Skip to Content

Encrypted Heartbeats Keep Hackers from Medical Implants

A way to secure implanted devices requires anyone trying to reprogram your defibrillator to touch you first.
September 16, 2013

Implanted medical devices like defibrillators and insulin pumps now include wireless connections to let doctors or technicians update software or download data—but such improvements could open the door to life-threatening wireless attacks.

Security researchers have shown that they can surreptitiously reprogram an implanted defibrillator to stay inactive despite a cardiac emergency, deliver a 700-volt jolt when not required, or drain its battery.

A solution from researchers at Rice University and the security company RSA uses a heartbeat reading as a way to confirm that whoever is trying to reprogram or download data from a device is in direct contact with the patient and is not a remote hacker. This fix could work, the researchers say, even in emergency situations where no delay can be tolerated.

Using the new method, a doctor holds a device against the patient’s body, and takes a direct reading of the heartbeat. The device reads the patient’s heartbeat and compares it to one relayed in a wireless signal from the implant, and then confirms that the signals match. The wireless exchange of the heartbeat signal is encrypted, thwarting any attempt to hijack the communications during the exchange.

“This addresses a serious problem that has few existing solutions,” says Shane Clark, a research scientist at BBN Technologies and a former grad student in the lab of Kevin Fu, a leading medical device security researcher who is now at the University of Michigan (see “Innovators Under 35: Kevin Fu”). “Given the unique constraints that implantable medical devices face, it is important to tailor security approaches specifically for them, and that’s what this technology does.”

Clark says the solution avoids making things too cumbersome for a doctor or paramedic to access the device in an emergency. They would not, for example, need to individually authenticate themselves with a password, for example, or confirm a patient’s identity. Such traditional approaches “have the potential to endanger the lives of patients in an emergency situation where authentication fails,” Clark says. 

While various research efforts show that a person’s heartbeat can be used as a biometric identifier, this one only seeks to ensure that two devices are listening to the same thing at the same time. A future emergency responder wouldn’t need to know the identity of a heart-attack victim, for example, before gaining access and downloading information from the victim’s implanted device. “The heart is very conveniently producing this stream of random bits, and we tap into the stream of bits and make sure we are getting the same signal at the same time,” says Ari Juels, chief scientist at RSA Laboratories in Cambridge, Massachusetts, and a co-author of the paper.  (In particular, it simply looks at the pause between beats to find a match.) “Our approach doesn’t rely on a registration of a biometric—all it does is check that the signals are identical.”

But the encryption step is important, he says.  This prevents a theoretical attacker in, say, a hospital or a battlefield setting from hijacking the signal in order to issue malicious instructions. In addition, “the fact that you are reading a random changing symbol means the attacker can’t profile the heartbeat at one time and use the information later to attack the device,” he adds.

Right now, doctors or medical device makers will use wireless communication to update software on the device, and to download information about events (such as about heart-shocks or the timing of insulin doses issued) without requiring surgery.

But it’s a system based on trust, says Masoud Rostami, a PhD candidate at Rice who co-wrote the paper on the heartbeat method. “Unfortunately, manufacturers have not implemented any security mechanisms in [implanted medical devices]. They didn’t or couldn’t even use simple passwords, since they rightfully fear that the password can be lost or stolen.”

Right now, paramedics don’t generally interact with implanted devices. But in the future, it might be valuable for them to have the ability to download data from implanted devices in order to diagnose a condition in an emergency. 

However, implementing any changes would take a long time, due to the need for U.S. Food and Drug Administration approval.  “Given the long product lifecycles, it would probably take years to reach the market even if a manufacturer wanted to start implementing it today,” Clark says.

Keep Reading

Most Popular

DeepMind’s cofounder: Generative AI is just a phase. What’s next is interactive AI.

“This is a profound moment in the history of technology,” says Mustafa Suleyman.

What to know about this autumn’s covid vaccines

New variants will pose a challenge, but early signs suggest the shots will still boost antibody responses.

Human-plus-AI solutions mitigate security threats

With the right human oversight, emerging technologies like artificial intelligence can help keep business and customer data secure

Next slide, please: A brief history of the corporate presentation

From million-dollar slide shows to Steve Jobs’s introduction of the iPhone, a bit of show business never hurt plain old business.

Stay connected

Illustration by Rose Wong

Get the latest updates from
MIT Technology Review

Discover special offers, top stories, upcoming events, and more.

Thank you for submitting your email!

Explore more newsletters

It looks like something went wrong.

We’re having trouble saving your preferences. Try refreshing this page and updating them one more time. If you continue to get this message, reach out to us at with a list of newsletters you’d like to receive.