Special Topics in Security and Privacy of Medical Information. Reminders. Medical device security. Sujata Garera

Size: px
Start display at page:

Download "Special Topics in Security and Privacy of Medical Information. Reminders. Medical device security. Sujata Garera"

Transcription

1 Special Topics in Security and Privacy of Medical Information Sujata Garera Reminders Assignment due today Project part 1 due on next Tuesday Assignment 2 will be online today evening 2nd Discussion session Use pdf format images in slides Medical device security Implantable medical devices Security risks Exploiting devices Design goals for secure devices Communication cloakers 1

2 Medical telemetry infrastructure Work by Halperin et al. Security and privacy properties of an implantable cardioverter defibrillator (ICD) Includes pacemaker technology Communicates wirelessly with external programmer device in 175Khz frequency range Implemented several radio-based attacks Designed zero power defenses based on RF power harvesting Human in the loop Results of study 2

3 Implantable Cardioverter Defibrillator Monitors and responds to heart activity Modes for Pacing: Periodically send small stimulus to heart Defibrillation: Send larger shock to restore normal heart rhythm ICD implantation ICD communications Magnetic switch Magnetic field in proximity to this switch causes it to close ICD wirelessly transmits telemetry data including EKG readings Authors were able to activate transmission of telemetry without the presence of a magnetic field Magnetic field usually comes from magnet in programming head 3

4 ICD communications Wireless communications Wirelessly communicates with an external programmer using 175 Khz band (short range communications) Newer ICDs can also communicate in MHz band Why would longer ranges be beneficial? Security model Adversary with commercial ICD programmer Programmer can be operated by anyone Passive adversary Records RF messages between ICDs and programmers Could use equipment like oscilloscopes, software radios, amplifiers and directional antennas Active adversary with software programmer Generates traffic Create spurious transactions Security model Which type of adversary presents the most risk? 4

5 Equipment used Equipment used Recording oscilloscope Universal Software Radio Peripheral (USRP) Programmable device that interacts with open source GNU Radio libraries on a host PC Equipment used - USRP Single board containing an FPGA for fast signal processing Records signals as complex samples which are interconvertible with the data format used by the oscilloscope. Can sample upto 8Mhz samples/second Reverse engineering Commercial Programmer Reverse Engineer 5

6 Reverse engineering Capture around 175 KHz Process RF traces using Matlab and GNU RF toolchain Analyze bits captured Need to reverse engineer these bits at physical layer Determine the bits that correspond to the raw signals obtained from oscilloscope and USRP Reverse engineering Reverse engineering the physical layer Encoding convert data bits into radio symbols Modulation process of varying one waveform in relation to other waveform Reverse engineering Reverse engineering from the programmer Observed that programmer was transmitting at a different frequency for each symbol state Deduced encoding to be binary frequency shift keying (2-FSK) 150Khz and 200Khz were the frequencies used to represent the two possible states 6

7 Reverse engineering Reverse engineering from the ICD Did not have access to wire carrying raw bits Inserted information into the ICD using a programmer Patient name set to string of A s Analyzed RF signal to identify the respective bits Observed the ICD uses differential binary phase shift keying (DPBSK) Symbols are represented by transmission at the same frequency but opposite phase Phase measures displacement from original point Reverse engineering Reverse engineering the physical layer Decoding demodulated symbols What would you look for? Observed that from ICD and programmer have same encoding Non-Return to Zero Inverted with bit stuffing Zero bits are represented with no change in symbol over one symbol period One bits are represented by a change of symbol state Reverse engineering 7

8 Reverse engineering the Eavesdropping What is the first step when eavesdropping? Eavesdropping Transaction timeline of conversation between ICD programmer and ICD 8

9 Eavesdropping Intercepting Patient Data Capture and reverse engineering showed Do not protect cryptographically Data transmitted in clear include Name DOB Medical ID number History Name and phone number of treating physician Dates of ICD implantation Serial number of ICD Intercepting Telemetry When does telemetry get broadcast? 9

10 Intercepting telemetry Telemetry data broadcast in clear Contain representations of patient s EKG Heart rate and private information about patient s cardiac activity in real time Observed with a known plaintext attack What is this? Active attacks Replay attacks Transmit only attacks over 175 KHz band Start with ICD in known state Replay the in a loop One second to 37.7 seconds Observe ICD state after Active attacks Replay attacks Triggering ICD identification Replay 1.5 second auto identification trace recorded from programmer Disclosed several details about ICD such as model and serial number Disclosing patient data After identification programmer asks ICD for rest of information stored on it including patient data GNU Radio used to replay 26 second capture containing autoidentification and interrogation command ICD disclosed same information as with programmer 10

11 Active attacks Replay attacks Disclosing cardiac data Magnetic field can induce telemetry Replaying the initial part of the interrogatory command can also induce such from the ICD Changing patient name Used GNU radio to replay the trace for changing a patient name Active attacks Replay attacks Setting the ICD s clock Attack succeeded after 10 replays Changing therapies Therapies are ICD responses to cardiac events GNU Radio used to turn of therapies Without therapies ICD does not respond to potentially dangerous cardiac conditions Active attacks Replay attacks Inducing fibrillation ICD has a test mode in which it can induce ventricular fibrillation Introduced a 100 ohm resistor between the ICDs defibrillation ports to measure the voltage during a command shock 1 Joule shock sent using programmer Peak voltage observed is V Replayed command with software radio 30 replay attempts succeeded in causing similar voltage spikes 11

