LSP-eHS: A Lightweight and Secure Protocol for e-Healthcare System

被引:1
作者
Algarni, Ali Delham [1 ]
Algarni, Fahad [1 ]
Jan, Saeed Ullah [2 ]
Innab, Nisreen [3 ]
机构
[1] Univ Bisha, Fac Comp & Informat Sci, Dept Comp Sci, Bisha 14174, Saudi Arabia
[2] Govt Degree Coll Wari, Dept Higher Educ, Wari 18300, Pakistan
[3] AlMaarefa Univ, Coll Appl Sci, Dept Comp Sci & Informat Syst, Riyadh 13713, Saudi Arabia
来源
IEEE ACCESS | 2024年 / 12卷
关键词
Security; anomaly detection; healthcare systems; cloud computing; privacy; authentication; AUTHENTICATION SCHEME;
D O I
10.1109/ACCESS.2024.3477922
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recent events dedicated to e-healthcare systems demonstrated that a critical mass of users using e-health services and applications are being created and producing a tremendous output, such as improved patient monitoring, faster diagnosis, and better disease management. However, despite the benefits and availability of e-health systems, widespread adoption in real-life medical or health situations still needs to be improved. Therefore, implementing a four-party authentication system can help address concerns about security and privacy and encourage patients to adopt electronic healthcare technologies. This article presents a security protocol for securely authenticating four participants in the e-healthcare system, namely LSP-eHS. The scheme uses a simple cryptographic hash function, concatenation, and xor operations. The security of the proposed protocol can be confirmed through a widely used BAN (Burrows-Abadi-Needham) logic, and the performance analysis of the proposed protocol can be finished by measuring communication and computation costs.
引用
收藏
页码:156849 / 156866
页数:18
相关论文
共 39 条
  • [1] An Overview on the Challenges and Limitations Using Cloud Computing in Healthcare Corporations
    Agapito, Giuseppe
    Cannataro, Mario
    [J]. BIG DATA AND COGNITIVE COMPUTING, 2023, 7 (02)
  • [2] Alanazi R, 2022, INT J ADV COMPUT SC, V13, P484
  • [3] RLKS-TMS: A Robust and Lightweight Key Agreement Scheme for Telemedicine System
    Alzahrani, Abulrahman
    [J]. IEEE ACCESS, 2024, 12 : 108233 - 108247
  • [4] Arpitha T., 2024, J. Eng. Appl. Sci., V71, P8
  • [5] Lightweight Three-Factor Sensor and User Authentication for RPL-Based 6TiSCH Networks
    Aydin, Hakan
    Aydin, Burak
    Gormus, Sedat
    [J]. IEEE SENSORS JOURNAL, 2024, 24 (17) : 28196 - 28209
  • [6] Authentication Schemes for Healthcare Applications Using Wireless Medical Sensor Networks: A Survey
    Bahache A.N.
    Chikouche N.
    Mezrag F.
    [J]. SN Computer Science, 3 (5)
  • [7] Blanchet Bruno, 2018, ProVerif 2.00: Automatic cryptographic protocol verifier, user manual and tutorial
  • [8] Boyd C., 1994, Advances in Cryptology - EUROCRYPT '93. Workshop on the Theory and Application of Cryptographic Techniques Proceedings, P240
  • [9] A secure and robust anonymous three-factor remote user authentication scheme for multi-server environment using ECC
    Chandrakar, Preeti
    Om, Hari
    [J]. COMPUTER COMMUNICATIONS, 2017, 110 : 26 - 34
  • [10] Chiou S.-F., 2019, Int. J. Netw. Secur., V21, P100