As cybersecurity plays an increasingly important role in medical safety, it has become one of the major issues in the development of wireless medical devices. In 2022 alone, the Health Insurance Portability and Accountability Act (HIPAA) Journal reported 707 data breaches involving 500 or more records. IBM estimates the average total cost of a healthcare-related data breach to be $10.1 million. Today, it is becoming increasingly common for cybercriminals to employ both sophisticated IT and OT attacks. Ransomware-as-a-service is becoming a more standard, professional service, further exacerbating security concerns.
Security breaches in healthcare put people at risk. While wireless-enabled design improves information transfer and expands the benefits of medical devices, it requires additional security measures.
Cybersecurity Guidelines for Adopting Wireless Medical Devices
The U.S. Food and Drug Administration (FDA) has increasingly stringent certification requirements for cybersecurity in medical device designs, so complying with these measures requires a holistic approach. The Consolidated Appropriations Act states that all medical device submissions must include a detailed cybersecurity plan or will be rejected.
Silicon Labs' product portfolio includes SoCs uniquely suited to support medical device designers:
The EFR32BG27 (BG27) wireless SoC is available in an ultra-small WLCSP package (2.3 mm x 2.6 mm) and is capable of running on a coin cell battery. The BG27 Bluetooth SoC features an integrated DC/DC boost function that can operate at voltages as low as 0.8 volts, supporting batteries commonly used in medical applications such as patches and continuous glucose monitoring (CGM) devices. Target applications include connected and portable medical devices, wearables, sensors, switches, smart locks, and commercial and LED lighting.
EFR32BG22 (BG22) Bluetooth Low Energy (LE) wireless SoC solution offers best-in-class ultra-low transmit and receive power (4.1 mA TX, 3.6 mA RX at 0 dBm) and high-performance, low-power Arm® Cortex®-M33 core (27 µA/MHz active, 1.2 µA sleep). Target applications include Bluetooth mesh low-power nodes, smart door locks, and personal healthcare and fitness devices.
Silicon Labs Custom Programming Services
In-house Custom Parts Manufacturing Services (CPMS) securely configures a variety of highly advanced features, including:
Secure boot/debug
Crypto OTA
Public key/private key/secret key
Security identity certificate
Inject custom functionality during testing and assembly, eliminating the need for third-party programming. Silicon Labs' dedicated security team is ready to consult on security lifecycle development and provide fast, cost-effective alternatives to traditional flash programming.
Cybersecurity of diabetes management devices
Potential threats to information flow and device commands could impair the functionality of medical devices and, in turn, the health of patients. Maintaining the CIA triad of confidentiality, integrity, and availability of health data and connected devices requires a thorough cybersecurity plan.
The Diabetes Technology Society (DTS) has taken an active stance on cybersecurity for diabetes management through its Wireless Device Security Standard (DTSec). DTSec was developed with input from the FDA and the U.S. Department of Health and Human Services (HHS) and may form the basis for official FDA guidance.
The first and only DTSec compliant chipset for diabetes management devices
As a leader in IoT security, Silicon Labs has partnered with DTS to launch the first and only DTSec-compliant IC on the market. With the EFR32BG27, device designers stay ahead of FDA standards throughout the product lifecycle. Silicon Labs' EFR32BG family of Bluetooth ICs feature the highest level of Security Evaluation Standard for IoT Platforms (SESIP) certification, ensuring robustness against hardware and software attacks. SESIP certification includes IEEE 2621, the IEEE Connectivity Standard for Medical Devices for Diabetes Management. Assessment reports are available upon request.
EFR32BG features include:
Bluetooth LE SoC features SESIP Level 3 certification based on ISO common standards
Physical attack defense
Software Attacker Defense
Platform isolation
Unbreakable TRNG
The EFR32BG also includes Secure Vault to protect against attack vectors. Secure Vault provides a Secure Processing Environment (SPE) for hardware and software, tamper resistance and counterfeiting through security attestation and authentication injection.
Through Secure Vault, the EFR32BG is also supported by:
True Random Number Generator (TRNG)
Security/Encryption Engineering
Secure boot with RTSL secure debugging
Secure OTA
Differential Power Analysis (DPA) Countermeasures
Previous article:WPG Group launches wireless charging + BLDC solution for electric toothbrushes based on Nuvoton products
Next article:最后一页
- Popular Resources
- Popular amplifiers
- High-speed 3D bioprinter is available, using sound waves to accurately build cell structures in seconds
- [“Source” Observation Series] Application of Keithley in Particle Beam Detection Based on Perovskite System
- STMicroelectronics’ Biosensing Innovation Enables Next-Generation Wearable Personal Healthcare and Fitness Devices
- China's first national standard for organ chips is officially released, led by the Medical Devices Institute of Southeast University
- The world's first non-electric touchpad is launched: it can sense contact force, area and position even without electricity
- Artificial intelligence designs thousands of new DNA switches to precisely control gene expression
- Mouser Electronics provides electronic design engineers with advanced medical technology resources and products
- Qualcomm Wireless Care provides mobile terminal devices to empower grassroots medical workers with technology
- Magnetoelectric nanodiscs stimulate deep brain noninvasively
- LED chemical incompatibility test to see which chemicals LEDs can be used with
- Application of ARM9 hardware coprocessor on WinCE embedded motherboard
- What are the key points for selecting rotor flowmeter?
- LM317 high power charger circuit
- A brief analysis of Embest's application and development of embedded medical devices
- Single-phase RC protection circuit
- stm32 PVD programmable voltage monitor
- Introduction and measurement of edge trigger and level trigger of 51 single chip microcomputer
- Improved design of Linux system software shell protection technology
- What to do if the ABB robot protection device stops
- CGD and Qorvo to jointly revolutionize motor control solutions
- CGD and Qorvo to jointly revolutionize motor control solutions
- Keysight Technologies FieldFox handheld analyzer with VDI spread spectrum module to achieve millimeter wave analysis function
- Infineon's PASCO2V15 XENSIV PAS CO2 5V Sensor Now Available at Mouser for Accurate CO2 Level Measurement
- Advanced gameplay, Harting takes your PCB board connection to a new level!
- Advanced gameplay, Harting takes your PCB board connection to a new level!
- A new chapter in Great Wall Motors R&D: solid-state battery technology leads the future
- Naxin Micro provides full-scenario GaN driver IC solutions
- Interpreting Huawei’s new solid-state battery patent, will it challenge CATL in 2030?
- Are pure electric/plug-in hybrid vehicles going crazy? A Chinese company has launched the world's first -40℃ dischargeable hybrid battery that is not afraid of cold
- 【National Technology N32G430】LCD-ST7735
- The STM32 video account and B station account have been opened. Are you paying attention?
- 【RT-Thread Reading Notes】Reflections on RT-Thread Chapter 9
- 100% gift for a limited time: Download and share Keysight millimeter wave radar data to win a gift
- About GUI_Init stuck when emwin is ported to stm32f2
- Huawei Static Timing Analysis and Logic Design.pdf
- Where does the TTL on the laser driver board connect to the CNC shield V3 board?
- [ART-Pi Review] Part 3: Serial terminal and msh component of RTT Studio project
- DLP6500 light crafter uses USB synchronous trigger signal to play the next picture
- [Raspberry Pi Pico Review] Thonny software builds compilation environment + LED flashing