Research Article

Security Mechanism Based on Hospital Authentication Server for Secure Application of Implantable Medical Devices

Table 2

Performance comparisons.

2009[6][9] w/PDProposed w/HAS
IMDProg.IMDPDProg.IMDProg.HAS

Authentication/integrity1 mac
(UniL)
1 mac
(UniL)
1 enc
2 dec
1 enc
1 ver
2 enc/1 dec
1 sig
2 mac4 mac2 mac
SK generation/distribution1 DH w/RBE1 DH w/RBE1 dec1 Penc
1 enc
1 Pdec1 kdf1 dec1 kdf
1 enc
No. msg4 · IMP-PD: 1/PD-Prog.: 3  
IMD-Prog.: 2
IMD-Prog.: 2/Prog.-HAS: 2
Patient data protectionN/AN/A1 enc
1 hash
1 enc
1 dec
1 hash
1 dec
Treatment protectionN/AN/AN/A1 sig1 ver

PD: personal device; Prog.: programmer; No. msg: number of messages exchanged; mac: MAC function; UniL: unilateral authentication; RBE: rapid bit exchange; DH: Diffie-Hellman; hash: hash function; Penc: public-key encryption; Pdec: public-key decryption; enc: symmetric encryption; dec: symmetric decryption; kdf: key derivation function; sig: signature generation; ver: signature verification.