Attacks in H2H protocol
نویسندگان
چکیده
In 2013, Rostami et al. proposed a pairing protocol to authenticate device programmers to Implantable Medical Devices (IMDs) based on (lightweight) public-key cryptography and a commitment scheme. Their solution is built upon “touch-to-access”, a novel access-control policy where a device programmer can access an IMD only if it can touch the patient’s skin to measure his heart rate. In this paper, we show that their protocol is vulnerable to a reflection attack. This attack can be performed to gain access to an IMD without the need for making physical contact with the patient.
منابع مشابه
HMAC-Based Authentication Protocol: Attacks and Improvements
As a response to a growing interest in RFID systems such as Internet of Things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. Hence, authentication protocols to increase security and privacy in RFID applications have gained much attention in the literature. In this study, security and privac...
متن کاملComputer Support for Agile Human-to-Human Interactions with Social Protocols
Despite many works in CSCW, groupware, workflow systems and social networks, computer support for human-to-human interactions is still insufficient, especially support for agility, i.e. the capability of a group of human beings, collaborators, to rapidly and cost efficiently adapt the way they interact to changes. In this paper, requirements for computer support for agile H2H interactions are p...
متن کاملA survey on physiological-signal-based security for medical devices
Implantable Medical Devices (IMDs) are used to monitor and control patients with chronic diseases. A growing number of IMDs are equipped with a wireless interface that allows non-invasive monitoring and reprogramming through an external device, also known as device programmer. However, this wireless interface also brings important security and privacy risks that may lead to remote attacks. In t...
متن کاملGame-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags
The term "Internet of Things (IoT)" expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a great technology and an interesting candidate to provide communications for IoT networks, but numerous security and privacy issues need to be considered. In this paper, we analyze the security and ...
متن کاملPerformance Analysis of a Novel Hybrid S-ALOHA/TDMA Protocol for Beta Distributed Massive MTC Access
Simultaneous random access of massive machine type communications (MTC) devices are expected to cause congestion in the radio access network. Not only the performance of MTC, but the coexisting human to human (H2H) communications would also degrade dramatically without an appropriate medium access control (MAC) protocol. However, most existing solutions focus on the random access procedure with...
متن کامل