2018
DOI: 10.1155/2018/1809302
|View full text |Cite
|
Sign up to set email alerts
|

Energy-Aware Key Exchange for Securing Implantable Medical Devices

Abstract: Implantable medical devices (IMDs) continuously monitor the condition of a patient and directly apply treatments if considered necessary. Because IMDs are highly effective for patients who frequently visit hospitals (e.g., because of chronic illnesses such as diabetes and heart disease), their use is increasing significantly. However, related security concerns have also come to the fore. It has been demonstrated that IMDs can be hacked-the IMD power can be turned off remotely, and abnormally large doses of dru… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 46 publications
0
1
0
Order By: Relevance
“…In particular, in [8], fuzzy-vault based protocol was shown to shorten the key establishment time by reducing the number of IPIs needed to generate a secret key. In [9], an energy-efficient key exchange protocol using IPIs was able to generate a secret key in an authenticated and transparent manner, without any key material being exposed before distribution or during initialization. The authors could dramatically reduce energy consumption (in communication and computation) compared to the state-of-the-art (e.g., [7]), while keeping secure key exchange.…”
Section: Related Workmentioning
confidence: 99%
“…In particular, in [8], fuzzy-vault based protocol was shown to shorten the key establishment time by reducing the number of IPIs needed to generate a secret key. In [9], an energy-efficient key exchange protocol using IPIs was able to generate a secret key in an authenticated and transparent manner, without any key material being exposed before distribution or during initialization. The authors could dramatically reduce energy consumption (in communication and computation) compared to the state-of-the-art (e.g., [7]), while keeping secure key exchange.…”
Section: Related Workmentioning
confidence: 99%