Open Access iconOpen Access

ARTICLE

crossmark

An Efficient Lightweight Authentication and Key Agreement Protocol for Patient Privacy

Seyed Amin Hosseini Seno1, Mahdi Nikooghadam1, Rahmat Budiarto2,*

1 Department of Computer Engineering, Ferdowsi University of Mashhad, Mashhad, 9177948974, Iran
2 Department of Informatics, Faculty of Science and Technology, Universitas Alazhar Indonesia, Jakarta, 12110, Indonesia

* Corresponding Author: Rahmat Budiarto. Email: email

(This article belongs to this Special Issue: Advances of AI and Blockchain technologies for Future Smart City)

Computers, Materials & Continua 2021, 69(3), 3495-3512. https://doi.org/10.32604/cmc.2021.019051

Abstract

Tele-medical information system provides an efficient and convenient way to connect patients at home with medical personnel in clinical centers. In this system, service providers consider user authentication as a critical requirement. To address this crucial requirement, various types of validation and key agreement protocols have been employed. The main problem with the two-way authentication of patients and medical servers is not built with thorough and comprehensive analysis that makes the protocol design yet has flaws. This paper analyzes carefully all aspects of security requirements including the perfect forward secrecy in order to develop an efficient and robust lightweight authentication and key agreement protocol. The secureness of the proposed protocol undergoes an informal analysis, whose findings show that different security features are provided, including perfect forward secrecy and a resistance to DoS attacks. Furthermore, it is simulated and formally analyzed using Scyther tool. Simulation results indicate the protocol’s robustness, both in perfect forward security and against various attacks. In addition, the proposed protocol was compared with those of other related protocols in term of time complexity and communication cost. The time complexity of the proposed protocol only involves time of performing a hash function Th, i.e.,: O(12Th). Average time required for executing the authentication is 0.006 seconds; with number of bit exchange is 704, both values are the lowest among the other protocols. The results of the comparison point to a superior performance by the proposed protocol.

Keywords


Cite This Article

S. Amin Hosseini Seno, M. Nikooghadam and R. Budiarto, "An efficient lightweight authentication and key agreement protocol for patient privacy," Computers, Materials & Continua, vol. 69, no.3, pp. 3495–3512, 2021.

Citations




cc This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 1803

    View

  • 939

    Download

  • 0

    Like

Share Link