{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T05:21:04Z","timestamp":1761110464525,"version":"build-2065373602"},"reference-count":32,"publisher":"MDPI AG","issue":"9","license":[{"start":{"date-parts":[[2019,9,3]],"date-time":"2019-09-03T00:00:00Z","timestamp":1567468800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/100010665","name":"H2020 Marie Sk\u0142odowska-Curie Actions","doi-asserted-by":"publisher","award":["675353"],"award-info":[{"award-number":["675353"]}],"id":[{"id":"10.13039\/100010665","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Entropy"],"abstract":"<jats:p>The next generation of implanted medical devices is expected to be wireless, bringing along new security threats. Thus, it is critical to secure the communication between legitimate nodes inside the body from a possible eavesdropper. This work assesses the feasibility of securing next generation multi-nodal leadless cardiac pacemakers using physical layer security methods. The secure communication rate without leakage of information to an eavesdropper, referred to as secrecy capacity, depends on the signal-to-noise ratios (SNRs) of the eavesdropper and legitimate channels and will be used as a performance metric. Numerical electromagnetic simulations are utilized to compute the wireless channel models for the respective links. These channel models can be approximated with a log-normal distribution which can be used to evaluate the probability of positive secrecy capacity and the outage probability of this secrecy capacity. The channels are modeled for three different frequency bands and a comparison between their secrecy capacities is provided with respect to the eavesdropper distance. It has been found that the positive secrecy capacity is achievable within the personal space of the human body for all the frequency bands, with the medical implant communication systems (MICS) band outperforming others.<\/jats:p>","DOI":"10.3390\/e21090858","type":"journal-article","created":{"date-parts":[[2019,9,3]],"date-time":"2019-09-03T03:06:14Z","timestamp":1567479974000},"page":"858","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Evaluating Secrecy Capacity for In-Body Wireless Channels"],"prefix":"10.3390","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2783-8167","authenticated-orcid":false,"given":"Muhammad Faheem","family":"Awan","sequence":"first","affiliation":[{"name":"Department of Electronic Systems, Norwegian University of Science and Technology, NTNU, NO-7491 Trondheim, Norway"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5800-2920","authenticated-orcid":false,"given":"Xiao","family":"Fang","sequence":"additional","affiliation":[{"name":"Chair of RF and Photonics Engineering, Technische Universit\u00e4t Dresden, 01067 Dresden, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7826-8099","authenticated-orcid":false,"given":"Mehrab","family":"Ramzan","sequence":"additional","affiliation":[{"name":"Chair of RF and Photonics Engineering, Technische Universit\u00e4t Dresden, 01067 Dresden, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9112-5890","authenticated-orcid":false,"given":"Niels","family":"Neumann","sequence":"additional","affiliation":[{"name":"Chair of RF and Photonics Engineering, Technische Universit\u00e4t Dresden, 01067 Dresden, Germany"}]},{"given":"Qiong","family":"Wang","sequence":"additional","affiliation":[{"name":"Chair of RF and Photonics Engineering, Technische Universit\u00e4t Dresden, 01067 Dresden, Germany"}]},{"given":"Dirk","family":"Plettemeier","sequence":"additional","affiliation":[{"name":"Chair of RF and Photonics Engineering, Technische Universit\u00e4t Dresden, 01067 Dresden, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7702-7143","authenticated-orcid":false,"given":"Kimmo","family":"Kansanen","sequence":"additional","affiliation":[{"name":"Department of Electronic Systems, Norwegian University of Science and Technology, NTNU, NO-7491 Trondheim, Norway"}]}],"member":"1968","published-online":{"date-parts":[[2019,9,3]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"1013","DOI":"10.1111\/j.1540-8159.2011.03150.x","article-title":"The 11th world survey of cardiac pacing and implantable cardioverter- defibrillators: Calendar year 2009\u2014A world society of Arrhythmia\u2019s project","volume":"34","author":"Mond","year":"2011","journal-title":"Pacing Clin. Electrophysiol."