Open Access Open Access  Restricted Access Subscription Access

Authentication using Elliptical Curve Cryptography for e-Healthcare System

V. P. Gaikwad, Rutuja Somkuwar, Mrunali Barde, Jagruti Burde, Tejaswini Vaidya

Abstract


Medical record's security attracts a lot of attention these days. Whatever the security of health care improves, its application becomes wider. Li et al. marked this issue by proposing a new privacy preserving RFID authentication protocol for e-health care.[1] Medical systems allow various services and ensures privacy concerns. Wu et al. planned a card-based authentication scheme for medical systems. With the development in technology, doctors can provide better services, via various modes, by using mobile, computers, wireless devices both doctors and patients will be able to keep up with their medical condition. Moreover, information related to health care is bit sensitive and needs encrypted transfer, storage. A lot of schemes are being proposed against concerned security attacks. In this paper, we have proposed protocol which can be used to authenticate both client and server end, which will ensure safe transfer and will manage the time and cost of computation.

Full Text:

PDF

References


Masoumeh Safkhani and Athanasios Vasilakos. A new secure authentication protocol for telecare medicine information system and smart campus. Digital Object Identifier,2019

Muhammad Umair Aslam, Abdelouahid Derhab, Kashif Saleem. A survey of authentication schemes in telecare medicine information systems. Springer Science+Business Media, 2016

Iskandar Setiadi, Elliptic Curve Cryptography: Algorithms and Implementation Analysis over Coordinate Systems.In: https://www.researchgate.net/publication/268688957,2014

Maitra, T., Obaidat, M.S., Islam, S. H., Giri, D., and Amin, R : Security analysis and design of an efficient ecc-based two –factor password authentication scheme. Security and Communication Networks (2016) n/a-n/aSec 1596 doi:10.1002/sec.1596.

Wang, D., Wang, P. On the anonymity of two-factor authentication schemes for wireless sensor network: attack, principal and solution.Comput.Netw.2014.73:41-57p

Khan, F.A. et al. A cloud-based healthcare framework for security and patient’s data privacy using wireless body area networks. In: Procedia Computer Science.2014. 34:511-517p.

Zhu, Z. An efficient authentication scheme for telecare medicine information systems. J. Med. Syst. 2012.36(6):3833-3838p.


Refbacks

  • There are currently no refbacks.