guess?CD

F ov

er a

ttack

er l

ocati

ons

Attacker Bit Error RateIndependent of location, eavesdropper can do no better

than a random guess

Page 33: Securing Wireless Medical Implants

Packet Loss at Shield

CDF

Can Shield Decode Implant’s Messages?

0 0.005 0.01 0.015 0.02 0.0250

0.2

0.4

0.6

0.8

1

Page 34: Securing Wireless Medical Implants

Packet Loss at Shield

CDF

Can Shield Decode Implant’s Messages?

0 0.005 0.01 0.015 0.02 0.0250

0.2

0.4

0.6

0.8

1

Shield can reliably decode the implant’s messages, despite jamming

Average loss rate0.002

Page 35: Securing Wireless Medical Implants

Active Attacks

• Attacker sends “change therapy”

• Shield jams

• Read implant to check if therapy has changed

Send unauthorized commands

Page 36: Securing Wireless Medical Implants

• Off-the-shelf implant programmersSame power as our shield

• Customized hardware 100 times the power of our shield

Two Types of Active Attacks

Page 37: Securing Wireless Medical Implants

Frac

tion

of S

ucce

ssfu

l Atta

cks

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 180

0.2

0.4

0.6

0.8

1

Can Shield Protect Against Unauthorized Programmers?

Attacker location #

Page 38: Securing Wireless Medical Implants

Frac

tion

of S

ucce

ssfu

l Atta

cks

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 180

0.2

0.4

0.6

0.8

1Without ShieldWith Shield

0 0 0 0 0 0 0 0 0

Can Shield Protect Against Unauthorized Programmers?

Attacker location #

Page 39: Securing Wireless Medical Implants

Can Shield Protect Against Unauthorized Programmers?Any attack successful

No attack successful

Page 40: Securing Wireless Medical Implants

Can Shield Protect Against Unauthorized Programmers?Any attack successful

No attack successfulWithout the Shield

14 m

Page 41: Securing Wireless Medical Implants

Can Shield Protect Against Unauthorized Programmers?Any attack successful

No attack successfulWith the Shield

20 cm

Independent of the location, shield protects from unauthorized programmers

Page 42: Securing Wireless Medical Implants

Can Shield Protect Against High-Power Attacks?Any attack successful

No attack successful

Page 43: Securing Wireless Medical Implants

Can Shield Protect Against High-Power Attacks?Any attack successful

No attack successfulWithout the Shield

27 m

Page 44: Securing Wireless Medical Implants

Can Shield Protect Against High-Power Attacks?Any attack successful

No attack successfulWith the Shield

Shield forces the attacker to get closer raises the bar

Intrinsic limitation of jamming

Page 45: Securing Wireless Medical Implants

Can Shield Protect Against High-Power Attacks?Any attack successful

No attack successfulWith the Shield

Can we do better?

Can always detect high-power attacks Raise alarm and inform doctor or patient

Page 46: Securing Wireless Medical Implants

• First to secure medical implants without modifying them

• Other applications in RFIDs, small low-power sensors, legacy devices

• Convergence of wireless and medical devices open up new research problems

Conclusion

www.omdrl.org