Page 80 - 2023-Vol19-Issue2
P. 80

76 |                                                              Hamed & Yassin

      Fig. 4. EHR migration phase.
                          Fig. 7.

Fig. 5. Explains the treatment and exchange.

A. Formal Security Analysis                                       Fig. 6. Login and Authentication phase that cannot be
                                                                  attacked of patient.
Scyther, which is based on the Security Protocol Description
Language (SPDL) proposed in [21], is a formal verification            Our investigation has revealed that the proposed solu-
tool for security protocols. Many security protocols have         tion provides security against malicious attacks as previously
applied the Scyther tool for verification. Our protocol is ver-   stated. Because of this, SPDL is capable of performing a
ified using the ”verification claims” and ”automatic claims”      number of critical cryptographic activities, such as sending
schemes in the Scyther tool. Currently, the proposed scheme       and receiving messages between components, and it also dis-
has been written in SPDL, and the results are viewed as Au-
tomatic Claim and Verification Claim. Based on the Scyther
tool, our approach resists harmful attacks such as MITM at-
tack, insider attack, replay attack, spoofing, and impersonation
The login and authentication phases are depicted in Fig. 6 and
   75   76   77   78   79   80   81   82   83   84   85