Cargando…

Can Formal Security Verification Really Be Optional? Scrutinizing the Security of IMD Authentication Protocols

The need for continuous monitoring of physiological information of critical organs of the human body, combined with the ever-growing field of electronics and sensor technologies and the vast opportunities brought by 5G connectivity, have made implantable medical devices (IMDs) the most necessitated...

Descripción completa

Detalles Bibliográficos
Autores principales: Duguma, Daniel Gerbi, You, Ilsun, Gebremariam, Yonas Engida, Kim, Jiyoon
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2021
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8704301/
https://www.ncbi.nlm.nih.gov/pubmed/34960473
http://dx.doi.org/10.3390/s21248383
_version_ 1784621674546593792
author Duguma, Daniel Gerbi
You, Ilsun
Gebremariam, Yonas Engida
Kim, Jiyoon
author_facet Duguma, Daniel Gerbi
You, Ilsun
Gebremariam, Yonas Engida
Kim, Jiyoon
author_sort Duguma, Daniel Gerbi
collection PubMed
description The need for continuous monitoring of physiological information of critical organs of the human body, combined with the ever-growing field of electronics and sensor technologies and the vast opportunities brought by 5G connectivity, have made implantable medical devices (IMDs) the most necessitated devices in the health arena. IMDs are very sensitive since they are implanted in the human body, and the patients depend on them for the proper functioning of their vital organs. Simultaneously, they are intrinsically vulnerable to several attacks mainly due to their resource limitations and the wireless channel utilized for data transmission. Hence, failing to secure them would put the patient’s life in jeopardy and damage the reputations of the manufacturers. To date, various researchers have proposed different countermeasures to keep the confidentiality, integrity, and availability of IMD systems with privacy and safety specifications. Despite the appreciated efforts made by the research community, there are issues with these proposed solutions. Principally, there are at least three critical problems. (1) Inadequate essential capabilities (such as emergency authentication, key update mechanism, anonymity, and adaptability); (2) heavy computational and communication overheads; and (3) lack of rigorous formal security verification. Motivated by this, we have thoroughly analyzed the current IMD authentication protocols by utilizing two formal approaches: the Burrows–Abadi–Needham logic (BAN logic) and the Automated Validation of Internet Security Protocols and Applications (AVISPA). In addition, we compared these schemes against their security strengths, computational overheads, latency, and other vital features, such as emergency authentications, key update mechanisms, and adaptabilities.
format Online
Article
Text
id pubmed-8704301
institution National Center for Biotechnology Information
language English
publishDate 2021
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-87043012021-12-25 Can Formal Security Verification Really Be Optional? Scrutinizing the Security of IMD Authentication Protocols Duguma, Daniel Gerbi You, Ilsun Gebremariam, Yonas Engida Kim, Jiyoon Sensors (Basel) Article The need for continuous monitoring of physiological information of critical organs of the human body, combined with the ever-growing field of electronics and sensor technologies and the vast opportunities brought by 5G connectivity, have made implantable medical devices (IMDs) the most necessitated devices in the health arena. IMDs are very sensitive since they are implanted in the human body, and the patients depend on them for the proper functioning of their vital organs. Simultaneously, they are intrinsically vulnerable to several attacks mainly due to their resource limitations and the wireless channel utilized for data transmission. Hence, failing to secure them would put the patient’s life in jeopardy and damage the reputations of the manufacturers. To date, various researchers have proposed different countermeasures to keep the confidentiality, integrity, and availability of IMD systems with privacy and safety specifications. Despite the appreciated efforts made by the research community, there are issues with these proposed solutions. Principally, there are at least three critical problems. (1) Inadequate essential capabilities (such as emergency authentication, key update mechanism, anonymity, and adaptability); (2) heavy computational and communication overheads; and (3) lack of rigorous formal security verification. Motivated by this, we have thoroughly analyzed the current IMD authentication protocols by utilizing two formal approaches: the Burrows–Abadi–Needham logic (BAN logic) and the Automated Validation of Internet Security Protocols and Applications (AVISPA). In addition, we compared these schemes against their security strengths, computational overheads, latency, and other vital features, such as emergency authentications, key update mechanisms, and adaptabilities. MDPI 2021-12-15 /pmc/articles/PMC8704301/ /pubmed/34960473 http://dx.doi.org/10.3390/s21248383 Text en © 2021 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Duguma, Daniel Gerbi
You, Ilsun
Gebremariam, Yonas Engida
Kim, Jiyoon
Can Formal Security Verification Really Be Optional? Scrutinizing the Security of IMD Authentication Protocols
title Can Formal Security Verification Really Be Optional? Scrutinizing the Security of IMD Authentication Protocols
title_full Can Formal Security Verification Really Be Optional? Scrutinizing the Security of IMD Authentication Protocols
title_fullStr Can Formal Security Verification Really Be Optional? Scrutinizing the Security of IMD Authentication Protocols
title_full_unstemmed Can Formal Security Verification Really Be Optional? Scrutinizing the Security of IMD Authentication Protocols
title_short Can Formal Security Verification Really Be Optional? Scrutinizing the Security of IMD Authentication Protocols
title_sort can formal security verification really be optional? scrutinizing the security of imd authentication protocols
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8704301/
https://www.ncbi.nlm.nih.gov/pubmed/34960473
http://dx.doi.org/10.3390/s21248383
work_keys_str_mv AT dugumadanielgerbi canformalsecurityverificationreallybeoptionalscrutinizingthesecurityofimdauthenticationprotocols
AT youilsun canformalsecurityverificationreallybeoptionalscrutinizingthesecurityofimdauthenticationprotocols
AT gebremariamyonasengida canformalsecurityverificationreallybeoptionalscrutinizingthesecurityofimdauthenticationprotocols
AT kimjiyoon canformalsecurityverificationreallybeoptionalscrutinizingthesecurityofimdauthenticationprotocols