DTW based Authentication for Wireless Medical Device Security

Wireless medical devices play an important role in providing safety and privacy to patients suffering from major health issues. These light-weight devices can be worn inside or outside the patient’s body and provide more convenience and reliable doctor-patient communication. However, the design, development, and usage of these devices play a critical role in present network paradigm. They are vulnerable to network threats and attacks which break the confidentiality, integrity and availability protocols in networking scenarios. Thus, it is important to have identification and authentication of only the authorized peoplewho can operate the device. This paper proposes Dynamic Time Warping (DTW) algorithm for providing trustedauthentication and identification of only authorized people using ECG signal. Here, DTW algorithm is used to measure the correlation between different ECG signal records. Experiments were carried out to evaluate the proposed algorithm with a large database consisting of users of al1 ages, including abnormal ECG data and long span of time intervals between ECG recordings for evaluating the reliability of the proposed algorithm. Comparative evaluation of the proposed sy stem show ed that, it is not only efficient, but also light weight in comparison to the existing systems.

[1]  Mohsen Guizani,et al.  Transactions papers a routing-driven Elliptic Curve Cryptography based key management scheme for Heterogeneous Sensor Networks , 2009, IEEE Transactions on Wireless Communications.

[2]  Mohsen Guizani,et al.  An effective key management scheme for heterogeneous sensor networks , 2007, Ad Hoc Networks.

[3]  V. Muthukkumarasamy,et al.  Authenticated Key Establishment Protocols for a Home Health Care System , 2007, 2007 3rd International Conference on Intelligent Sensors, Sensor Networks and Information.

[4]  G. W. Hughes,et al.  Minimum Prediction Residual Principle Applied to Speech Recognition , 1975 .

[5]  Xiaojiang Du,et al.  A review of security challenges, attacks and resolutions for wireless medical devices , 2017, 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC).

[6]  Xiaojiang Du,et al.  Internet Protocol Television (IPTV): The Killer Application for the Next-Generation Internet , 2007, IEEE Communications Magazine.

[7]  Xiaojiang Du,et al.  PIPAC: Patient infusion pattern based access control scheme for wireless insulin pump system , 2013, 2013 Proceedings IEEE INFOCOM.

[8]  Heena Rathore Mapping Biological Systems to Network Systems , 2016 .

[9]  Michael Szycher Commercialization Secrets for Scientists and Engineers , 2016 .

[10]  Jie Wu,et al.  Defending Resource Depletion Attacks on Implantable Medical Devices , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[11]  Xiaojiang Du,et al.  DLRT: Deep Learning Approach for Reliable Diabetic Treatment , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.

[12]  Rajasekhar Mungara,et al.  A Routing-Driven Elliptic Curve Cryptography based Key Management Scheme for Heterogeneous Sensor Networks , 2014 .

[13]  Eryk Dutkiewicz,et al.  An ECG-based Secret Data Sharing scheme supporting emergency treatment of Implantable Medical Devices , 2014, 2014 International Symposium on Wireless Personal Multimedia Communications (WPMC).

[14]  Fengyuan Xu,et al.  IMDGuard: Securing implantable medical devices with the external wearable guardian , 2011, 2011 Proceedings IEEE INFOCOM.

[15]  C. Loan Computational Frameworks for the Fast Fourier Transform , 1992 .

[16]  Hyogon Kim,et al.  In-vivo NFC: remote monitoring of implanted medical devices with improved privacy , 2012, SenSys '12.

[17]  Srdjan Capkun,et al.  Proximity-based access control for implantable medical devices , 2009, CCS.

[18]  Kevin Fu,et al.  Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).

[19]  Andrew S. Tanenbaum,et al.  RFID Guardian: A Battery-Powered Mobile Device for RFID Privacy Management , 2005, ACISP.

[20]  Eamonn J. Keogh,et al.  Everything you know about Dynamic Time Warping is Wrong , 2004 .

[21]  Farinaz Koushanfar,et al.  Heart-to-heart (H2H): authentication for implanted medical devices , 2013, CCS.

[22]  Mohsen Guizani,et al.  Secure and Efficient Time Synchronization in Heterogeneous Sensor Networks , 2008, IEEE Transactions on Vehicular Technology.

[23]  S. Chiba,et al.  Dynamic programming algorithm optimization for spoken word recognition , 1978 .

[24]  Alan Bundy,et al.  Dynamic Time Warping , 1984 .

[25]  Xiaojiang Du,et al.  Security in wireless sensor networks , 2008, IEEE Wireless Communications.

[26]  Srinivasan Jayaraman,et al.  Human Electrocardiogram for Biometrics Using DTW and FLDA , 2010, 2010 20th International Conference on Pattern Recognition.

[27]  Meinard Müller,et al.  Dynamic Time Warping , 2008 .

[28]  Meng Zhang,et al.  MedMon: Securing Medical Devices Through Wireless Monitoring and Anomaly Detection , 2013, IEEE Transactions on Biomedical Circuits and Systems.

[29]  Xiaojiang Du,et al.  Patient Infusion Pattern based Access Control Schemes for Wireless Insulin Pump System , 2015, IEEE Transactions on Parallel and Distributed Systems.

[30]  Kevin Fu,et al.  Absence Makes the Heart Grow Fonder: New Directions for Implantable Medical Device Security , 2008, HotSec.

[31]  Xiaojiang Du,et al.  Biometric-based two-level secure access control for Implantable Medical Devices during emergencies , 2011, 2011 Proceedings IEEE INFOCOM.

[32]  Xiaojiang Du,et al.  A survey of key management schemes in wireless sensor networks , 2007, Comput. Commun..

[33]  Leyla Bilge,et al.  Cutting the Gordian Knot: A Look Under the Hood of Ransomware Attacks , 2015, DIMVA.