Title: Enhanced tiny encryption algorithm for secure electronic health authentication system

Authors: Yunusa Simpa Abdulsalam; Olayemi Mikail Olaniyi; Aliyu Ahmed

Addresses: Computer Engineering Department, Federal University of Technology Minna, Niger State, Nigeria ' Computer Engineering Department, Federal University of Technology Minna, Niger State, Nigeria ' Computer Engineering Department, Federal University of Technology Minna, Niger State, Nigeria

Abstract: One of the main worries circling the globe today is how to provide efficient and effective quality health services. Conventionally, part of the constraints in making these efficient quality health services possible is the fact that patients and consultants must be physically present in the same location. Modern development in information technology have been able to raise the number of possible ways healthcare can be delivered remotely to reduce medical access restraints, but the issue of patient authentication remains paramount. As more delicate data is stored in electronic health record (EHR) systems, there is need to provide effective security to avoid malicious attacks through illicit access to EHRs. This paper presents an enhancement to tiny encryption algorithm for secure near frequency communication based EHR system. The conventional tiny encryption algorithm was enhanced with Yarrow pseudo random number generator for better key randomisation. Results of the performance evaluation of the developed enhanced algorithm showed that the scheme is capable of providing countermeasures against replay and tag cloning attacks in data communication channels of clinic tele-consultations.

Keywords: electronic health record; EHR; security; authentication; privacy; tiny encryption algorithm; TEA; healthcare.

DOI: 10.1504/IJIPSI.2018.092064

International Journal of Information Privacy, Security and Integrity, 2018 Vol.3 No.3, pp.230 - 252

Received: 30 Aug 2017
Accepted: 28 Feb 2018

Published online: 30 May 2018 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article