Implantable Medical Devices; Networking Security Survey

Siamak Aram1, 2+, Rouzbeh A. Shirvani1, Eros G. Pasero2, and Mohamd F. Chouikha1

 

1Department of Electrical and Computer Engineering
Howard University, Washington DC, US

siamak.aram@howard.edu, rouzbeh.asgharishir@bison.howard.edu, mchouikha@howard.edu

2Department of Electronics and Telecommunications

Polytechnic University of Turin, Turin, Italy

{siamak.aram, eros.pasero}@polito.it 

 

Abstract

The industry of implantable medical devices (IMDs) is constantly evolving, which is dictated by the pressing need to comprehensively address new challenges in the healthcare field. Accordingly, IMDs are becoming more and more sophisticated. Not long ago, the range of IMDs’ technical capacities was expanded, making it possible to establish Internet connection in case of necessity and/or emergency situation for the patient. At the same time, while the web connectivity of today’s implantable devices is rather advanced, the issue of equipping the IMDs with sufficiently strong security system remains unresolved. In fact, IMDs have relatively weak security mechanisms which render them vulnerable to cyber-attacks that compromise the quality of IMDs’ functionalities. This study revolves around the security deficiencies inherent to three types of sensor-based medical devices; biosensors, insulin pump systems and implantable cardioverter defibrillators. Manufacturers of these devices should take into consideration that security and effectiveness of the functionality of implants is highly dependent on the design. In this paper, we present a comprehensive study of IMDs’ architecture and specifically investigate their vulnerabilities at networking interface.

Keywords: implantable medical devices, security, wireless sensor network

+: Corresponding author: Siamak Aram
Laboratorio di Neuronica , Dip. Elettronica e Telecomunicazioni - Politecnico di Torino c.so Duca d. Abruzzi 24 10129 Torino - Italy, Tel: +39-011-564-4065

 

Journal of Internet Services and Information Security (JISIS), 6(3): 40-60, August 2016 [pdf]