Open Access iconOpen Access

ARTICLE

crossmark

Efficient Joint Key Authentication Model in E-Healthcare

by Muhammad Sajjad1, Tauqeer Safdar Malik1, Shahzada Khurram2, Akber Abid Gardezi3, Fawaz Alassery4, Habib Hamam5, Omar Cheikhrouhou6, Muhammad Shafiq7,*

1 Department of Computer Science, Air University Multan Campus, Multan, 60000, Pakistan
2 Faculty of Computing, The Islamia University of Bahawalpur, Bahawalpur 63100, Pakistan
3 Department of Computer Science, COMSATS University Islamabad, Islamabad, Pakistan
4 Department of Computer Engineering, College of Computers and Information Technology, Taif University, Taif, Saudi Arabia
5 Faculty of Engineering, Moncton University, NB, E1A3E9, Canada
6 CES Laboratory, National School of Engineers of Sfax, University of Sfax, Sfax, 3038, Tunisia
7 Department of Information and Communication Engineering, Yeungnam University, Gyeongsan, 38541, Korea

* Corresponding Author: Muhammad Shafiq. Email: email

Computers, Materials & Continua 2022, 71(2), 2739-2753. https://doi.org/10.32604/cmc.2022.022706

Abstract

Many patients have begun to use mobile applications to handle different health needs because they can better access high-speed Internet and smartphones. These devices and mobile applications are now increasingly used and integrated through the medical Internet of Things (mIoT). mIoT is an important part of the digital transformation of healthcare, because it can introduce new business models and allow efficiency improvements, cost control and improve patient experience. In the mIoT system, when migrating from traditional medical services to electronic medical services, patient protection and privacy are the priorities of each stakeholder. Therefore, it is recommended to use different user authentication and authorization methods to improve security and privacy. In this paper, our prosed model involves a shared identity verification process with different situations in the e-health system. We aim to reduce the strict and formal specification of the joint key authentication model. We use the AVISPA tool to verify through the well-known HLPSL specification language to develop user authentication and smart card use cases in a user-friendly environment. Our model has economic and strategic advantages for healthcare organizations and healthcare workers. The medical staff can increase their knowledge and ability to analyze medical data more easily. Our model can continuously track health indicators to automatically manage treatments and monitor health data in real time. Further, it can help customers prevent chronic diseases with the enhanced cognitive functions support. The necessity for efficient identity verification in e-health care is even more crucial for cognitive mitigation because we increasingly rely on mIoT systems.

Keywords


Cite This Article

APA Style
Sajjad, M., Malik, T.S., Khurram, S., Gardezi, A.A., Alassery, F. et al. (2022). Efficient joint key authentication model in e-healthcare. Computers, Materials & Continua, 71(2), 2739-2753. https://doi.org/10.32604/cmc.2022.022706
Vancouver Style
Sajjad M, Malik TS, Khurram S, Gardezi AA, Alassery F, Hamam H, et al. Efficient joint key authentication model in e-healthcare. Comput Mater Contin. 2022;71(2):2739-2753 https://doi.org/10.32604/cmc.2022.022706
IEEE Style
M. Sajjad et al., “Efficient Joint Key Authentication Model in E-Healthcare,” Comput. Mater. Contin., vol. 71, no. 2, pp. 2739-2753, 2022. https://doi.org/10.32604/cmc.2022.022706

Citations




cc Copyright © 2022 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 2206

    View

  • 1180

    Download

  • 0

    Like

Share Link