{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T16:52:02Z","timestamp":1767891122335,"version":"3.49.0"},"reference-count":23,"publisher":"MDPI AG","issue":"12","license":[{"start":{"date-parts":[[2023,6,11]],"date-time":"2023-06-11T00:00:00Z","timestamp":1686441600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Institute of Information &amp; communications Technology Planning &amp; Evaluation (IITP)","award":["No.2022-0-00103"],"award-info":[{"award-number":["No.2022-0-00103"]}]},{"name":"Korea government(MSIT)","award":["No.2022-0-00103"],"award-info":[{"award-number":["No.2022-0-00103"]}]},{"name":"Development of security verification technology against vulnerabilities to assure IoT\/IIoT device safety","award":["No.2022-0-00103"],"award-info":[{"award-number":["No.2022-0-00103"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>The Medical Internet-of-Things (MIoT) has developed revolutionary ways of delivering medical care to patients. An example system, showing increasing demand, is the artificial pancreas system that offers convenience and reliable support care to patients with Type 1 Diabetes. Despite the apparent benefits, the system cannot escape potential cyber threats that may worsen a patient\u2019s condition. The security risks need immediate attention to ensure the privacy of the patient and preserve safe functionality. Motivated by this, we proposed a security protocol for the APS environment wherein support to essential security requirements is guaranteed, the security context negotiation is resource-friendly, and the protocol is resilient to emergencies. Accordingly, the security requirements and correctness of the design protocol were formally verified using BAN logic and AVISPA, and proved its feasibility through the emulation of APS in a controlled environment using commercial off-the-shelf devices. Moreover, the results of our performance analysis indicate that the proposed protocol is more efficient than the other existing works and standards.<\/jats:p>","DOI":"10.3390\/s23125501","type":"journal-article","created":{"date-parts":[[2023,6,12]],"date-time":"2023-06-12T02:28:42Z","timestamp":1686536922000},"page":"5501","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["APSec1.0: Innovative Security Protocol Design with Formal Security Analysis for the Artificial Pancreas System"],"prefix":"10.3390","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2710-0864","authenticated-orcid":false,"given":"Jiyoon","family":"Kim","sequence":"first","affiliation":[{"name":"School of Computer Sciences, Gyeonsang National University, Jinju-si 52828, Republic of Korea"}]},{"given":"Jongmin","family":"Oh","sequence":"additional","affiliation":[{"name":"Department of Financial Information Security, Kookmin University, Seoul-si 02707, Republic of Korea"}]},{"given":"Daehyeon","family":"Son","sequence":"additional","affiliation":[{"name":"Department of Financial Information Security, Kookmin University, Seoul-si 02707, Republic of Korea"}]},{"given":"Hoseok","family":"Kwon","sequence":"additional","affiliation":[{"name":"Department of Financial Information Security, Kookmin University, Seoul-si 02707, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9611-1036","authenticated-orcid":false,"given":"Philip Virgil","family":"Astillo","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, University of San Carlos, Cebu City 6000, Philippines"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0604-3445","authenticated-orcid":false,"given":"Ilsun","family":"You","sequence":"additional","affiliation":[{"name":"Department of Financial Information Security, Kookmin University, Seoul-si 02707, Republic of Korea"}]}],"member":"1968","published-online":{"date-parts":[[2023,6,11]]},"reference":[{"key":"ref_1","first-page":"1","article-title":"SMDAps: A specification-based misbehavior detection system for implantable devices in artificial pancreas system","volume":"22","author":"Astillo","year":"2021","journal-title":"J. Internet Technol."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"27","DOI":"10.4093\/dmj.2022.0271","article-title":"Advances in Continuous Glucose Monitoring and Integrated Devices for Management of Diabetes with Insulin-Based Therapy: Improvement in Glycemic Control","volume":"47","author":"Yoo","year":"2023","journal-title":"Diabetes Metab. J."},{"key":"ref_3","unstructured":"(2021). Artificial Pancreas Device Systems (APDS) Market: Global Industry Trends, Share, Size, Growth, Opportunity and Forecast 2022\u20132027, IMARC."},{"key":"ref_4","unstructured":"Gotadki, R. (2023, March 17). Artificial Pancreas Device System Market. Available online: https:\/\/www.marketresearchfuture.com\/reports\/artificial-pancreas-device-system-market-6671."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"102552","DOI":"10.1016\/j.scs.2020.102552","article-title":"Security issues in implantable medical devices: Fact or fiction?","volume":"66","author":"Hassija","year":"2021","journal-title":"Sustain. Cities Soc."