Can Formal Security Verification Really Be Optional? Scrutinizing the Security of IMD Authentication Protocols
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Duguma, Daniel Gerbi | - |
dc.contributor.author | You, Ilsun | - |
dc.contributor.author | Gebremariam, Yonas Engida | - |
dc.contributor.author | Kim, Jiyoon | - |
dc.date.accessioned | 2022-01-21T04:40:06Z | - |
dc.date.available | 2022-01-21T04:40:06Z | - |
dc.date.issued | 2021-12 | - |
dc.identifier.issn | 1424-8220 | - |
dc.identifier.issn | 1424-3210 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/sch/handle/2021.sw.sch/20228 | - |
dc.description.abstract | The need for continuous monitoring of physiological information of critical organs of the human body, combined with the ever-growing field of electronics and sensor technologies and the vast opportunities brought by 5G connectivity, have made implantable medical devices (IMDs) the most necessitated devices in the health arena. IMDs are very sensitive since they are implanted in the human body, and the patients depend on them for the proper functioning of their vital organs. Simultaneously, they are intrinsically vulnerable to several attacks mainly due to their resource limitations and the wireless channel utilized for data transmission. Hence, failing to secure them would put the patient's life in jeopardy and damage the reputations of the manufacturers. To date, various researchers have proposed different countermeasures to keep the confidentiality, integrity, and availability of IMD systems with privacy and safety specifications. Despite the appreciated efforts made by the research community, there are issues with these proposed solutions. Principally, there are at least three critical problems. (1) Inadequate essential capabilities (such as emergency authentication, key update mechanism, anonymity, and adaptability); (2) heavy computational and communication overheads; and (3) lack of rigorous formal security verification. Motivated by this, we have thoroughly analyzed the current IMD authentication protocols by utilizing two formal approaches: the Burrows-Abadi-Needham logic (BAN logic) and the Automated Validation of Internet Security Protocols and Applications (AVISPA). In addition, we compared these schemes against their security strengths, computational overheads, latency, and other vital features, such as emergency authentications, key update mechanisms, and adaptabilities. | - |
dc.format.extent | 35 | - |
dc.language | 영어 | - |
dc.language.iso | ENG | - |
dc.publisher | Multidisciplinary Digital Publishing Institute (MDPI) | - |
dc.title | Can Formal Security Verification Really Be Optional? Scrutinizing the Security of IMD Authentication Protocols | - |
dc.type | Article | - |
dc.publisher.location | 스위스 | - |
dc.identifier.doi | 10.3390/s21248383 | - |
dc.identifier.scopusid | 2-s2.0-85121029675 | - |
dc.identifier.wosid | 000738546700001 | - |
dc.identifier.bibliographicCitation | Sensors, v.21, no.24, pp 1 - 35 | - |
dc.citation.title | Sensors | - |
dc.citation.volume | 21 | - |
dc.citation.number | 24 | - |
dc.citation.startPage | 1 | - |
dc.citation.endPage | 35 | - |
dc.type.docType | Article | - |
dc.description.isOpenAccess | Y | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Chemistry | - |
dc.relation.journalResearchArea | Engineering | - |
dc.relation.journalResearchArea | Instruments & Instrumentation | - |
dc.relation.journalWebOfScienceCategory | Chemistry, Analytical | - |
dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
dc.relation.journalWebOfScienceCategory | Instruments & Instrumentation | - |
dc.subject.keywordPlus | IMPLANTABLE MEDICAL DEVICES | - |
dc.subject.keywordPlus | INTERNET | - |
dc.subject.keywordPlus | SYSTEM | - |
dc.subject.keywordPlus | BAND | - |
dc.subject.keywordAuthor | implantable medical device | - |
dc.subject.keywordAuthor | IMD security | - |
dc.subject.keywordAuthor | IMD authentication protocol | - |
dc.subject.keywordAuthor | formal security verification | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(31538) 22, Soonchunhyang-ro, Asan-si, Chungcheongnam-do, Republic of Korea+82-41-530-1114
COPYRIGHT 2021 by SOONCHUNHYANG UNIVERSITY ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.