Research Article
Energy-Aware Key Exchange for Securing Implantable Medical Devices
Figure 10
Energy consumption due to computation overhead. It is difficult to identify the amount of energy consumed by SHA256, , and AES128 because these algorithms consume relatively little energy.