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Tabasum, A., Safi, Z., AlKhater, W., and Shikfa, A. (2018, January 25\u201326). Cybersecurity Issues in Implanted Medical Devices. Proceedings of the 2018 International Conference on Computer and Applications (ICCA\u201918), Beirut Lebanon.","DOI":"10.1109\/COMAPP.2018.8460454"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"403","DOI":"10.1080\/17434440.2018.1483235","article-title":"Security of implantable medical devices with wireless connections: The dangers of cyber-attacks","volume":"15","author":"Pycroft","year":"2018","journal-title":"Expert Rev. Med Devices"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Lazaro, C., Oruklu, E., and Cinar, A. (2017, January 6\u20139). Security challenges and solutions for closed-loop artificial pancreas systems. Proceedings of the2017 IEEE 60th International Midwest Symposium on Circuits and Systems (MWSCAS\u201917), Boston, MA, USA.","DOI":"10.1109\/MWSCAS.2017.8053119"},{"key":"ref_9","unstructured":"(2022). Cybersecurity in Medical Devices: Quality System Considerations and Content of Premarket Submissions Draft Guidance for Industry and Food and Drug Administration Staff, Technical report."},{"key":"ref_10","unstructured":"(2014). Content of Premarket Submissions for Management of Cybersecurity in Medical Devices: Guidance for Industry and Food and Drug Administration Staff, Technical report."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"395","DOI":"10.1016\/j.future.2021.10.023","article-title":"Federated intelligence of anomaly detection agent in IoTMD-enabled Diabetes Management Control System","volume":"128","author":"Astillo","year":"2022","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"3763","DOI":"10.1109\/JBHI.2021.3063173","article-title":"TrMAps: Trust Management in Specification-Based Misbehavior Detection System for IMD-Enabled Artificial Pancreas System","volume":"25","author":"Astillo","year":"2021","journal-title":"IEEE J. Biomed. Health Inform."},{"key":"ref_13","unstructured":"Wu, L., Chi, H., and Du, X. (2018). A Secure Proxy-based Access Control Scheme for Implantable Medical Devices. arXiv."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Chi, H., Wu, L., Du, X., Zeng, Q., and Ratazzi, P. (June, January 30). e-safe: Secure, efficient and forensics-enabled access to implantable medical devices. Proceedings of the 2018 IEEE Conference on Communications and Network Security (CNS\u201918), Beijing, China.","DOI":"10.1109\/CNS.2018.8433213"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Duttagupta, S., Marin, E., Singelee, D., and Preneel, B. (2023, January 24\u201326). HAT: Secure and Practical Key Establishment for Implantable Medical Devices. Proceedings of the 13th ACM Conference on Data and Application Security and Privacy (CODASPY\u201923), Charlotte, NC, USA.","DOI":"10.1145\/3577923.3583646"},{"key":"ref_16","unstructured":"Duguma, D.G., Astillo, P.V., Gebremariam, Y.E., Kim, B., and You, I. (2021, January 7\u20139). Comparative Analysis of Bluetooth LE and EDHOC for Potential Security Protocol in Artificial Pancreas System. Proceedings of the 2021 International Symposium on Mobile Internet Security (MobiSec\u201921), Jeju, Republic of Korea."},{"key":"ref_17","unstructured":"Rescorla, E. (2023, April 28). Available online: https:\/\/datatracker.ietf.org\/doc\/html\/rfc8446."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Dowling, B., Fischlin, M., G\u00fcnther, F., and Stebila, D. (2015, January 12\u201316). A Cryptographic Analysis of the TLS 1.3 Handshake Protocol. Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security (CCS\u201915), Denver, CO, USA.","DOI":"10.1145\/2810103.2813653"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1145\/77648.77649","article-title":"A logic of authentication","volume":"8","author":"Burrows","year":"1990","journal-title":"ACM Trans. Comput. Syst."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Armando, A., Basin, D., Boichut, Y., Chevalier, Y., Compagna, L., Cuellar, J., Drielsma, P.H., He\u00e1m, P., Kouchnarenko, O., and Mantovani, J. (2005, January 6\u201310). The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications. Proceedings of the 17th International Conference on Computer Aided Verification (CAV\u201905), Edinburgh, Scotland, UK.","DOI":"10.1007\/11513988_27"},{"key":"ref_21","unstructured":"Boyd, C., and Mao, W. (1993, January 23\u201327). On a limitation of BAN logic. Proceedings of the 1993 Workshop on the Theory and Application of Cryptographic Techniques (EUROCRYPT\u201993), Lofthus, Norway."},{"key":"ref_22","unstructured":"Meadows, C.A. (December, January 28). Formal verification of cryptographic protocols: A survey. Proceedings of the 4th International Conference on the Theory and Applications of Cryptology (ASIACRYPT\u201994), Wollongong, Australia."},{"key":"ref_23","unstructured":"Chevalier, Y., Compagna, L., Cuellar, J., Drieslma, P.H., Mantovani, J., M\u00f6dersheim, S., and Vigneron, L. (2004, January 20\u201325). A High Level Protocol Specification Language for Industrial Security-Sensitive Protocols. Proceedings of the 2004 Workshop on Specification and Automated Processing of Security Requirements (SAPS\u201904), Linz, Austria."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/23\/12\/5501\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T19:52:44Z","timestamp":1760125964000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/23\/12\/5501"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,11]]},"references-count":23,"journal-issue":{"issue":"12","published-online":{"date-parts":[[2023,6]]}},"alternative-id":["s23125501"],"URL":"https:\/\/doi.org\/10.3390\/s23125501","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,6,11]]}}}