A1 Refereed original research article in a scientific journal
Specification Analysis for Secure RFID Implants
Authors: Sanaz Rahimi Moosavi, Antti Hakkala, Johanna Isoaho, Seppo Virtanen, Jouni Isoaho
Publisher: IACSIT Press
Publication year: 2014
Journal: International Journal of Computer Theory and Engineering
Journal acronym: IJCTE
Volume: 6
Issue: 2
First page : 177
Last page: 188
Number of pages: 12
DOI: https://doi.org/10.7763/IJCTE.2014.V6.858
Web address : http://www.ijcte.org/papers/858-s041.pdf
Abstract
In this paper we derive an engineering specification for functionality, security, and implementation demands for RFID Implantable Medical Devices (IMD) requiring medical data storage and wireless communication. We illustrate the specification by sketching a secure communication protocol for RFID IMDs. The specification follows from our requirements analysis of application characteristics, legal restrictions, security requirements and ethical concerns of IMDs. In our analysis we have recognized three main types of IMD applications: identification, financial and medical/emergency. The hardware implementation constraints and security level requirements of IMD systems differ from mainstream applications of RFID. The presented specification that considers the special operating environment, delicate use cases and safety-critical functionality of IMD systems is aimed to be a conceptual platform for designing robust security schemes and long-term functional and physical reliability.
In this paper we derive an engineering specification for functionality, security, and implementation demands for RFID Implantable Medical Devices (IMD) requiring medical data storage and wireless communication. We illustrate the specification by sketching a secure communication protocol for RFID IMDs. The specification follows from our requirements analysis of application characteristics, legal restrictions, security requirements and ethical concerns of IMDs. In our analysis we have recognized three main types of IMD applications: identification, financial and medical/emergency. The hardware implementation constraints and security level requirements of IMD systems differ from mainstream applications of RFID. The presented specification that considers the special operating environment, delicate use cases and safety-critical functionality of IMD systems is aimed to be a conceptual platform for designing robust security schemes and long-term functional and physical reliability.