Design and analysis of telemedicine authentication protocol Online publication date: Tue, 09-Nov-2021
by Lijuan Zheng; Chunlei Song; Rui Zhang; Baoqing Lv; Yujin Liu; Meng Cui; Lili Meng
International Journal of Sensor Networks (IJSNET), Vol. 37, No. 3, 2021
Abstract: In recent years, in order to protect the security of medical privacy data, a large number of telemedicine authentication protocols have been proposed. Some protocols use digital signature methods to achieve two-way authentication among patients, doctors and medical servers, so the execution efficiency of protocol is low. Some protocols fail to achieve patient identity anonymity, the true identity of patient can be analysed by the doctor, so it can't resist security attacks. In order to solve the above problems, a more secure telemedicine authentication protocol is proposed in this paper, which implements two-way identity authentication in the telemedicine authentication model using SHA-1 hash function, time stamp and random number operations. In addition, the introduction of temporary identity can achieve patient identity anonymity and personal medical data security. The protocol has better performance in terms of security, storage and computing overhead, it is more suitable for telemedicine authentication system.
Online publication date: Tue, 09-Nov-2021
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Sensor Networks (IJSNET):
Login with your Inderscience username and password:
Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.
If you still need assistance, please email email@example.com