2022
DOI: 10.37917/ijeee.18.1.9
|View full text |Cite
|
Sign up to set email alerts
|

Secure Patient Authentication Scheme in the Healthcare System Using Symmetric Encryption

Abstract: Recently, the incorporation of state-of-the-art technology such as Electronic Healthcare Records (EHRs), networks, and cloud computing has transformed the traditional healthcare system. However, security problems have arisen as a result of the integration of technology. Secure remote user authentication is a core part of the healthcare system to validate the user’s identification via an unsecured communication network. Since then, several remote user authentication schemes have been presented, each with its o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 0 publications
0
3
0
Order By: Relevance
“…The results show that our proposed scheme required time is less than some related works results and a little higher than others and this is because our scheme provides more security requirements than other schemes. [32] 5 𝑇ℎ+2 𝑇𝐸𝑛𝑐+5 𝑇∥+2𝑇𝐷𝑒c ≈0.0299 Radhakrishnan and Karuppiah [18] 15Th+1Tmexp ≈530 Qiu et al [33] 13 𝑇ℎ+4 𝑇pm ≈270.39 Ours (for admin-CS) 2TSec+8Th+Ten+Tde+Txp+2 Txv ≈0.0966…”
Section: Computation Costmentioning
confidence: 96%
See 1 more Smart Citation
“…The results show that our proposed scheme required time is less than some related works results and a little higher than others and this is because our scheme provides more security requirements than other schemes. [32] 5 𝑇ℎ+2 𝑇𝐸𝑛𝑐+5 𝑇∥+2𝑇𝐷𝑒c ≈0.0299 Radhakrishnan and Karuppiah [18] 15Th+1Tmexp ≈530 Qiu et al [33] 13 𝑇ℎ+4 𝑇pm ≈270.39 Ours (for admin-CS) 2TSec+8Th+Ten+Tde+Txp+2 Txv ≈0.0966…”
Section: Computation Costmentioning
confidence: 96%
“… ISSN: 2302-9285 Table 6. Communication cost comparison with some related works Scheme Communication cost (bits) Kaul et al [31] 768 Hamed and Yassin [32] 608 Radhakrishnan and Karuppiah [18] 1024 Qiu et al [33] ------Ours (for admin-CS) 928…”
Section: Communication Costsmentioning
confidence: 99%
“…In this paper, we propose RBAC, whose fundamental tenet is that roles are made up of operations that correspond to the actions performed by users who have been correctly assigned to these roles as well as to the relationships among users, roles, and operations [8]. We propose a verification scheme to protect the system from some of the most well-known cyberattacks, including phishing, MITM, insider, and reply attacks.…”
Section: Introductionmentioning
confidence: 99%