12 Zero power defenses What factors must one consider when incorporating security features in an ICD? Zero power defenses Effective approach should either prevent or deter attacks by malicious outsiders with custom equipment as well as insiders with commercial programmers Security and privacy should draw no power from the battery life Prevent DOS on power Security sensitive events should be effortlessly detectable by the patient Security mechanisms should not introduce failure modes This lecture Based on Pacemakers and Implantable Cardiac Defibrillators: Software Radio attacks and Zero Power Defenses by Halperin et al. available on website. 12

Special Topics in Security and Privacy of Medical Information. Reminders. Last lecture: Recap. Sujata Garera. Project part 1 submission

Special Topics in Security and Privacy of Medical Information. Reminders. Last lecture: Recap. Sujata Garera. Project part 1 submission Special Topics in Security and Privacy of Medical Information Sujata Garera Reminders Project part 1 submission Assignment 2 is online Last lecture: Recap Medical Telemetry Infrastructure Devices capturing

More information

Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses

Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses 2008 IEEE Symposium on Security and Privacy Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses Daniel Halperin University of Washington Thomas S. Heydt-Benjamin

More information

Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses

Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses Daniel Halperin University of Washington Thomas S. Heydt-Benjamin University of Massachusetts Amherst Benjamin

More information

Security and Privacy of Wireless Implantable Medical Devices

Security and Privacy of Wireless Implantable Medical Devices Security and Privacy of Wireless Implantable Medical Devices Security Forum 2013 Hagenberg, 17.04.2013 Dipl.-Ing. Dr. Gregor Koenig Outlook Overview Device Hacking Safety & Utility Goals Security & Privacy

More information

Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses

Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses University of Massachusetts - Amherst ScholarWorks@UMass Amherst Computer Science Department Faculty Publication Series Computer Science 2008 Pacemakers and Implantable Cardiac Defibrillators: Software

More information

Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study

Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study Presenter: Wenyuan Xu Ishtiaq Rouf, Rob Miller, Hossen Mustafa, Travis Taylor, Sangho Oh Wenyuan

More information

2.0 System Description

2.0 System Description 2.0 System Description The wireless alarm system consists of two or more alarm units within a specified range of one another. Each alarm unit employs a radio transceiver, allowing it to communicate with

More information

Department of Electrical and Computer Engineering Ben-Gurion University of the Negev. LAB 1 - Introduction to USRP

Department of Electrical and Computer Engineering Ben-Gurion University of the Negev. LAB 1 - Introduction to USRP Department of Electrical and Computer Engineering Ben-Gurion University of the Negev LAB 1 - Introduction to USRP - 1-1 Introduction In this lab you will use software reconfigurable RF hardware from National

More information

Kevin Fu Associate Professor Security & Privacy Research Lab UMass Amherst Computer Science http://spqr.cs.umass.edu/

Kevin Fu Associate Professor Security & Privacy Research Lab UMass Amherst Computer Science http://spqr.cs.umass.edu/ Security and Privacy for Implantable Medical Devices Kevin Fu Associate Professor Security & Privacy Research Lab UMass Amherst Computer Science http://spqr.cs.umass.edu/ SRC/NSF/SFI Forum on Integrated

More information

Location-Aware and Safer Cards: Enhancing RFID Security and Privacy

Location-Aware and Safer Cards: Enhancing RFID Security and Privacy Location-Aware and Safer Cards: Enhancing RFID Security and Privacy 1 K.Anudeep, 2 Mrs. T.V.Anantha Lakshmi 1 Student, 2 Assistant Professor ECE Department, SRM University, Kattankulathur-603203 1 anudeepnike@gmail.com,

More information

Software Defined Radio

Software Defined Radio Software Defined Radio GNU Radio and the USRP Overview What is Software Defined Radio? Advantages of Software Defined Radio Traditional versus SDR Receivers SDR and the USRP Using GNU Radio Introduction

More information

Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars

Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars Aurélien Francillon, Boris Danev, Srdjan Čapkun 1 Modern Cars Evolution Increasing amount of electronics in cars For convenience

More information

Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars

Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars Srdjan Čapkun (joint work with Aurélien Francillon, Boris Danev) 1 Agenda 1. Overview of Car Key Systems 2. Previous Attacks: In

More information

What Are Arrhythmias?

