Page 84 - 2023-Vol19-Issue2
P. 84

80 |                                                                                                    Hamed & Yassin

                                                            TABLE I.
                        COMPUTATION COST COMPARISON WITH OTHER RELATED WORKS.

                        Term                                Meaning                        Time needed
                                      The time allotted to the crypto hash function.        0.0023 ms
                         Th            The processing time for the XOR operation.           Negligible
                         T?    The processing time for a symmetric encryption function.     0.0046 ms
                        TE nc    The processing time for the Concatenation operation.       Negligible
                         T||

                                                    TABLE II.
                               COMPARING OF THE COMPUTATIONAL COST.

       Scheme           Registration Phase    Login and Authentication Phases                          Total Cost
    Wu et al. [21]
  Taher et al. [22]      8Th + 3T? + 7TII   35Th + 11T? + 30TII + 1TDec + 1TEnc  43Th + 14T? + 37TII + 1TDec + 1TEnc ˜ 0.1081
  Yassin et al. [23]    10Th + 10T? + 9TII           21Th + 32T? + 19TII                  31Th + 42T? + 28TII ˜ 0.0713
Chatterjee et al. [24]
     Our Scheme          5Th + 2T? + 1TII   13Th + 12T? + 6TII + 2TDec + 2TEnc   18Th + 14T? + 7TII + 2TDec + 2TEnc ˜ 0.0598
                        6Th + 3T? + 15TII   2TDec + 2TEnc + 22Th + 5T? + 88TII   28Th + 8T? + 103TII + 2TDec + 2TEnc ˜ 0.0828

                                 2Th              8Th + 4TEnc + 3TDec + 6T?           10Th + 4TEnc + 3TDec + 6T? ˜ 0.0552

                     TABLE III.                                                         TABLE IV.
COMPARISON WITH OTHER RELATED WORKS.                               COMPARISON WITH OTHER RELATED WORKS.

Security Features       [16] [17] [18] [19] Our Scheme                    Authors          No of bits   No of messages
                                                                   Chatterjee et al. [24]     1280              2
Mutual Authentication YES YES NO YES        YES                    Xiong et al. [19]          1120              3
                                                                   Tahe et al. [26]           1660              3
Anonymous & Untraceable YES YES YES YES     YES                    Wu et al. [21]             1600              3
                                                                   Our Scheme                 736               3
Forward Secrecy         YES YES NO YES      YES

Key Agreement           NO NO NO NO         YES

key management          NO NO NO NO         YES

MITM Attack             YES NO NO NO        YES

Replay Attack           YES YES YES NO      YES

Eavesdropping Attack NO NO NO NO            YES

Unlinkability           YES NO NO NO        YES

EHR Migration phase NO NO NO NO             YES

Insider attacks         YES NO YES NO       YES                    and security are of the utmost importance inside these sys-
                                                                   tems. It is commonly accepted that concerns around safety
    According to the above-mentioned comparisons, the sug-         and secrecy pose substantial challenges to the functioning of
gested system has a lower time complexity (10Th + 4TEnc +          the healthcare system. We offer a safe user authentication ap-
3TDec + 6T? ˜ 0.0552) than those in previous relevant stud-        proach for patients in the healthcare system that uses Scyther,
ies. We can see that the proposed system has a fair mix of         a formal security tool, to validate the proposed scheme’s se-
performance and security aspects (see Table III).                  curity. Our proposed approach clearly ensures ease, speed,
                                                                   and integrity. Our technique ensures safe data storage and
B. Communication Cost                                              approved information flow to defined sites. To ensure strong
The cost of transmitted messages is assessed during the login      security while maintaining appropriate speed, the proposed
and authentication process. We assumed the identity size is 32     scheme employs a lightweight crypto hash function for the
bits, the hash value size is 160 bits [25], the cipher text value  generation of OTPs and DGK . The major purpose of this
size is 128 bits, and the cipher text value size is homomorphic    research is to provide a trustworthy authentication technique
32 bits. Table IV compares our proposed approach with those        based on cryptosystem tools to solve the issues highlighted
in previous relevant research.                                     in the previous studies. The suggested system will be able
                                                                   to defend against attacks such as MITM, insider, and replay
                  VI. CONCLUSIONS                                  attacks, among others. It is safe to employ features such as
                                                                   mutual authentication, anomalies, key management, and other
EHRs allow authorized health stakeholders to communicate           secure features, and it strives to achieve a mix of speed and
organized medical data to enhance the quality of healthcare        security.
delivery. Since the patient’s situation may become exceed-
ingly perilous if personal information becomes public, privacy
   79   80   81   82   83   84   85   86   87   88   89