Research Article

Energy-Aware Key Exchange for Securing Implantable Medical Devices

Table 4

Communication overhead.

Preparation for key exchangeMisdetection tolerance Secure PV exchange (authentication) Key confirmationTotal

[7]
 Sendn/a = 10,080 bytes
 Receive- = 65 bytes
[10]
 Sendn/a = 289 bytes
 Receive- = 1,088 bytes
[11]
 Send = 181 bytes
 Receive- = 133 bytes
Ours
 Send-- = 64 bytes
 Receive- = 96 bytes

(i) References [7, 10] do not support misdetection tolerance. (ii) and denote the identity of an IMD and external programmer, respectively. bytes. (iii) Coffer denotes the set that includes both real PVs and chaff points ( = 10,000 bytes). (iv) denotes a nonce (unique random number) ( = 16 bytes). (v) denotes the information indicating the index of real measurements out of all elements in Coffer ( = 1 byte). (vi) MAC denotes the message authentication code ( = 32 bytes). (vii) ECC denotes the error correction code ( = 32 bytes). (viii) and denote the misdetection flag ( = 1 byte). (ix) Cert denotes the certificate that includes the public key of an external programmer ( = 1024 bytes).