What Are Arrhythmias? What Are Arrhythmias? Many people have questions about what the word arrhythmia means, and arrhythmias can be a difficult subject to understand. The text below should give you a better understanding of

More information

How To Attack A Key Card With A Keycard With A Car Key (For A Car)

How To Attack A Key Card With A Keycard With A Car Key (For A Car) Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars (NDSS ) Aurélien Francillon, Boris Danev, Srdjan Čapkun (ETHZ) Wednesday System Security April Group 6, 1 Agenda 1. Overview of Car

More information

Study Guide for the Electronics Technician Pre-Employment Examination

Study Guide for the Electronics Technician Pre-Employment Examination Bay Area Rapid Transit District Study Guide for the Electronics Technician Pre-Employment Examination INTRODUCTION The Bay Area Rapid Transit (BART) District makes extensive use of electronics technology

More information

Digital Investigation of Security Attacks on Cardiac Implantable Medical Devices

Digital Investigation of Security Attacks on Cardiac Implantable Medical Devices Digital Investigation of Security Attacks on Cardiac Implantable Medical Devices Nourhene Ellouze Communication Networks and Security Research Lab. University of Carthage, Tunisia. nourhene_ellouze@yahoo.fr

More information

How To Hack An Rdi Credit Card

How To Hack An Rdi Credit Card RFID Payment Card Vulnerabilities Technical Report Thomas S. Heydt-Benjamin 1, Daniel V. Bailey 2, Kevin Fu 1, Ari Juels 2, and Tom O'Hare 3 Abstract 1: University of Massachusetts at Amherst {tshb, kevinfu}@cs.umass.edu

More information

DRM compatible RF Tuner Unit DRT1

DRM compatible RF Tuner Unit DRT1 FEATURES DRM compatible RF Tuner Unit DRT1 High- Performance RF Tuner Frequency Range: 10 KHz to 30 MHz Input ICP3: +13,5dBm, typ. Noise Figure @ full gain: 14dB, typ. Receiver Factor: -0,5dB, typ. Input

More information

REMOTE KEYLESS ENTRY SYSTEM RECEIVER DESIGN

REMOTE KEYLESS ENTRY SYSTEM RECEIVER DESIGN INTRODUCTION: REMOTE KEYLESS ENTRY SYSTEM RECEIVER DESIGN Remote keyless entry (RKE) has captivated automobile buyers, as evidenced by the popularity of RKE on new automobiles and as an aftermarket item.

More information

GnuRadio CONTACT INFORMATION: phone: +1.301.527.1629 fax: +1.301.527.1690 email: whitepaper@hsc.com web: www.hsc.com

GnuRadio CONTACT INFORMATION: phone: +1.301.527.1629 fax: +1.301.527.1690 email: whitepaper@hsc.com web: www.hsc.com GnuRadio CONTACT INFORMATION: phone: +1.301.527.1629 fax: +1.301.527.1690 email: whitepaper@hsc.com web: www.hsc.com PROPRIETARY NOTICE All rights reserved. This publication and its contents are proprietary

More information

Single channel data transceiver module WIZ2-434

Single channel data transceiver module WIZ2-434 Single channel data transceiver module WIZ2-434 Available models: WIZ2-434-RS: data input by RS232 (±12V) logic, 9-15V supply WIZ2-434-RSB: same as above, but in a plastic shell. The WIZ2-434-x modules

More information

SDR Architecture. Introduction. Figure 1.1 SDR Forum High Level Functional Model. Contributed by Lee Pucker, Spectrum Signal Processing

SDR Architecture. Introduction. Figure 1.1 SDR Forum High Level Functional Model. Contributed by Lee Pucker, Spectrum Signal Processing SDR Architecture Contributed by Lee Pucker, Spectrum Signal Processing Introduction Software defined radio (SDR) is an enabling technology, applicable across a wide range of areas within the wireless industry,

More information

How To Understand The Power Of An Freddi Tag (Rfid) System

How To Understand The Power Of An Freddi Tag (Rfid) System Radio Frequency Identification Done by: Haitham Habli. Table of contents Definition of RFID. Do they need license? RFID vs other identification systems. Classification of RFID systems. Emerge of passive

More information

Design of Bidirectional Coupling Circuit for Broadband Power-Line Communications

Design of Bidirectional Coupling Circuit for Broadband Power-Line Communications Journal of Electromagnetic Analysis and Applications, 2012, 4, 162-166 http://dx.doi.org/10.4236/jemaa.2012.44021 Published Online April 2012 (http://www.scirp.org/journal/jemaa) Design of Bidirectional

More information

MODULATION Systems (part 1)

MODULATION Systems (part 1) Technologies and Services on Digital Broadcasting (8) MODULATION Systems (part ) "Technologies and Services of Digital Broadcasting" (in Japanese, ISBN4-339-62-2) is published by CORONA publishing co.,

More information

Tire pressure monitoring

Tire pressure monitoring Application Note AN601 Tire pressure monitoring 1 Purpose This document is intended to give hints on how to use the Intersema pressure sensors in a low cost tire pressure monitoring system (TPMS). 2 Introduction

More information

Introduction. Planned surgical procedures

Introduction. Planned surgical procedures Guidelines for the perioperative management of patients with implantable pacemakers or implantable cardioverter defibrillators, where the use of surgical diathermy/electrocautery is anticipated. Introduction

More information

Lecture 3: Signaling and Clock Recovery. CSE 123: Computer Networks Stefan Savage

