• English
    • العربية
  • العربية
  • Login
  • QU
  • QU Library
  •  Home
  • Communities & Collections
  • About QSpace
    • Vision & Mission
  • Help
    • Item Submission
    • Publisher policies
    • User guides
      • QSpace Browsing
      • QSpace Searching (Simple & Advanced Search)
      • QSpace Item Submission
      • QSpace Glossary
View Item 
  •   Qatar University Digital Hub
  • Qatar University Institutional Repository
  • Academic
  • Faculty Contributions
  • College of Engineering
  • Computer Science & Engineering
  • View Item
  • Qatar University Digital Hub
  • Qatar University Institutional Repository
  • Academic
  • Faculty Contributions
  • College of Engineering
  • Computer Science & Engineering
  • View Item
  •      
  •  
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Light-Weight Solution to Defend Implantable Medical Devices against Man-In-The-Middle Attack

    Thumbnail
    Date
    2018
    Author
    Belkhouja T.
    Mohamed A.
    Al-Ali A.K.
    Du X.
    Guizani M.
    Metadata
    Show full item record
    Abstract
    Nowadays, Implantable Medical Devices (IMDs) rely mainly on wireless technology for information exchange. In spite of the many advantages wireless technology offers to patients in terms of efficiency, speed and ease; it puts the patients' health in serious danger if no proper security mechanism is deployed. The IMDs rely generally on resources that are relatively simple and sometimes require surgery to be altered. Therefore, common security mechanisms cannot be simply implemented in fear of consuming all the resources held for healthcare purposes. A certain balance between security and efficiency must be found in each IMD architecture. In this work, we try to avoid encryption algorithms to protect IMDs from Man-In- The-Middle (MITM) attacks. Encryption is generally used to protect communication confidentiality. However, this method is still a subject for replay and MITM attacks. In this work, we propose to create a signature protocol that protects IMDs from MITM attempts using less resources than common encryption/decryption algorithms. This signature algorithm is dynamic, which means that the signature output depends on a key and the same message can have different signatures if this key is different. This dynamic part will be introduced using chaotic generators.
    DOI/handle
    http://dx.doi.org/10.1109/GLOCOM.2018.8647207
    http://hdl.handle.net/10576/13903
    Collections
    • Computer Science & Engineering [‎2489‎ items ]

    entitlement


    Qatar University Digital Hub is a digital collection operated and maintained by the Qatar University Library and supported by the ITS department

    Contact Us
    Contact Us | QU

     

     

    Home

    Submit your QU affiliated work

    Browse

    All of Digital Hub
      Communities & Collections Publication Date Author Title Subject Type Language Publisher
    This Collection
      Publication Date Author Title Subject Type Language Publisher

    My Account

    Login

    Statistics

    View Usage Statistics

    About QSpace

    Vision & Mission

    Help

    Item Submission Publisher policies

    Qatar University Digital Hub is a digital collection operated and maintained by the Qatar University Library and supported by the ITS department

    Contact Us
    Contact Us | QU

     

     

    Video