Efficient Joint Key Authentication Model in E-Healthcare
نویسندگان
چکیده
Many patients have begun to use mobile applications handle different health needs because they can better access high-speed Internet and smartphones. These devices are now increasingly used integrated through the medical of Things (mIoT). mIoT is an important part digital transformation healthcare, it introduce new business models allow efficiency improvements, cost control improve patient experience. In system, when migrating from traditional services electronic services, protection privacy priorities each stakeholder. Therefore, recommended user authentication authorization methods security privacy. this paper, our prosed model involves a shared identity verification process with situations in e-health system. We aim reduce strict formal specification joint key model. AVISPA tool verify well-known HLPSL language develop smart card cases user-friendly environment. Our has economic strategic advantages for healthcare organizations workers. The staff increase their knowledge ability analyze data more easily. continuously track indicators automatically manage treatments monitor real time. Further, help customers prevent chronic diseases enhanced cognitive functions support. necessity efficient care even crucial mitigation we rely on systems.
منابع مشابه
Efficient remote mutual authentication and key agreement
A smart card based scheme is very practical to authenticate remote users. In 2004, Juang [Juang WS. Efficient password authenticated key agreement using smart cards. Computers and Security 2004;23:167–73] proposed a mutual authentication scheme using smart cards. The advantages in the scheme include freely chosen passwords, no verification tables, low communication and computation cost, and ses...
متن کاملE-SAP: Efficient-Strong Authentication Protocol for Healthcare Applications Using Wireless Medical Sensor Networks
A wireless medical sensor network (WMSN) can sense humans' physiological signs without sacrificing patient comfort and transmit patient vital signs to health professionals' hand-held devices. The patient physiological data are highly sensitive and WMSNs are extremely vulnerable to many attacks. Therefore, it must be ensured that patients' medical signs are not exposed to unauthorized users. Con...
متن کاملAn Efficient Authentication and Key Agreement Protocol in RFID System
Due to the very limited computing resource, storing space and electric power supply of tag, it is a great challenge for us to design a practical RFID protocol which is security, efficient and can be used in the low-cost tag. In 2007, He et al. proposed an authentication and key agreement protocol which is used in the process of communication between the low-cost tag and reader. They also proved...
متن کاملAn Efficient ECC-based Authentication and Key Agreement Protocol
Public-key cryptography is commonly used to authenticate communicating entities in some networks. One of the key tools in this way is to use the elliptic curves cryptography (ECC) which is relatively lightweight due to its shorter key size compared to the conventional River-Shamir-Adleman (RSA) method. This paper is proposing an efficient protocol by analysing two variants of ECC-based wireless...
متن کاملEfficient User Authentication and Key Agreement with User Privacy Protection
Using smart cards, remote user authentication and key agreement can be simplified, flexible, and efficient for creating a secure distributed computers environment. Addition to user authentication and key distribution, it is very useful for providing identity privacy for users. In this paper, we propose novel user authentication and key agreement schemes with privacy protection. We first propose...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Computers, materials & continua
سال: 2022
ISSN: ['1546-2218', '1546-2226']
DOI: https://doi.org/10.32604/cmc.2022.022706