Lecture 3: Signaling and Clock Recovery. CSE 123: Computer Networks Stefan Savage Lecture 3: Signaling and Clock Recovery CSE 123: Computer Networks Stefan Savage Last time Protocols and layering Application Presentation Session Transport Network Datalink Physical Application Transport

More information

Using RFID Techniques for a Universal Identification Device

Using RFID Techniques for a Universal Identification Device Using RFID Techniques for a Universal Identification Device Roman Zharinov, Ulia Trifonova, Alexey Gorin Saint-Petersburg State University of Aerospace Instrumentation Saint-Petersburg, Russia {roman,

More information

How To Sell A Talan

How To Sell A Talan The TALAN represents state-of-the-art capability to rapidly and reliably detect and locate illicit tampering and security vulnerabilities on both digital and analog telephone systems. Marketing Characteristics

More information

Note monitors controlled by analog signals CRT monitors are controlled by analog voltage. i. e. the level of analog signal delivered through the

Note monitors controlled by analog signals CRT monitors are controlled by analog voltage. i. e. the level of analog signal delivered through the DVI Interface The outline: The reasons for digital interface of a monitor the transfer from VGA to DVI. DVI v. analog interface. The principles of LCD control through DVI interface. The link between DVI

More information

DAC Digital To Analog Converter

DAC Digital To Analog Converter DAC Digital To Analog Converter DAC Digital To Analog Converter Highlights XMC4000 provides two digital to analog converters. Each can output one analog value. Additional multiple analog waves can be generated

More information

Radio Frequency Identification (RFID)

Radio Frequency Identification (RFID) Radio Frequency Identification (RFID) Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-06/

More information

APPLICATION NOTE GaGe CompuScope 14200-based Lightning Monitoring System

APPLICATION NOTE GaGe CompuScope 14200-based Lightning Monitoring System APPLICATION NOTE GaGe CompuScope 14200-based Lightning Monitoring System Challenge A customer needed to upgrade an older data acquisition unit for a real-time lightning monitoring system. Unlike many lightning

More information

Constructing a precision SWR meter and antenna analyzer. Mike Brink HNF, Design Technologist.

Constructing a precision SWR meter and antenna analyzer. Mike Brink HNF, Design Technologist. Constructing a precision SWR meter and antenna analyzer. Mike Brink HNF, Design Technologist. Abstract. I have been asked to put together a detailed article on a SWR meter. In this article I will deal

More information

AM Radio Field Strength Measurements with Confidence November 2004

AM Radio Field Strength Measurements with Confidence November 2004 AM Radio Field Strength Measurements with Confidence November 2004 Understanding the AM Broadcast signal The AM Broadcast service in the United States and many other countries is implemented in 10 khz

More information

INTRODUCTION TO COMMUNICATION SYSTEMS AND TRANSMISSION MEDIA

INTRODUCTION TO COMMUNICATION SYSTEMS AND TRANSMISSION MEDIA COMM.ENG INTRODUCTION TO COMMUNICATION SYSTEMS AND TRANSMISSION MEDIA 9/6/2014 LECTURES 1 Objectives To give a background on Communication system components and channels (media) A distinction between analogue

More information

Fiber Optic Communications Educational Toolkit

Fiber Optic Communications Educational Toolkit Fiber Optic Communications Educational Toolkit ASEE National Conference Summer 2008 Dr. Akram Abu-aisheh & Dr. Jonathan Hill Introduction The main motive for this work was the need for a low cost laboratory

More information

PCM Encoding and Decoding:

PCM Encoding and Decoding: PCM Encoding and Decoding: Aim: Introduction to PCM encoding and decoding. Introduction: PCM Encoding: The input to the PCM ENCODER module is an analog message. This must be constrained to a defined bandwidth

More information

DKWF121 WF121-A 802.11 B/G/N MODULE EVALUATION BOARD

DKWF121 WF121-A 802.11 B/G/N MODULE EVALUATION BOARD DKWF121 WF121-A 802.11 B/G/N MODULE EVALUATION BOARD PRELIMINARY DATA SHEET Wednesday, 16 May 2012 Version 0.5 Copyright 2000-2012 Bluegiga Technologies All rights reserved. Bluegiga Technologies assumes

More information

DT3: RF On/Off Remote Control Technology. Rodney Singleton Joe Larsen Luis Garcia Rafael Ocampo Mike Moulton Eric Hatch

DT3: RF On/Off Remote Control Technology. Rodney Singleton Joe Larsen Luis Garcia Rafael Ocampo Mike Moulton Eric Hatch DT3: RF On/Off Remote Control Technology Rodney Singleton Joe Larsen Luis Garcia Rafael Ocampo Mike Moulton Eric Hatch Agenda Radio Frequency Overview Frequency Selection Signals Methods Modulation Methods

More information

Wireless Home Security System

Wireless Home Security System Wireless Home Security System Group: D14 Members: Vaibhav Singh (05D07026) Abhishek Tiwari (05D07028) Sauvik Chowdhury (05D07029) 1. Abstract The project is aimed at designing a low cost and reliable wireless

