TY - GEN
T1 - Salt Generation for Hashing Schemes based on ECG readings for Emergency Access to Implantable Medical Devices
AU - Belkhouja, Taha
AU - Mohamed, Amr
AU - Al-Ali, Abdulla K.
AU - Du, Xiaojiang
AU - Guizani, Mohsen
N1 - Publisher Copyright:
© 2018 IEEE.
PY - 2018/11/9
Y1 - 2018/11/9
N2 - Secure communication in medical devices is a pillar in ensuring patient's safety. However, in emergency cases, this can hinder the recovery of the patient. If an emergency team cannot give themselves access to the IMD without the user's assistance, they may be unable to offer any help. This paper introduces a security scheme for similar cases. By creating a backdoor to the IMDs, legal authentication may be performed with the IMD and gain access to it. This work presents a procedure for an emergency team to validate their actions to the IMD without the need of the patient's conscious. This is ensured using hashing function and elliptic curves for the security key generation. The seed that will be used will be the heart rhythm of the patient. The authentication process introduced will only allow access to the identified parties. An eavesdropper will be unable to interfere during emergency cases and can threaten patients' lives.
AB - Secure communication in medical devices is a pillar in ensuring patient's safety. However, in emergency cases, this can hinder the recovery of the patient. If an emergency team cannot give themselves access to the IMD without the user's assistance, they may be unable to offer any help. This paper introduces a security scheme for similar cases. By creating a backdoor to the IMDs, legal authentication may be performed with the IMD and gain access to it. This work presents a procedure for an emergency team to validate their actions to the IMD without the need of the patient's conscious. This is ensured using hashing function and elliptic curves for the security key generation. The seed that will be used will be the heart rhythm of the patient. The authentication process introduced will only allow access to the identified parties. An eavesdropper will be unable to interfere during emergency cases and can threaten patients' lives.
KW - Authentication
KW - emergency situation
KW - hashes
KW - heart beat
UR - http://www.scopus.com/inward/record.url?scp=85058451571&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85058451571&partnerID=8YFLogxK
U2 - 10.1109/ISNCC.2018.8530897
DO - 10.1109/ISNCC.2018.8530897
M3 - Conference contribution
AN - SCOPUS:85058451571
T3 - 2018 International Symposium on Networks, Computers and Communications, ISNCC 2018
BT - 2018 International Symposium on Networks, Computers and Communications, ISNCC 2018
T2 - 2018 International Symposium on Networks, Computers and Communications, ISNCC 2018
Y2 - 19 June 2018 through 21 June 2018
ER -