applications of secure location sensing in healthcare
play

Applications of Secure Location Sensing in Healthcare Michael - PowerPoint PPT Presentation

Applications of Secure Location Sensing in Healthcare Michael Rushanan, David Russell, Aviel D. Rubin Johns Hopkins University Introduction Healthcare Application Benefit patient care, delivery, and safety Protect sensitive patient


  1. Applications of Secure Location Sensing in Healthcare Michael Rushanan, David Russell, Aviel D. Rubin Johns Hopkins University

  2. Introduction • Healthcare Application • Benefit patient care, delivery, and safety • Protect sensitive patient data • Tracking and managing assets in real-time • Access Control • Barcode medication administration system

  3. Real-time Tracking • Tracking and managing assets in real-time • Hospitals • 1/3 Nurses spend at least 1hr/shift • 35,000 Units; 32-48% Being used • $4,000 equipment per bed

  4. Problem • Tracking needs to be secure • Resilient to passive and active attacks Passive Adversary Backend Server Tracker Asset Position

  5. Problem • Tracking needs to be secure • Resilient to passive and active attacks Active Adversary Backend Server Tracker Asset Position

  6. BCMA • Scan barcodes on patients and medications • Improve patient safety by reducing human error • Electronic information integration • Interface with electronic medical records

  7. Problem • Scanning considered impractical • Koppel et al. identify 31 unique causes that influence workarounds • Malfunctioning scanner • Unreadable wristbands • Wrong administration of medication

  8. Access Control • Electronic medical records • Require access all the time Mike’s Personal • Mobile device Medical Record Height: x • BYOD or Hospital asset Weight: x Sex: Male Diseases: x, y, z • Single-factor History: 1. Something happened. 2. Something else. • Password or pin Doctor Notes: He’s cool.

  9. Problem • Attacker can bypass this access control • All the data stored no the device is compromised Mike’s Personal Medical Record Active Adversary

  10. Solution • Implement secure real-time tracking system • Secure against active and passive attacks • Implement other applications: • Location-based restrictions • BCMA with physical proximity

  11. Outline • We will discuss: • Common architecture • Secure real-time tracking system • Location-based access restrictions

  12. Common Architecture • We need a physical device that is: • Simple (computation, space) • Wireless • Efficient (i.e., run on battery) • Low-cost • Trusted central server

  13. BLE Beacons 13

  14. Apple iBeacon • Low-cost device • Bluetooth Low Energy (BLE) • Unidirectional • Computes distance via RSSI • Intended for advertising • “Spoofing” as a feature 14

  15. iBeacon Gamestop Target Kroger Beacon Beacon Beacon Advertisement Not in range. Not in range. Welcome to Target Coupon

  16. Other Technologies • RFID is expensive • Infrastructure (i.e., ingress and egress antennas) • Hospital RF policies • GPS doesn't work well indoors

  17. Other Technologies • Wi-Fi is bi-directional Access Access Access Point Point Point • Introduces complexity • Consumes more power • Larger attack surface 17

  18. iBeacon Problem • iBeacon specification is not secure Gamestop Kroger Beacon Beacon Beacon Advertisement Not in range. Not in range. Welcome to Target Coupon 18

  19. Introducing Beacon+ • Modify iBeacon specification • Add an AES CBC-MAC (i.e., authentication) • Secret key assigned a priori to deployment • Monotonically increasing sequence number • To handle clock skew 19

  20. Crypto Primer • Message Authentication Code • Short piece of information • Authenticates a message • Message came from state sender • Has not changed • Secret key needed to compute MAC

  21. Beacon+ 21

  22. Initialization • Beacon+ on initialization: • ID • Sequence Number • Secret • Location 22

  23. Design • Every second, Beacon+: • Increments sequence number • Computes new MAC • MAC sent to BLE BoosterPack via UART at a regular interval (i.e., 8x per second) • Replace previous advertisement 23

  24. Advertisements BLE(Adver-sement(Payload( 31(bytes( Reserved((4(bytes)( UserQDefined(Data((27(bytes)(( Ad(Structure(1( Ad(Structure(2( Size( BLE(Flags( Size( UUID( Major( Minor( TX(Power( Unused( (1(byte)( (2(bytes)( (1(byte)( (16(bytes)( (2(bytes)( (2(bytes)( (1(byte)( (1(byte)( iBeacon(Adver-sement( Reserved((4(bytes)( UserQDefined(Data((27(bytes)(( Ad(Structure(1( Ad(Structure(2( Size( BLE(Flags( Size( TX(Power( ID( Sequence(Number( MAC( (1(byte)( (2(bytes)( (1(byte)( (1(byte)( (2(bytes)( (8(bytes)( (16(bytes)( Beacon+(Adver-sement( 24

  25. Communication 2 I am 2 BLE Trusted Server WIFI Tracking 1 3 I am 1 I am 3

  26. Communication b2 r2 b1 r X 1 r3 X r1 b3 r2 b1 b2

  27. Real-time Tracking • Beacon+’s are fixed at physical locations • Tracked BLE-speaking devices collect • Authenticated advertisements • RSSI • Beacon+’s data is shared with the trusted server 27

  28. Real-time Tracking Backend Server Beacon+ Beacon+ Smartphone Beacon+ Medical Device Beacon+ Data Collector Beacon+ Beacon+ Unidirectional Multidirectional wireless broadcast communication 28

  29. Access Control • Bypass or breaks traditional access control • Password • Location-based access restrictions • Restrict access to data based on location • Another factor of authentication 29

  30. Beacon+ Nearby Patient Records Smith, John Doe, Jane Claus, Nicholas Roberts, Alice ID: 0004 Name: Roberts, Alice Address: 1056 Mountain Dr. Sex: Female DOB: 11/5/1967 History: N/A Therapy: Electroshock Medication: N/A Doctor: Dr. Evil Notes: None 30

  31. Criticisms of Beacon+ • Access control • Need access to data immediately • Location verification issues • Inside attacker can modify RSSI to fake location • Proxy received signals • Trusted server 31

  32. No Central Trusted Authority Beacon+ Beacon+ Certificate Authority Smartphone Beacon+ Map Authority signed(ids, locations) Medical Device Beacon+ Tracking & Location-based Access Queries Beacon+ Beacon+ 32

  33. Summary • Described common architecture • Beacon+ • Discussed location sensing applications • Benefit patient safety • Addressed some criticisms 33

  34. Questions Thank you for attending my talk! 34

  35. Backup Slides

  36. Trilateration

  37. No Central Trusted Authority Setup A hash chain is the S={0,1} 256 successive application of a hash function to a piece of data. ID={0,1} 128 Its used to produce many one-time keys H N =H N (s) from a single key or password. sig{ } ID H N C={ } ID H N sig 37

  38. No Central Trusted Authority [Sender] Beacon+ S { i ID C M k i = H N-i ( ) S tag i =MAC(M, H N-(i+1) ( )) S 38

  39. No Central Trusted Authority [Sender] Beacon+ [Verifier] Phone Check time At time ,send M and i tag i Verify At time ,send M and j tag j C H j ( ) =? k j H N 39

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend