Open Access iconOpen Access

ARTICLE

crossmark

An Efficient Lightweight Authentication and Key Agreement Protocol for Patient Privacy

by Seyed Amin Hosseini Seno1, Mahdi Nikooghadam1, Rahmat Budiarto2,*

1 Department of Computer Engineering, Ferdowsi University of Mashhad, Mashhad, 9177948974, Iran
2 Department of Informatics, Faculty of Science and Technology, Universitas Alazhar Indonesia, Jakarta, 12110, Indonesia

* Corresponding Author: Rahmat Budiarto. Email: email

(This article belongs to the Special Issue: Advances of AI and Blockchain technologies for Future Smart City)

Computers, Materials & Continua 2021, 69(3), 3495-3512. https://doi.org/10.32604/cmc.2021.019051

Abstract

Tele-medical information system provides an efficient and convenient way to connect patients at home with medical personnel in clinical centers. In this system, service providers consider user authentication as a critical requirement. To address this crucial requirement, various types of validation and key agreement protocols have been employed. The main problem with the two-way authentication of patients and medical servers is not built with thorough and comprehensive analysis that makes the protocol design yet has flaws. This paper analyzes carefully all aspects of security requirements including the perfect forward secrecy in order to develop an efficient and robust lightweight authentication and key agreement protocol. The secureness of the proposed protocol undergoes an informal analysis, whose findings show that different security features are provided, including perfect forward secrecy and a resistance to DoS attacks. Furthermore, it is simulated and formally analyzed using Scyther tool. Simulation results indicate the protocol’s robustness, both in perfect forward security and against various attacks. In addition, the proposed protocol was compared with those of other related protocols in term of time complexity and communication cost. The time complexity of the proposed protocol only involves time of performing a hash function Th, i.e.,: O(12Th). Average time required for executing the authentication is 0.006 seconds; with number of bit exchange is 704, both values are the lowest among the other protocols. The results of the comparison point to a superior performance by the proposed protocol.

Keywords


Cite This Article

APA Style
Seno, S.A.H., Nikooghadam, M., Budiarto, R. (2021). An efficient lightweight authentication and key agreement protocol for patient privacy. Computers, Materials & Continua, 69(3), 3495-3512. https://doi.org/10.32604/cmc.2021.019051
Vancouver Style
Seno SAH, Nikooghadam M, Budiarto R. An efficient lightweight authentication and key agreement protocol for patient privacy. Comput Mater Contin. 2021;69(3):3495-3512 https://doi.org/10.32604/cmc.2021.019051
IEEE Style
S. A. H. Seno, M. Nikooghadam, and R. Budiarto, “An Efficient Lightweight Authentication and Key Agreement Protocol for Patient Privacy,” Comput. Mater. Contin., vol. 69, no. 3, pp. 3495-3512, 2021. https://doi.org/10.32604/cmc.2021.019051

Citations




cc Copyright © 2021 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 2078

    View

  • 1115

    Download

  • 0

    Like

Share Link