More information

Wireless Transmission of JPEG file using GNU Radio and USRP

Wireless Transmission of JPEG file using GNU Radio and USRP 1 Wireless Transmission of JPEG file using GNU Radio and USRP Sachin Hirve, Saikrishna Gumudavally, Department of Electrical and Computer Engineering, Cleveland State University Abstract Wireless applications

More information

RS - SPM. Serial parallel translator module

RS - SPM. Serial parallel translator module ReSatron GmbH Boisheimer Str. 162 D-41751 Viersen Telefon (+49) 02162-45 06 80 Telefax (+49) 02162-45 03 04 email: info@resatron.de RS - SPM Serial parallel translator module RSSPM000215SPM-021 - Subject

More information

RF Measurements Using a Modular Digitizer

RF Measurements Using a Modular Digitizer RF Measurements Using a Modular Digitizer Modern modular digitizers, like the Spectrum M4i series PCIe digitizers, offer greater bandwidth and higher resolution at any given bandwidth than ever before.

More information

RX-AM4SF Receiver. Pin-out. Connections

RX-AM4SF Receiver. Pin-out. Connections RX-AM4SF Receiver The super-heterodyne receiver RX-AM4SF can provide a RSSI output indicating the amplitude of the received signal: this output can be used to create a field-strength meter capable to indicate

More information

Objectives. Lecture 4. How do computers communicate? How do computers communicate? Local asynchronous communication. How do computers communicate?

Objectives. Lecture 4. How do computers communicate? How do computers communicate? Local asynchronous communication. How do computers communicate? Lecture 4 Continuation of transmission basics Chapter 3, pages 75-96 Dave Novak School of Business University of Vermont Objectives Line coding Modulation AM, FM, Phase Shift Multiplexing FDM, TDM, WDM

More information

RFID Penetration Tests when the truth is stranger than fiction

RFID Penetration Tests when the truth is stranger than fiction RFID Penetration Tests when the truth is stranger than fiction Dr. Tomáš Rosa, tomas.rosa@rb.cz Raiffeisenbank, a.s. Agenda Technology overview Physical layer of LF and HF bands The Unique ID phenomenon

More information

AN1200.04. Application Note: FCC Regulations for ISM Band Devices: 902-928 MHz. FCC Regulations for ISM Band Devices: 902-928 MHz

AN1200.04. Application Note: FCC Regulations for ISM Band Devices: 902-928 MHz. FCC Regulations for ISM Band Devices: 902-928 MHz AN1200.04 Application Note: FCC Regulations for ISM Band Devices: Copyright Semtech 2006 1 of 15 www.semtech.com 1 Table of Contents 1 Table of Contents...2 1.1 Index of Figures...2 1.2 Index of Tables...2

More information

Wireless Encryption Protection

Wireless Encryption Protection Wireless Encryption Protection We re going to jump around a little here and go to something that I really find interesting, how do you secure yourself when you connect to a router. Now first and foremost

More information

VMR6512 Hi-Fi Audio FM Transmitter Module

VMR6512 Hi-Fi Audio FM Transmitter Module General Description VMR6512 is a highly integrated FM audio signal transmitter module. It integrates advanced digital signal processor (DSP), frequency synthesizer RF power amplifier and matching network.

More information

Application Note Receiving HF Signals with a USRP Device Ettus Research

Application Note Receiving HF Signals with a USRP Device Ettus Research Application Note Receiving HF Signals with a USRP Device Ettus Research Introduction The electromagnetic (EM) spectrum between 3 and 30 MHz is commonly referred to as the HF band. Due to the propagation

More information

Energy Efficient Security in Implantable Medical Devices

Energy Efficient Security in Implantable Medical Devices Proceedings of the Federated Conference on Computer Science and Information Systems pp. 773 778 ISBN 978-83-60810-51-4 Energy Efficient Security in Implantable Medical Devices Krzysztof Daniluk Warsaw

More information

Unmatched RF Spectrum Analysis

Unmatched RF Spectrum Analysis Datasheet: AirMagnet Spectrum XT AirMagnet Spectrum XT is the industry s first professional spectrum analyzer solution that combines in-depth RF analysis with real-time WLAN information for quicker and

More information

TIMING SIGNALS, IRIG-B AND PULSES

TIMING SIGNALS, IRIG-B AND PULSES TIMING SIGNALS, IRIG-B AND PULSES Document No. PD0043200B July 2013 Arbiter Systems, Inc. 1324 Vendels Circle, Suite 121 Paso Robles, CA 93446 U.S.A. (805) 237-3831, (800) 321-3831 http://www.arbiter.com

More information

Proximity-based Access Control for Implantable Medical Devices

Proximity-based Access Control for Implantable Medical Devices Proximity-based Access Control for Implantable Medical Devices Kasper B. Rasmussen Dept. of Comp. Science ETH Zurich 8092 Zurich, Switzerland kasperr@inf.ethz.ch Claude Castelluccia INRIA 655, avenue de

