Hijacking an insulin pump: Security attacks and defenses for a diabetes therapy system

Chunxiao Li, A. Raghunathan, N. Jha
{"title":"Hijacking an insulin pump: Security attacks and defenses for a diabetes therapy system","authors":"Chunxiao Li, A. Raghunathan, N. Jha","doi":"10.1109/HEALTH.2011.6026732","DOIUrl":null,"url":null,"abstract":"Wearable and implantable medical devices are being increasingly deployed to improve diagnosis, monitoring, and therapy for a range of medical conditions. Unlike other classes of electronics and computing systems, security attacks on these devices have extreme consequences and must, therefore, be analyzed and prevented with utmost effort. Yet, very little work exists on this important topic and the security vulnerabilities of such systems are not well understood. We demonstrate security attacks that we have implemented in the laboratory on a popular glucose monitoring and insulin delivery system available on the market, and also propose defenses against such attacks. Continuous glucose monitoring and insulin delivery systems are becoming increasingly popular among patients with diabetes. These systems utilize wireless communication links, which are frequently utilized as a portal to launch security attacks. Our study shows that both passive attacks (eavesdropping of the wireless communication) and active attacks (impersonation and control of the medical devices to alter the intended therapy) can be successfully launched using public-domain information and widely available off-the-shelf hardware. The proposed attacks can compromise both the privacy and safety of patients. We propose two possible defenses against such attacks. One is based on rolling-code cryptographic protocols, and the other is based on body-coupled communication. Our security analysis shows that the proposed defenses have the potential to mitigate the security risks associated with personal healthcare systems.","PeriodicalId":187103,"journal":{"name":"2011 IEEE 13th International Conference on e-Health Networking, Applications and Services","volume":"49 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"311","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 IEEE 13th International Conference on e-Health Networking, Applications and Services","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/HEALTH.2011.6026732","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 311

Abstract

Wearable and implantable medical devices are being increasingly deployed to improve diagnosis, monitoring, and therapy for a range of medical conditions. Unlike other classes of electronics and computing systems, security attacks on these devices have extreme consequences and must, therefore, be analyzed and prevented with utmost effort. Yet, very little work exists on this important topic and the security vulnerabilities of such systems are not well understood. We demonstrate security attacks that we have implemented in the laboratory on a popular glucose monitoring and insulin delivery system available on the market, and also propose defenses against such attacks. Continuous glucose monitoring and insulin delivery systems are becoming increasingly popular among patients with diabetes. These systems utilize wireless communication links, which are frequently utilized as a portal to launch security attacks. Our study shows that both passive attacks (eavesdropping of the wireless communication) and active attacks (impersonation and control of the medical devices to alter the intended therapy) can be successfully launched using public-domain information and widely available off-the-shelf hardware. The proposed attacks can compromise both the privacy and safety of patients. We propose two possible defenses against such attacks. One is based on rolling-code cryptographic protocols, and the other is based on body-coupled communication. Our security analysis shows that the proposed defenses have the potential to mitigate the security risks associated with personal healthcare systems.
劫持胰岛素泵:糖尿病治疗系统的安全攻击和防御
可穿戴和植入式医疗设备正越来越多地用于改善一系列医疗条件的诊断、监测和治疗。与其他类别的电子和计算系统不同,对这些设备的安全攻击会产生极端的后果,因此必须尽最大努力进行分析和预防。然而,关于这一重要主题的工作很少,而且人们对这类系统的安全漏洞也没有很好地了解。我们展示了我们在实验室中对市场上流行的葡萄糖监测和胰岛素输送系统实施的安全攻击,并提出了针对此类攻击的防御措施。连续血糖监测和胰岛素输送系统在糖尿病患者中越来越受欢迎。这些系统利用无线通信链路,无线通信链路经常被用作发起安全攻击的门户。我们的研究表明,被动攻击(窃听无线通信)和主动攻击(模仿和控制医疗设备以改变预期治疗)都可以使用公共领域信息和广泛可用的现成硬件成功启动。提出的攻击可能会危及患者的隐私和安全。针对这种攻击,我们提出了两种可能的防御措施。一种是基于滚动码加密协议,另一种是基于体耦合通信。我们的安全分析表明,建议的防御措施有可能减轻与个人医疗保健系统相关的安全风险。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信