Research Article

Energy-Aware Key Exchange for Securing Implantable Medical Devices

Figure 10

Energy consumption due to computation overhead. It is difficult to identify the amount of energy consumed by SHA256, , and AES128 because these algorithms consume relatively little energy.