Page 83 - IJEEE-2022-Vol18-ISSUE-1
P. 83

Hamed & Yassin                                                       | 79

Security Features                                            TABLE 4
Mutual Authentication              COMPARISON WITH OTHER RELATED WORKS
Anonymous& Untraceable
Forward Secrecy                                    [4] [22] [29] [30] [32] [34] Our
Key Agreement                                     YES NO YES YES YES YES YES
Key Freshness                                      NO NO YES NO NO YES YES
MITM Attack                                       YES NO YES NO YES YES YES
Replay Attack                                      NO NO NO NO NO NO YES
Eavesdropping Attack                               NO NO NO NO NO NO YES
Stolen Personal Device                             NO YES YES NO YES YES YES
Healthcare Phase                                  YES YES YES YES YES YES YES
                                                   NO NO NO NO NO YES YES
                                                   NO NO NO NO NO NO YES
                                                   NO NO NO NO NO NO YES

B. Communication cost                                                authentication method based on cryptosystem tools in order to
                                                                     address the problems identified in the previous study. Because
     During the login and authentication step , the cost of sent     security threats and demands differ, our solutions focus on
                                                                     patient authentication and privacy. Keep this information
messages is calculated. we assumed the identity size is 32 bit,      private and away from unwanted access. The proposed system
                                                                     will be able to fight off attacks like Man-in-the-Middle, Insider,
the hash value’s size is 160 bits[41], the cipher text value size    Replay, and more. It's safe to use features like mutual
is 128 bit, we also compare our proposed scheme with other           authentication, anomalies, key management, and other things
related works based on Table 5 below.                                that are safe. Achieve a balance between speed and security. In
                                                                     the future, we will focus on administrators using two-factor
                                TABLE 5                              authentication. First-factor biometrics (password and user
                    COMMUNICATION COST                               name) and second-factor biometrics (fingerprint) improve the
                                                                     security of electronic health records patient HER, which is more
Authors                No of bits  No of messages                    secure than traditional authentication factors.

Zhang et al.[29]        1568       4                                                        CONFLICT OF INTEREST

Kaul et al. [30]        768        4                                    The authors have no conflict of relevant interest to this
                                                                     article.
Yassin et al. [39]      576        2
                                                                                                   REFERENCES
Taher et al.[40]        1660       3
                                                                     [1] Y. Zhuang, L. R. Sheets, Y.-W. Chen, Z.-Y. Shae, J. J. Tsai,
Our Scheme              608        3                                   and C.-R. Shyu, "A patient-centric health information
                                                                       exchange framework using blockchain technology," IEEE
                          VII. CONCLUSIONS                             journal of biomedical and health informatics, vol. 24, no. 8,
                                                                       pp. 2169-2176, 2020.
     EHRs enable authorized health stakeholders to share
                                                                     [2] E. T. Jasim and H. A. Younis, "Cryptanalysis and Security
structured medical data in order to improve healthcare delivery        Enhancement of a Khan et al.'s Scheme," IOSR Journal of
                                                                       Computer Engineering, vol. 17, no. 2, pp. 08-16, 2015.
quality. In these systems, privacy and security are critical, since
if sensitive information is leaked, the patient might face serious   [3] V. Jaiman and V. Urovi, "A consent model for blockchain-
consequences. Concerns about security and privacy are seen as          based health data sharing platforms," IEEE Access, vol. 8, pp.
important barriers in the healthcare system. Remote user               143734-143745, 2020.
authentication is a crucial step in authenticating a person's
identity. There have been a number of techniques for remote          [4] M. T. Chen and T. H. Lin, "A Provable and Secure Patient
user authentication, each with their own set of advantages and         Electronic Health Record Fair Exchange Scheme for Health
disadvantages. We propose a secure user authentication scheme          Information Systems," Applied Sciences, vol. 11, no. 5, p.
for patients in the healthcare system that uses Scyther, a formal      2401, 2021.
security tool, to confirm the security of the proposed work. In
the healthcare setting, our work enables the creation of an          [5] S. Vishnu, S. J. Ramson, and R. Jegan, "Internet of medical
environment capable of setting, registering, storing, finding,         things (IoMT)-An overview," in 2020 5th international
analyzing, authenticating, and validating electronic healthcare        conference on devices, circuits and systems (ICDCS), 2020:
information in order to secure patient information. The                IEEE, pp. 101-104.
suggested work uses a lightweight crypto-hash function for the
creation of One-Time Passwords (OTP) and symmetric key
encryption (Counter mode (CTR mode) to provide good
security while maintaining adequate performance. As a result,
the primary goal of this study is to develop a reliable
   78   79   80   81   82   83   84   85   86   87   88