Research Article
Security Mechanism Based on Hospital Authentication Server for Secure Application of Implantable Medical Devices
Table 1
Security comparisons.
| ā | [8] | [4] | [6] | [9] | Proposed |
| Security model | 2-Tier | 2-Tier | 2-Tier | 3-Tier w/PD | 3-Tier w/HAS | Cryptographic method for authentication | Password | CR with shared secret | CR with shared secret | CR with shared secret and signature | CR with shared secret | Authentication type | Unilateral | Unilateral | Mutual | Unilateral | Mutual | SK generation | None | None | Diffie- Hellman | PD generates SK | HAS generates SK | Key management | N/A | IMD-specific key from MK | N/A | PD maintains multiple PKs | RK and WK from LK | Multiple programmers | N/A | Insecure support | Secure support | Insecure support | Secure support | Patient data protection | N/A | N/A | N/A | N/A | Secure with | Treatment protection | N/A | N/A | N/A | N/A | Possible with and |
|
|
CR: challenge-response; PD: personal device; MK: master key; SK: session key; LK: long-term key; PK: public key; RK: Read-Key; WK: Write-Key.
|