限制射频医疗设备披露的实用技术

E. Freudenthal, R. Spring, L. Estevez
{"title":"限制射频医疗设备披露的实用技术","authors":"E. Freudenthal, R. Spring, L. Estevez","doi":"10.1109/EMBSW.2007.4454179","DOIUrl":null,"url":null,"abstract":"The use of radio for communication with medical devices provides important convenience and safety features. However, devices that respond to unauthorized queries may inadvertently disclose their presence. It is reasonable for users to expect that their devices' detectability by third parties to be limited, and thus even eavesdroppers to an authorized conversation (e.g. a command sent to an insulin pump) should observe an access code of minimal utility for triggering future transmissions. Access rights should be revocable in a manner that limits that harm that can be caused by authorized devices in the possession of unauthorized users. In order to detect inappropriate use, it may be desirable for access history to be available for audit. We describe a family of replay-attack resistant protocols suitable for embedding into query messages that can authorize users with a range of differentiated access rights. Implanted devices utilizing these techniques can evade detection by suppressing responses to queries that do not contain appropriate authorization. Techniques are described that can support revocation of authorization and audits of access history. Finally, we observe that the processing of unauthorized queries consumes power and thus can be used to mount a potentially devastating denial-of-service attack against the batteries of both conventional devices and devices that utilize the cryptographic protocols we describe. Since field-powered communication systems (e.g. HF-RFID) contain embedded general-purpose processors that operate using only power extracted from externally applied fields, they are substantially more robust against such forms of attack.","PeriodicalId":333843,"journal":{"name":"2007 IEEE Dallas Engineering in Medicine and Biology Workshop","volume":"13 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"19","resultStr":"{\"title\":\"Practical Techniques for Limiting Disclosure of RF-Equipped Medical Devices\",\"authors\":\"E. Freudenthal, R. Spring, L. Estevez\",\"doi\":\"10.1109/EMBSW.2007.4454179\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The use of radio for communication with medical devices provides important convenience and safety features. However, devices that respond to unauthorized queries may inadvertently disclose their presence. It is reasonable for users to expect that their devices' detectability by third parties to be limited, and thus even eavesdroppers to an authorized conversation (e.g. a command sent to an insulin pump) should observe an access code of minimal utility for triggering future transmissions. Access rights should be revocable in a manner that limits that harm that can be caused by authorized devices in the possession of unauthorized users. In order to detect inappropriate use, it may be desirable for access history to be available for audit. We describe a family of replay-attack resistant protocols suitable for embedding into query messages that can authorize users with a range of differentiated access rights. Implanted devices utilizing these techniques can evade detection by suppressing responses to queries that do not contain appropriate authorization. Techniques are described that can support revocation of authorization and audits of access history. Finally, we observe that the processing of unauthorized queries consumes power and thus can be used to mount a potentially devastating denial-of-service attack against the batteries of both conventional devices and devices that utilize the cryptographic protocols we describe. Since field-powered communication systems (e.g. HF-RFID) contain embedded general-purpose processors that operate using only power extracted from externally applied fields, they are substantially more robust against such forms of attack.\",\"PeriodicalId\":333843,\"journal\":{\"name\":\"2007 IEEE Dallas Engineering in Medicine and Biology Workshop\",\"volume\":\"13 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2007-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"19\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2007 IEEE Dallas Engineering in Medicine and Biology Workshop\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/EMBSW.2007.4454179\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2007 IEEE Dallas Engineering in Medicine and Biology Workshop","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EMBSW.2007.4454179","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 19

摘要

使用无线电与医疗设备通信提供了重要的便利和安全特性。但是,响应未授权查询的设备可能会无意中暴露它们的存在。用户有理由期望他们的设备被第三方检测到是有限的,因此即使是窃听者对授权对话(例如发送给胰岛素泵的命令)也应该遵守最小效用的访问代码,以触发未来的传输。访问权应以限制未经授权用户拥有授权设备可能造成的损害的方式予以撤销。为了检测不适当的使用,可能希望访问历史记录可用于审计。我们描述了一系列适合嵌入查询消息的抗重放攻击协议,这些协议可以授权用户具有一系列不同的访问权限。利用这些技术的植入设备可以通过抑制对不包含适当授权的查询的响应来逃避检测。描述了支持撤销授权和审计访问历史记录的技术。最后,我们观察到,处理未经授权的查询消耗电力,因此可以用来对传统设备和使用我们描述的加密协议的设备的电池发起潜在的破坏性拒绝服务攻击。由于现场供电通信系统(例如HF-RFID)包含嵌入式通用处理器,该处理器仅使用从外部应用领域提取的功率运行,因此它们在抵御此类攻击方面具有更强的鲁棒性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Practical Techniques for Limiting Disclosure of RF-Equipped Medical Devices
The use of radio for communication with medical devices provides important convenience and safety features. However, devices that respond to unauthorized queries may inadvertently disclose their presence. It is reasonable for users to expect that their devices' detectability by third parties to be limited, and thus even eavesdroppers to an authorized conversation (e.g. a command sent to an insulin pump) should observe an access code of minimal utility for triggering future transmissions. Access rights should be revocable in a manner that limits that harm that can be caused by authorized devices in the possession of unauthorized users. In order to detect inappropriate use, it may be desirable for access history to be available for audit. We describe a family of replay-attack resistant protocols suitable for embedding into query messages that can authorize users with a range of differentiated access rights. Implanted devices utilizing these techniques can evade detection by suppressing responses to queries that do not contain appropriate authorization. Techniques are described that can support revocation of authorization and audits of access history. Finally, we observe that the processing of unauthorized queries consumes power and thus can be used to mount a potentially devastating denial-of-service attack against the batteries of both conventional devices and devices that utilize the cryptographic protocols we describe. Since field-powered communication systems (e.g. HF-RFID) contain embedded general-purpose processors that operate using only power extracted from externally applied fields, they are substantially more robust against such forms of attack.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信