Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3001913.3006642acmotherconferencesArticle/Chapter ViewAbstractPublication Pagesacm-devConference Proceedingsconference-collections
poster

Power Attack: An Emerging Threat in Health-care Applications Using Medical Body Area Networks

Published: 18 November 2016 Publication History

Abstract

Recent rise in aged population and chronic diseases, is placing increasing pressure on health care expenditure. Ubiquitous health care is regarded as a potential driver in reducing such health expenditure. Advancement in wireless communication and sensor technologies permits real-time acquisition, transmission, and processing of critical medical information for ubiquitous health-care applications. Hence, medical body area networks (MBANs) emerge as a key technology to facilitate ubiquitous health-care services. However, energy restriction of micro-battery of a sensor device holds back the development of MBANs and also makes MBANs vulnerable to different malicious attacks. In this paper, we introduce a new attack entitled Power Attack exploiting power constraint of the sensor devices. Power attack forces a sensor to die off due to lack of power supply. Besides, we also propose countermeasure for the presented power attack. Finally, we exhibit efficacy of our proposed countermeasure using experimental evaluation.

References

[1]
All about battery. http://www.allaboutbatteries.com/Energy-tables.html, 2011. {Last accessed on 16-September-2016}.
[2]
Assignment point. http://www.assignmentpoint.com/arts/social-science/population-ageing-bangladesh.html, 2011. {Last accessed on 16-September-2016}.
[3]
Worldbank.org. http://siteresources.worldbank.org/SOUTHASIAEXT/Resources/223546-1296680097256/7707437-1296680114157/NCD_BD_Policy_Feb_2011.pdf, 2011. {Last accessed on 16-September-2016}.
[4]
Trading economics. www.tradingeconomics.com/bangladesh/health-expenditure-total-percent-of-gdp-wb-data.html, 2013. {Last accessed on 16-September-2016}.
[5]
N. Amour, A. Hersi, N. Alajlan, Y. Bazi, and H. AlHichri. Implementation of a mobile health system for monitoring ecg signals. 2015.
[6]
M. Chen, S. Gonzalez, A. Vasilakos, H. Cao, and V. C. Leung. Body area networks: A survey. Mobile networks and applications, 16(2):171--193, 2011.
[7]
D. Curtis, E. Shih, J. Waterman, J. Guttag, J. Bailey, T. Stair, R. A. Greenes, and L. Ohno-Machado. Physiological signal monitoring in the waiting areas of an emergency room. In Proceedings of the ICST 3rd international conference on Body area networks, page 5, 2008.
[8]
E. Farella, A. Pieracci, L. Benini, L. Rocchi, and A. Acquaviva. Interfacing human and computer with wireless body area sensor networks: the wimoca solution. Multimedia Tools and Applications, 38(3):337--363, 2008.
[9]
M. for Health and Aging. Speech opening address. Speech Opening Address, 2009.
[10]
S. Gollakota, H. Hassanieh, B. Ransford, D. Katabi, and K. Fu. They can hear your heartbeats: non-invasive security for implantable medical devices. ACM SIGCOMM Computer Communication Review, 41(4):2--13, 2011.
[11]
T. M. R. Group. Mannasim framework classes manual. www.mannasim.dcc.ufmg.br/download/mannasim-classes-manual.pdf/, 2010. {Last accessed on 16-September-2016}.
[12]
J. Y. Khan, M. R. Yuce, and F. Karami. Performance evaluation of a wireless body area sensor network for remote patient monitoring. In 2008 30th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, pages 1266--1269. IEEE, 2008.
[13]
R. Kumar and R. Mukesh. State of the art: Security in wireless body area networks. International Journal of Computer Science & Engineering Technology (IJCSET) Vol, 4(5):622--630, 2013.
[14]
M. Li, W. Lou, and K. Ren. Data security and privacy in wireless body area networks. IEEE Wireless Communications, 17(1):51--58, 2010.
[15]
J. Liu and K. S. Kwak. Hybrid security mechanisms for wireless body area networks. In 2010 Second international conference on ubiquitous and future networks (ICUFN), pages 98--103. IEEE, 2010.
[16]
D. H. G. Ltd. Ecg sensor. www.data-harvest.co.uk/docs/uploads/3279_ds057_5_ecg.pdf, 2010. {Last accessed on 16-September-2016}.
[17]
D. Lucani, G. Cataldo, J. Cruz, G. Villegas, and S. Wong. A portable ecg monitoring device with bluetooth and holter capabilities for telemedicine applications. In Engineering in Medicine and Biology Society, 2006. EMBS'06. 28th Annual International Conference of the IEEE, pages 5244--5247. IEEE, 2006.
[18]
H. Med. Cardiac cycle. howmed.net/physiology/cardiac-cycle/, 2010. {Last accessed on 16-September-2016}.
[19]
N. Nurain and A. Islam. Poster: Power attack in body area networks: Dream or reality? In Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services Companion, pages 66--66. ACM, 2016.
[20]
A. Pentland. Healthwear: medical technology becomes wearable. Studies in health technology and informatics, 118:55--65, 2005.
[21]
G. Ragesh and K. Baskaran. An overview of applications, standards and challenges in futuristic wireless body area networks. 2012.
[22]
S. N. Ramli and R. Ahmad. Surveying the wireless body area network in the realm of wireless communication. In Information Assurance and Security (IAS), 2011 7th International Conference on, pages 58---61. IEEE, 2011.
[23]
N. Sharma and E. M. Bansal. Preventing impersonate attacks using digital certificates in wban. IJA EST- INTERNATIONAL JOURNAL OF ADVANCED ENGINEERING SCIENCES AND TECHNOLOGIES, 1(9):31--35, 2011.
[24]
T. Sundararajan and A. Shanmugam. A novel intrusion detection system for wireless body area network in health care monitoring. Journal of Computer Science, 6(11):1355, 2010.
[25]
Z. Xu, H. Wang, Z. Xu, and X. Wang. Power attack: An increasing threat to data centers. In NDSS, 2014.
  1. Power Attack: An Emerging Threat in Health-care Applications Using Medical Body Area Networks

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    ACM DEV '16: Proceedings of the 7th Annual Symposium on Computing for Development
    November 2016
    265 pages
    ISBN:9781450346498
    DOI:10.1145/3001913
    Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 18 November 2016

    Check for updates

    Author Tags

    1. Medical body area networks
    2. Power attack
    3. Security threat

    Qualifiers

    • Poster
    • Research
    • Refereed limited

    Conference

    ACM DEV '16

    Acceptance Rates

    Overall Acceptance Rate 52 of 164 submissions, 32%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 82
      Total Downloads
    • Downloads (Last 12 months)1
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 01 Dec 2024

    Other Metrics

    Citations

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media