Page 80 - IJEEE-2022-Vol18-ISSUE-1
P. 80

76 | Hamed & Yassin

Fig.4: Login and Authentication phase that cannot be            Fig. 6: Model checking of the login and authentication
                           attacked
                                                                                        phase.

                                                                  Figure 7 refers to the code of the login and authentication

                                                             phase.

Fig. 5: Login and authentication phase that can be attacked         Fig. 7: The Proposed Scheme In SPDL-Scyther.
                                                                  In the healthcare phase, we apply the same mechanism
                                                             to check the correctness, security, verification of this phase.
                                                             The figure 8 demonstrates the safety and security of the
                                                             healthcare phase.
   75   76   77   78   79   80   81   82   83   84   85