Can Formal Security Verification Really Be Optional? Scrutinizing the Security of IMD Authentication Protocols.

Sensors (Basel)

Department of Information Security Engineering, Soonchunhyang University, Asan-si 31538, Choongchungnam-do, Korea.

Published: December 2021

The need for continuous monitoring of physiological information of critical organs of the human body, combined with the ever-growing field of electronics and sensor technologies and the vast opportunities brought by 5G connectivity, have made implantable medical devices (IMDs) the most necessitated devices in the health arena. IMDs are very sensitive since they are implanted in the human body, and the patients depend on them for the proper functioning of their vital organs. Simultaneously, they are intrinsically vulnerable to several attacks mainly due to their resource limitations and the wireless channel utilized for data transmission. Hence, failing to secure them would put the patient's life in jeopardy and damage the reputations of the manufacturers. To date, various researchers have proposed different countermeasures to keep the confidentiality, integrity, and availability of IMD systems with privacy and safety specifications. Despite the appreciated efforts made by the research community, there are issues with these proposed solutions. Principally, there are at least three critical problems. (1) Inadequate essential capabilities (such as emergency authentication, key update mechanism, anonymity, and adaptability); (2) heavy computational and communication overheads; and (3) lack of rigorous formal security verification. Motivated by this, we have thoroughly analyzed the current IMD authentication protocols by utilizing two formal approaches: the Burrows-Abadi-Needham logic (BAN logic) and the Automated Validation of Internet Security Protocols and Applications (AVISPA). In addition, we compared these schemes against their security strengths, computational overheads, latency, and other vital features, such as emergency authentications, key update mechanisms, and adaptabilities.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC8704301PMC
http://dx.doi.org/10.3390/s21248383DOI Listing

Publication Analysis

Top Keywords

formal security
8
security verification
8
imd authentication
8
authentication protocols
8
human body
8
key update
8
verification optional?
4
optional? scrutinizing
4
security
4
scrutinizing security
4

Similar Publications

(Acoraceae) is a commonly used seasoning in southern China. It was previously misidentified as (Yamam.) F.

View Article and Find Full Text PDF

Objective: Aim: To determine the specifics of criminal liability for disclosing information about a medical examination for detection of infection with the human immunodeficiency virus or another incurable infectious disease under the criminal legislation of Poland and Ukraine in order to improve the legal protection of the interests of people living with HIV.

Patients And Methods: Materials and Methods: The authors used the decisions of national courts in the field of ensuring the information security of a person living with the immunodeficiency virus, international and national legal acts of Ukraine and Poland. The study was carried out on the basis of a systematic approach using the methods of dialectical and formal logic, general scientific and special legal research methods.

View Article and Find Full Text PDF

Metabolic syndrome (Mets) in adolescents is a growing public health issue linked to obesity, hypertension, and insulin resistance, increasing risks of cardiovascular disease and mental health problems. Early detection and intervention are crucial but often hindered by complex diagnostic requirements. This study aims to develop a predictive model using NHANES data, excluding biochemical indicators, to provide a simple, cost-effective tool for large-scale, non-medical screening and early prevention of adolescent MetS.

View Article and Find Full Text PDF

With the development and application of the Internet of Things (IoT), the volume of data generated daily by IoT devices is growing exponentially. These IoT devices, such as smart wearable devices, produce data containing sensitive personal information. However, since IoT devices and users often operate in untrusted external environments, their encrypted data remain vulnerable to potential privacy leaks and security threats from malicious coercion.

View Article and Find Full Text PDF

We examine which decentralized finance architectures enable meaningful regulation by combining financial and computational theory. We show via deduction that a decentralized and permissionless Turing-complete system cannot provably comply with regulations concerning anti-money laundering, know-your-client obligations, some securities restrictions and forms of exchange control. Any system that claims to follow regulations must choose either a form of permission or a less-than-Turing-complete update facility.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!