Attacks in H2H protocol

نویسندگان

  • Eduard Marin
  • Dave Singelée
  • Bart Preneel
چکیده

In 2013, Rostami et al. proposed a pairing protocol to authenticate device programmers to Implantable Medical Devices (IMDs) based on (lightweight) public-key cryptography and a commitment scheme. Their solution is built upon “touch-to-access”, a novel access-control policy where a device programmer can access an IMD only if it can touch the patient’s skin to measure his heart rate. In this paper, we show that their protocol is vulnerable to a reflection attack. This attack can be performed to gain access to an IMD without the need for making physical contact with the patient.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

HMAC-Based Authentication Protocol: Attacks and Improvements

As a response to a growing interest in RFID systems such as Internet of Things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. Hence, authentication protocols to increase security and privacy in RFID applications have gained much attention in the literature. In this study, security and privac...

متن کامل

Computer Support for Agile Human-to-Human Interactions with Social Protocols

Despite many works in CSCW, groupware, workflow systems and social networks, computer support for human-to-human interactions is still insufficient, especially support for agility, i.e. the capability of a group of human beings, collaborators, to rapidly and cost efficiently adapt the way they interact to changes. In this paper, requirements for computer support for agile H2H interactions are p...

متن کامل

A survey on physiological-signal-based security for medical devices

Implantable Medical Devices (IMDs) are used to monitor and control patients with chronic diseases. A growing number of IMDs are equipped with a wireless interface that allows non-invasive monitoring and reprogramming through an external device, also known as device programmer. However, this wireless interface also brings important security and privacy risks that may lead to remote attacks. In t...

متن کامل

Game-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags

The term "Internet of Things (IoT)" expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a great technology and an interesting candidate to provide communications for IoT networks, but numerous security and privacy issues need to be considered. In this paper, we analyze the security and ...

متن کامل

Performance Analysis of a Novel Hybrid S-ALOHA/TDMA Protocol for Beta Distributed Massive MTC Access

Simultaneous random access of massive machine type communications (MTC) devices are expected to cause congestion in the radio access network. Not only the performance of MTC, but the coexisting human to human (H2H) communications would also degrade dramatically without an appropriate medium access control (MAC) protocol. However, most existing solutions focus on the random access procedure with...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016