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Awan, M.F., and Kansanen, K. (2019). Estimating eavesdropping risk for next generation implants. Advances in Body Area Networks I, Springer.","DOI":"10.1007\/978-3-030-02819-0_29"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Chorti, A., Perlaza, S.M., Han, Z., and Poor, H.V. (2012, January 3\u20137). Physical layer security in wireless networks with passive and active eavesdroppers. Proceedings of the 2012 IEEE Global Communications Conference (GLOBECOM), Anaheim, CA, USA.","DOI":"10.1109\/GLOCOM.2012.6503890"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Halperin, D., Heydt-Benjamin, T.S., Ransford, B., Clark, S.S., Defend, B., Morgan, W., Fu, K., Kohno, T., and Maisel, W.H. (2008, January 18\u201321). Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses. Proceedings of the 2008 IEEE Symposium on Security and Privacy (sp 2008), Oakland, CA, USA.","DOI":"10.1109\/SP.2008.31"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"272","DOI":"10.1016\/j.jbi.2015.04.007","article-title":"Security and privacy issues in implantable medical devices: A comprehensive survey","volume":"55","author":"Camara","year":"2015","journal-title":"J. Biomed. Inform."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"871","DOI":"10.1109\/TBCAS.2013.2245664","article-title":"MedMon: Securing medical devices through wireless monitoring and anomaly detection","volume":"7","author":"Zhang","year":"2013","journal-title":"IEEE Trans. Biomed. Circuits Syst."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Son, S., Lee, K., Won, D., and Kim, S. (2010, January 18\u201321). U-healthcare system protecting privacy based on cloaker. Proceedings of the 2010 IEEE International Conference on Bioinformatics and Biomedicine Workshops (BIBMW), Hong Kong, China.","DOI":"10.1109\/BIBMW.2010.5703838"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1145\/2043164.2018438","article-title":"They can hear your heartbeats: Non-invasive security for implantable medical devices","volume":"41","author":"Gollakota","year":"2011","journal-title":"ACM SIGCOMM Comp. Commun. Rev."},{"key":"ref_9","unstructured":"PTC (2011). Meeting International Standards for Medical Device Reliability and Risk Management, The Product Development Company (PTC). Available online: https:\/\/3hti.com\/wp-content\/uploads\/documents\/Medical-Device-Reliability-White-Paper.pdf."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Fries, R.C. (2016). Reliable Design of Medical Devices, CRC Press.","DOI":"10.1201\/b12511"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","article-title":"Communication theory of secrecy systems","volume":"28","author":"Shannon","year":"1949","journal-title":"Bell Labs Tech. J."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"1355","DOI":"10.1002\/j.1538-7305.1975.tb02040.x","article-title":"The wire-tap channel","volume":"54","author":"Wyner","year":"1975","journal-title":"Bell Labs Tech. J."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"2515","DOI":"10.1109\/TIT.2008.921908","article-title":"Wireless information-theoretic security","volume":"54","author":"Bloch","year":"2008","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"2734","DOI":"10.1109\/COMST.2018.2865607","article-title":"A comprehensive survey on cooperative relaying and jamming strategies for physical layer security","volume":"21","author":"Jameel","year":"2018","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"7225","DOI":"10.1109\/TVT.2019.2913934","article-title":"Secrecy Analysis in Wireless Network with Passive Eavesdroppers by Using Partial Cooperation","volume":"68","author":"Atallah","year":"2019","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"2702","DOI":"10.1109\/COMST.2019.2910750","article-title":"Demystifying IoT security: An exhaustive survey on IoT vulnerabilities and a first empirical look on internet-scale IoT exploitations","volume":"21","author":"Neshenko","year":"2019","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Awan, M.F., Kansanen, K., Perez-Simbor, S., Garcia-Pardo, C., Castell\u00f3-Palacios, S., and Cardona, N. (2019, January 8\u201310). RSS-Based Secret Key Generation in Wireless In-body Networks. Proceedings of the 2019 13th International Symposium on Medical Information and Communication Technology (ISMICT), Oslo, Norway.","DOI":"10.1109\/ISMICT.2019.8743933"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"355","DOI":"10.1561\/0100000036","article-title":"Information