A1 Vertaisarvioitu alkuperäisartikkeli tieteellisessä lehdessä
Specification Analysis for Secure RFID Implants
Tekijät: Sanaz Rahimi Moosavi, Antti Hakkala, Johanna Isoaho, Seppo Virtanen, Jouni Isoaho
Kustantaja: IACSIT Press
Julkaisuvuosi: 2014
Journal: International Journal of Computer Theory and Engineering
Lehden akronyymi: IJCTE
Vuosikerta: 6
Numero: 2
Aloitussivu: 177
Lopetussivu: 188
Sivujen määrä: 12
DOI: https://doi.org/10.7763/IJCTE.2014.V6.858
Verkko-osoite: http://www.ijcte.org/papers/858-s041.pdf
Tiivistelmä
In this paper we derive an engineering specification for functionality, security, and implementation demands for RFID Implantable Medical Devices (IMD) requiring medical data storage and wireless communication. We illustrate the specification by sketching a secure communication protocol for RFID IMDs. The specification follows from our requirements analysis of application characteristics, legal restrictions, security requirements and ethical concerns of IMDs. In our analysis we have recognized three main types of IMD applications: identification, financial and medical/emergency. The hardware implementation constraints and security level requirements of IMD systems differ from mainstream applications of RFID. The presented specification that considers the special operating environment, delicate use cases and safety-critical functionality of IMD systems is aimed to be a conceptual platform for designing robust security schemes and long-term functional and physical reliability.
In this paper we derive an engineering specification for functionality, security, and implementation demands for RFID Implantable Medical Devices (IMD) requiring medical data storage and wireless communication. We illustrate the specification by sketching a secure communication protocol for RFID IMDs. The specification follows from our requirements analysis of application characteristics, legal restrictions, security requirements and ethical concerns of IMDs. In our analysis we have recognized three main types of IMD applications: identification, financial and medical/emergency. The hardware implementation constraints and security level requirements of IMD systems differ from mainstream applications of RFID. The presented specification that considers the special operating environment, delicate use cases and safety-critical functionality of IMD systems is aimed to be a conceptual platform for designing robust security schemes and long-term functional and physical reliability.