More information

Basics of Pacing. Ruth Hickling, RN-BSN Tasha Conley, RN-BSN

Basics of Pacing. Ruth Hickling, RN-BSN Tasha Conley, RN-BSN Basics of Pacing Ruth Hickling, RN-BSN Tasha Conley, RN-BSN The Cardiac Conduction System Cardiac Conduction System Review Normal Conduction Conduction QRS QRS Complex Complex RR PP ST ST segment segment

More information

WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006

WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006 WIRELESS SECURITY Information Security in Systems & Networks Public Development Program Sanjay Goel University at Albany, SUNY Fall 2006 1 Wireless LAN Security Learning Objectives Students should be able

More information

Satellite Telemetry, Tracking and Control Subsystems

Satellite Telemetry, Tracking and Control Subsystems Satellite Telemetry, Tracking and Control Subsystems Col John E. Keesee 1 Overview The telemetry, tracking and control subsystem provides vital communication to and from the spacecraft TT&C is the only

More information

Modification Details.

Modification Details. Front end receiver modification for DRM: AKD Target Communications receiver. Model HF3. Summary. The receiver was modified and capable of receiving DRM, but performance was limited by the phase noise from

More information

Six-defense zone Display Alarm System. User Manual

Six-defense zone Display Alarm System. User Manual Six-defense zone Display Alarm System User Manual Feature 1. Anti-interfere function. When someone interferes it with same frequency, the control unit will activate siren to alarm. 2. Support anti-decode

More information

AND9035/D. BELASIGNA 250 and 300 for Low-Bandwidth Applications APPLICATION NOTE

AND9035/D. BELASIGNA 250 and 300 for Low-Bandwidth Applications APPLICATION NOTE BELASIGNA 250 and 300 for Low-Bandwidth Applications APPLICATION NOTE Introduction This application note describes the use of BELASIGNA 250 and BELASIGNA 300 in low bandwidth applications. The intended

More information

GNU Radio. An introduction. Jesper M. Kristensen Department of Electronic Systems jmk@es.aau.dk. Programmerbare digitale enheder Tuesday 6/3 2007

GNU Radio. An introduction. Jesper M. Kristensen Department of Electronic Systems jmk@es.aau.dk. Programmerbare digitale enheder Tuesday 6/3 2007 GNU Radio An introduction Jesper M. Kristensen Department of Electronic Systems jmk@es.aau.dk Programmerbare digitale enheder Tuesday 6/3 2007 Programmerbare digitale enheder GNU Radio 1 / 36 Outline Introduction

More information

CLINICIAN MANUAL. LATITUDE Patient Management System

CLINICIAN MANUAL. LATITUDE Patient Management System CLINICIAN MANUAL LATITUDE Patient Management System CAUTION: Federal law restricts this device to sale by or on the order of a physician trained or experienced in device implant and follow-up procedures.

More information

RDF1. RF Receiver Decoder. Features. Applications. Description. Ordering Information. Part Number Description Packages available

RDF1. RF Receiver Decoder. Features. Applications. Description. Ordering Information. Part Number Description Packages available RDF1 RF Receiver Decoder Features Complete FM Receiver and Decoder. Small Form Factor Range up to 200 Metres* Easy Learn Transmitter Feature. Learns 40 transmitter Switches 4 Digital and 1 Serial Data

More information

Elettronica dei Sistemi Digitali Costantino Giaconia SERIAL I/O COMMON PROTOCOLS

Elettronica dei Sistemi Digitali Costantino Giaconia SERIAL I/O COMMON PROTOCOLS SERIAL I/O COMMON PROTOCOLS RS-232 Fundamentals What is RS-232 RS-232 is a popular communications interface for connecting modems and data acquisition devices (i.e. GPS receivers, electronic balances,

More information

Intelligent Fleet Management System Using Active RFID

Intelligent Fleet Management System Using Active RFID Intelligent Fleet Management System Using Active RFID Ms. Rajeshri Prakash Mane 1 1 Student, Department of Electronics and Telecommunication Engineering, Rajarambapu Institute of Technology, Rajaramnagar,

More information

Design and Certification of ASH Radio Systems for Japan

Design and Certification of ASH Radio Systems for Japan Design and Certification of ASH Radio Systems for Japan RFM s second-generation ASH radio hybrids are being used in a wide variety of applications in Japan, operating under the Japanese BIJAKU radio regulations.

More information

Higher National Unit Specification. General information for centres. Transmission of Measurement Signals. Unit code: DX4T 35

Higher National Unit Specification. General information for centres. Transmission of Measurement Signals. Unit code: DX4T 35 Higher National Unit Specification General information for centres Unit title: Transmission of Measurement Signals Unit code: DX4T 35 Unit purpose: This Unit is designed to enable candidates to gain knowledge

More information

AFG-100/200 series USB Modular Arbitrary Function Generator. Date: Oct, 2014

AFG-100/200 series USB Modular Arbitrary Function Generator. Date: Oct, 2014 AFG-100/200 series USB Modular Arbitrary Function Generator Date: Oct, 2014 Outline Product Overview Feature, Advantage and Benefit Comparison Chart Ordering Information 22 Product information AFG-125,