theoretic security","volume":"5","author":"Liang","year":"2009","journal-title":"Found. Trends Commun. Inf. Theory"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Awan, M., Perez-Simbor, S., Garcia-Pardo, C., Kansanen, K., and Cardona, N. (2018). Experimental Phantom-Based Security Analysis for Next-Generation Leadless Cardiac Pacemakers. Sensors, 18.","DOI":"10.3390\/s18124327"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Awan, M.F., Perez-Simbor, S., Garcia-Pardo, C., Kansanen, K., Bose, P., Castell\u00f3-Palacios, S., and Cardona, N. (2018, January 9\u201312). Experimental phantom-based evaluation of Physical Layer Security for Future Leadless Cardiac Pacemaker. Proceedings of the 2018 IEEE 29th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), Bologna, Italy.","DOI":"10.1109\/PIMRC.2018.8580808"},{"key":"ref_21","first-page":"64289","article-title":"CST-Computer Simulation Technology","volume":"19","author":"Studio","year":"2008","journal-title":"Bad Nuheimer Str."},{"key":"ref_22","unstructured":"(2019, September 02). ANSYS-HFSS. Available online: https:\/\/www.ansys.com\/products\/electronics\/ansys-hfss."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Garcia-Pardo, C., Fornes-Leal, A., Cardona, N., Ch\u00e1vez-Santiago, R., Bergsland, J., Balasingham, I., Brovoll, S., Aardal, \u00d8., Hamran, S.E., and Palomar, R. (2016, January 4\u20137). Experimental ultra wideband path loss models for implant communications. Proceedings of the IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), Valencia, Spainv.","DOI":"10.1109\/PIMRC.2016.7794780"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Garcia-Pardo, C., Ch\u00e1vez-Santiago, R., Cardona, N., and Balasingham, I. (2015, January 25\u201329). Experimental UWB frequency analysis for implant communications. Proceedings of the 37th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC), Milano, Italy.","DOI":"10.1109\/EMBC.2015.7319626"},{"key":"ref_25","first-page":"930","article-title":"Experimental path loss models for in-body communications within 2.36\u20132.5 GHz","volume":"19","author":"Vermeeren","year":"2015","journal-title":"IEEE J. Biomed. Health Inform."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Kadel, R., and Islam, N. (2018, January 21\u201322). Comparison of Channel Models for Wireless Body Area Networks (WBANs). Proceedings of the 2018 IEEE Conference on Wireless Sensors (ICWiSe), Langkawi, Malaysia.","DOI":"10.1109\/ICWISE.2018.8633288"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"451","DOI":"10.1109\/TIT.1978.1055917","article-title":"The Gaussian wire-tap channel","volume":"24","author":"Hellman","year":"1978","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"28889","DOI":"10.3390\/s151128889","article-title":"Power approaches for implantable medical devices","volume":"15","author":"Amar","year":"2015","journal-title":"Sensors"},{"key":"ref_29","unstructured":"Liu, X. (2012, January 8\u201310). Secrecy capacity of wireless links subject to log-normal fading. Proceedings of the 7th International Conference on Communications and Networking in China (CHINACOM), Kunming, China."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"188","DOI":"10.1016\/j.icte.2016.08.010","article-title":"Review of medical implant communication system (MICS) band and network","volume":"2","author":"Islam","year":"2016","journal-title":"Ict Express"},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Wang, J., and Wang, Q. (2012). Body Area Communications: Channel Modeling, Communication Systems, and EMC, John Wiley & Sons.","DOI":"10.1002\/9781118188491"},{"key":"ref_32","unstructured":"Middleton, D., and Institute of Electrical and Electronics Engineers (1996). An Introduction to Statistical Communication Theory, IEEE."}],"container-title":["Entropy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1099-4300\/21\/9\/858\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T13:16:15Z","timestamp":1760188575000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1099-4300\/21\/9\/858"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9,3]]},"references-count":32,"journal-issue":{"issue":"9","published-online":{"date-parts":[[2019,9]]}},"alternative-id":["e21090858"],"URL":"https:\/\/doi.org\/10.3390\/e21090858","relation":{},"ISSN":["1099-4300"],"issn-type":[{"type":"electronic","value":"1099-4300"}],"subject":[],"published":{"date-parts":[[2019,9,3]]}}}