Show simple item record

dc.contributor.authorGollakota, Shyamnath
dc.contributor.authorHassanieh, Haitham
dc.contributor.authorRansford, Benjamin
dc.contributor.authorKatabi, Dina
dc.contributor.authorFu, Kevin
dc.date.accessioned2012-09-06T17:54:43Z
dc.date.available2012-09-06T17:54:43Z
dc.date.issued2011-08
dc.identifier.isbn978-1-4503-0797-0
dc.identifier.urihttp://hdl.handle.net/1721.1/72549
dc.description.abstractWireless communication has become an intrinsic part of modern implantable medical devices (IMDs). Recent work, however, has demonstrated that wireless connectivity can be exploited to compromise the confidentiality of IMDs' transmitted data or to send unauthorized commands to IMDs---even commands that cause the device to deliver an electric shock to the patient. The key challenge in addressing these attacks stems from the difficulty of modifying or replacing already-implanted IMDs. Thus, in this paper, we explore the feasibility of protecting an implantable device from such attacks without modifying the device itself. We present a physical-layer solution that delegates the security of an IMD to a personal base station called the shield. The shield uses a novel radio design that can act as a jammer-cum-receiver. This design allows it to jam the IMD's messages, preventing others from decoding them while being able to decode them itself. It also allows the shield to jam unauthorized commands---even those that try to alter the shield's own transmissions. We implement our design in a software radio and evaluate it with commercial IMDs. We find that it effectively provides confidentiality for private data and protects the IMD from unauthorized commands.en_US
dc.description.sponsorshipNational Science Foundation (U.S.). (Grant number CNS-0831244)en_US
dc.description.sponsorshipNational Science Foundation (U.S.). Graduate Research Fellowship Programen_US
dc.description.sponsorshipAlfred P. Sloan Foundation. Fellowshipen_US
dc.description.sponsorshipUnited States. Dept. of Health and Human Services. Cooperative Agreement (90TR0003/01)en_US
dc.language.isoen_US
dc.publisherInstitute of Electrical and Electronics Engineers (IEEE)en_US
dc.relation.isversionofhttp://dx.doi.org/10.1145/2018436.2018438en_US
dc.rightsCreative Commons Attribution-Noncommercial-Share Alike 3.0en_US
dc.rights.urihttp://creativecommons.org/licenses/by-nc-sa/3.0/en_US
dc.sourceMIT web domainen_US
dc.titleThey Can Hear Your Heartbeats: Non-Invasive Security for Implantable Medical Devicesen_US
dc.typeArticleen_US
dc.identifier.citationShyamnath Gollakota, Haitham Hassanieh, Benjamin Ransford, Dina Katabi, and Kevin Fu. 2011. They can hear your heartbeats: non-invasive security for implantable medical devices. In Proceedings of the ACM SIGCOMM 2011 conference (SIGCOMM '11). ACM, New York, NY, USA, 2-13.en_US
dc.contributor.departmentMassachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratoryen_US
dc.contributor.departmentMassachusetts Institute of Technology. Department of Electrical Engineering and Computer Scienceen_US
dc.contributor.approverKatabi, Dina
dc.contributor.mitauthorGollakota, Shyamnath
dc.contributor.mitauthorHassanieh, Haitham
dc.contributor.mitauthorKatabi, Dina
dc.contributor.mitauthorFu, Kevin
dc.relation.journalProceedings of the ACM SIGCOMM 2011 Conference (SIGCOMM '11)en_US
dc.eprint.versionAuthor's final manuscripten_US
dc.type.urihttp://purl.org/eprint/type/ConferencePaperen_US
dspace.orderedauthorsGollakota, Shyamnath; Hassanieh, Haitham; Ransford, Benjamin; Katabi, Dina; Fu, Kevinen
dc.identifier.orcidhttps://orcid.org/0000-0002-6689-8189
dc.identifier.orcidhttps://orcid.org/0000-0003-4854-4157
mit.licenseOPEN_ACCESS_POLICYen_US
mit.metadata.statusComplete


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record