Securing Wireless Neurostimulators
Title | Securing Wireless Neurostimulators |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Marin, Eduard, Singelée, Dave, Yang, Bohan, Volski, Vladimir, Vandenbosch, Guy A. E., Nuttin, Bart, Preneel, Bart |
Conference Name | Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy |
Publisher | ACM |
Conference Location | New York, NY, USA |
ISBN Number | 978-1-4503-5632-9 |
Keywords | black box encryption, black-box reverse engineering, composability, low-cost randomness source, Metrics, proprietary wireless communication protocol, pubcrawl, random key generation, Resiliency, security architecture |
Abstract | Implantable medical devices (IMDs) typically rely on proprietary protocols to wirelessly communicate with external device programmers. In this paper, we fully reverse engineer the proprietary protocol between a device programmer and a widely used commercial neurostimulator from one of the leading IMD manufacturers. For the reverse engineering, we follow a black-box approach and use inexpensive hardware equipment. We document the message format and the protocol state-machine, and show that the transmissions sent over the air are neither encrypted nor authenticated. Furthermore, we conduct several software radio-based attacks that could compromise the safety and privacy of patients, and investigate the feasibility of performing these attacks in real scenarios. Motivated by our findings, we propose a security architecture that allows for secure data exchange between the device programmer and the neurostimulator. It relies on using a patient>>s physiological signal for generating a symmetric key in the neurostimulator, and transporting this key from the neurostimulator to the device programmer through a secret out-of-band (OOB) channel. Our solution allows the device programmer and the neurostimulator to agree on a symmetric session key without these devices needing to share any prior secrets; offers an effective and practical balance between security and permissive access in emergencies; requires only minor hardware changes in the devices; adds minimal computation and communication overhead; and provides forward and backward security. Finally, we implement a proof-of-concept of our solution. |
URL | http://doi.acm.org/10.1145/3176258.3176310 |
DOI | 10.1145/3176258.3176310 |
Citation Key | marin_securing_2018 |