More information

THE BCS PROFESSIONAL EXAMINATIONS BCS Level 5 Diploma in IT. October 2009 EXAMINERS' REPORT. Computer Networks

THE BCS PROFESSIONAL EXAMINATIONS BCS Level 5 Diploma in IT. October 2009 EXAMINERS' REPORT. Computer Networks THE BCS PROFESSIONAL EXAMINATIONS BCS Level 5 Diploma in IT October 2009 EXAMINERS' REPORT Computer Networks General Comments The responses to questions were of marginally better quality than April 2009

More information

The Answer to the 14 Most Frequently Asked Modbus Questions

The Answer to the 14 Most Frequently Asked Modbus Questions Modbus Frequently Asked Questions WP-34-REV0-0609-1/7 The Answer to the 14 Most Frequently Asked Modbus Questions Exactly what is Modbus? Modbus is an open serial communications protocol widely used in

More information

HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper

HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper Rev 1.0 HIPAA Security Considerations for Broadband Fixed Wireless Access Systems This white paper will investigate

More information

Wireless Medical Telemetry Laboratory

Wireless Medical Telemetry Laboratory Wireless Medical Telemetry Laboratory 0 Introduction The development of wireless medical telemetry has become an increasingly popular application in recent years. As the elderly population continues to

More information

Using ISO 15693 Compliant RFID Tags in an Inventory Control System

Using ISO 15693 Compliant RFID Tags in an Inventory Control System Using ISO 15693 Compliant RFID Tags in an Inventory Control System University: Louisiana State University, Baton Rouge, Louisiana Course: Undergraduate Capstone Project Student Team Members: Joseph Gates,

More information

TECHNICAL TBR 12 BASIS for December 1993 REGULATION

TECHNICAL TBR 12 BASIS for December 1993 REGULATION TECHNICAL TBR 12 BASIS for December 1993 REGULATION Source: ETSI TC-BT Reference: DTBR/BT-02036 ICS: 33.040.40 Key words: ONP, leased lines, D2048U Business Telecommunications (BT); Open Network Provision

More information

Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, 2006. Developed by: Smart Card Alliance Identity Council

Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, 2006. Developed by: Smart Card Alliance Identity Council Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions July, 2006 Developed by: Smart Card Alliance Identity Council Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked

More information

Electronic Access Control Security. Matteo Beccaro HackInTheBox Amsterdam, May 27 th, 2016

Electronic Access Control Security. Matteo Beccaro HackInTheBox Amsterdam, May 27 th, 2016 Electronic Access Control Security Matteo Beccaro HackInTheBox Amsterdam, May 27 th, 2016 Me Matteo Beccaro Founder & Chief Technology Officer at Opposing Force The first Italian company specialize in

More information

Revision of Lecture Eighteen

Revision of Lecture Eighteen Revision of Lecture Eighteen Previous lecture has discussed equalisation using Viterbi algorithm: Note similarity with channel decoding using maximum likelihood sequence estimation principle It also discusses

More information

Security in Ad Hoc Network

Security in Ad Hoc Network Security in Ad Hoc Network Bingwen He Joakim Hägglund Qing Gu Abstract Security in wireless network is becoming more and more important while the using of mobile equipments such as cellular phones or laptops

More information

How To Get A Phone In The United States

How To Get A Phone In The United States Telephone Systems COMP476 Home Telephones Plain Old Telephone Service (POTS) provides a twisted pair connection from your phone to the central office. You own your home wiring and the telephone company

More information

New CPT Codes for Cardiac Device Monitoring SIDE-BY-SIDE COMPARISON 2008-2009

New CPT Codes for Cardiac Device Monitoring SIDE-BY-SIDE COMPARISON 2008-2009 New CPT Codes for Cardiac Device Monitoring SIDE-BY-SIDE COMPARISON 2008-2009 Effective January 1, 2009 NEW CPT 1 CODES FOR CARDIAC DEVICE MONITORING Twenty-three new CPT codes for Cardiac Device Monitoring

More information

Appendix C GSM System and Modulation Description

Appendix C GSM System and Modulation Description C1 Appendix C GSM System and Modulation Description C1. Parameters included in the modelling In the modelling the number of mobiles and their positioning with respect to the wired device needs to be taken

More information

Product Datasheet P1110 915 MHz RF Powerharvester Receiver

Product Datasheet P1110 915 MHz RF Powerharvester Receiver DESCRIPTION The Powercast P1110 Powerharvester receiver is an RF energy harvesting device that converts RF to DC. Housed in a compact SMD package, the P1110 receiver provides RF energy harvesting and power

More information

Cardiac Conduction System (1) ECG (Electrocardiogram) Cardiac Conduction System (2) The ECG (1) The ECG (1) The ECG (1) Achmad Rizal BioSPIN

Cardiac Conduction System (1) ECG (Electrocardiogram) Cardiac Conduction System (2) The ECG (1) The ECG (1) The ECG (1) Achmad Rizal BioSPIN ECG (Electrocardiogram) Cardiac Conduction System (1) Achmad Rizal BioSPIN ARL-EL4703-Instrumentasi Biomedis 2 Cardiac Conduction System (2) The ECG (1) ARL-EL4703-Instrumentasi Biomedis 3 ARL-EL4703-Instrumentasi

