Page 80 - 2023-Vol19-Issue2
P. 80
76 | Hamed & Yassin
Fig. 4. EHR migration phase.
Fig. 7.
Fig. 5. Explains the treatment and exchange.
A. Formal Security Analysis Fig. 6. Login and Authentication phase that cannot be
attacked of patient.
Scyther, which is based on the Security Protocol Description
Language (SPDL) proposed in [21], is a formal verification Our investigation has revealed that the proposed solu-
tool for security protocols. Many security protocols have tion provides security against malicious attacks as previously
applied the Scyther tool for verification. Our protocol is ver- stated. Because of this, SPDL is capable of performing a
ified using the ”verification claims” and ”automatic claims” number of critical cryptographic activities, such as sending
schemes in the Scyther tool. Currently, the proposed scheme and receiving messages between components, and it also dis-
has been written in SPDL, and the results are viewed as Au-
tomatic Claim and Verification Claim. Based on the Scyther
tool, our approach resists harmful attacks such as MITM at-
tack, insider attack, replay attack, spoofing, and impersonation
The login and authentication phases are depicted in Fig. 6 and