
Secure Knee Prosthesis – Processing of Encrypted Data and User Authentication
Author(s) -
Anass Elmoadine,
Maxime Pistono,
Reda Bellafqira,
Gouenou Coatrieux
Publication year - 2020
Publication title -
epic series in health sciences
Language(s) - English
Resource type - Conference proceedings
ISSN - 2398-5305
DOI - 10.29007/pkjz
Subject(s) - computer science , computer security , encryption , context (archaeology) , authentication (law) , key (lock) , process (computing) , protocol (science) , operating system , medicine , paleontology , alternative medicine , pathology , biology
Today, Implemented Medical Devices (IMDs) are key elements of the healthcare system being more and more complex with connectivity facilities. Participating to data collecting, they contribute to improve patient follow-up as well as medical practices. However, with such a connectivity security threats are significant and can be the cause of decision errors, patient privacy concerns and so on. This is why, international and national regulations make mandatory to consider security when developing new IMDs. In the context of resource constrained connected Knee Prosthesis (KP), we present: 1) a solution to securely process data emitted by KP on untrusted Human Machine Interface (HMI) and implementation times; 2) an authentication protocol for installing trust between the different entities involved in the process.