More information

INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG ITMC TECH TIP ROB COONCE, MARCH 2008

INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG ITMC TECH TIP ROB COONCE, MARCH 2008 INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG What is wireless technology? ITMC TECH TIP ROB COONCE, MARCH 2008 In our world today, this may mean sitting down at a coffee

More information

Spectrum Analyzer Two models available: OGR-24 (24 GHz) and OGR-8 (8 GHz)

Spectrum Analyzer Two models available: OGR-24 (24 GHz) and OGR-8 (8 GHz) Whip antenna extension connector Auto Switching (utilizes 5 independent antennas) Green ADVANTAGES OSCOR FAST SWEEP TIME Headphone Jack 24 GHz IN LESS THAN 1 SECOND (depending on model) COMPLETE PACKAGE

More information

Remote control circuitry via mobile phones and SMS

Remote control circuitry via mobile phones and SMS Remote control circuitry via mobile phones and SMS Gunther Zielosko 1. Introduction In application note No. 56 ( BASIC-Tiger sends text messages, in which we described a BASIC-Tiger sending text messages

More information

TECHNICAL TBR 14 BASIS for April 1994 REGULATION

TECHNICAL TBR 14 BASIS for April 1994 REGULATION TECHNICAL TBR 14 BASIS for April 1994 REGULATION Source: ETSI TC-BTC Reference: DTBR/BTC-02038 ICS: 33.040.40 Key words: ONP, leased line Business TeleCommunications (BTC); 64 kbit/s digital unrestricted

More information

RADIUS. Brief brochure. Product Purpose

RADIUS. Brief brochure. Product Purpose Product Purpose The Product is designed for searching, intercepting, registering and analyzing of communication sessions as well as service information circulating in cellular GSM networks without encryption

More information

Computer Networks and Internets, 5e Chapter 6 Information Sources and Signals. Introduction

Computer Networks and Internets, 5e Chapter 6 Information Sources and Signals. Introduction Computer Networks and Internets, 5e Chapter 6 Information Sources and Signals Modified from the lecture slides of Lami Kaya (LKaya@ieee.org) for use CECS 474, Fall 2008. 2009 Pearson Education Inc., Upper

More information

Android based Alcohol detection system using Bluetooth technology

Android based Alcohol detection system using Bluetooth technology For more Project details visit: http://www.projectsof8051.com/android-based-alcohol-detection-system-usingbluetooth-technology/ Code 1435 Project Title Android based Alcohol detection system using Bluetooth

More information

Spectrum Analyzer Two models available: OGR-24 (24 GHz) and OGR-8 (8 GHz)

Spectrum Analyzer Two models available: OGR-24 (24 GHz) and OGR-8 (8 GHz) TM Spectrum Analyzer Two models available: OGR-24 (24 GHz) and OGR-8 (8 GHz) U.S. PATENTS: 6,397,154; 7,058,530 Additional Patents Pending Whip antenna extension connector Auto Switching Antenna Panel

More information

RECOMMENDATION ITU-R F.1113. (Question ITU-R 157/9) b) that systems using this mode of propagation are already in service for burst data transmission,

RECOMMENDATION ITU-R F.1113. (Question ITU-R 157/9) b) that systems using this mode of propagation are already in service for burst data transmission, Rec. ITU-R F.1113 1 RECOMMENDATION ITU-R F.1113 RADIO SYSTEMS EMPLOYING METEOR-BURST PROPAGATION (Question ITU-R 157/9) (1994) Rec. ITU-R F.1113 The ITU Radiocommunication Assembly, considering a) that

More information

Electronic Communications Committee (ECC) within the European Conference of Postal and Telecommunications Administrations (CEPT)

Electronic Communications Committee (ECC) within the European Conference of Postal and Telecommunications Administrations (CEPT) Electronic Communications Committee (ECC) within the European Conference of Postal and Telecommunications Administrations (CEPT) COMPATIBILITY BETWEEN INDUCTIVE LF AND HF RFID TRANSPONDER AND OTHER RADIO

More information

RFID BASED VEHICLE TRACKING SYSTEM

RFID BASED VEHICLE TRACKING SYSTEM RFID BASED VEHICLE TRACKING SYSTEM Operating a managed, busy parking lot can pose significant challenges, especially to a government organization that also owns some of the vehicles in the lot. The parking

More information

Flexible Active Shutter Control Interface using the MC1323x

Flexible Active Shutter Control Interface using the MC1323x Freescale Semiconductor Document Number: AN4353 Application Note Rev. 0, 9/2011 Flexible Active Shutter Control Interface using the MC1323x by: Dennis Lui Freescale Hong Kong 1 Introduction This application

More information

Hello viewers, welcome to today s lecture on cellular telephone systems.

Hello viewers, welcome to today s lecture on cellular telephone systems. Data Communications Prof. A. Pal Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture minus 31 Cellular Telephone Systems Hello viewers, welcome to today s lecture

More information