Privacy-Preserving Mutual Authentication and Key Agreement Scheme for Multi-Server Healthcare System

by   Trupil Limbasiya, et al.

The usage of different technologies and smart devices helps people to get medical services remotely for multiple benefits. Thus, critical and sensitive data is exchanged between a user and a doctor. When health data is transmitted over a common channel, it becomes essential to preserve various privacy and security properties in the system. Further, the number of users for remote services is increasing day-by-day exponentially, and thus, it is not adequate to deal with all users using the one server due to the verification overhead, server failure, and scalability issues. Thus, researchers proposed various authentication protocols for multi-server architecture, but most of them are vulnerable to different security attacks and require high computational resources during the implementation. To Tackle privacy and security issues using less computational resources, we propose a privacy-preserving mutual authentication and key agreement protocol for a multi-server healthcare system. We discuss the proposed scheme's security analysis and performance results to understand its security strengths and the computational resource requirement, respectively. Further, we do the comparison of security and performance results with recent relevant authentication protocols.



page 1

page 2

page 3

page 4


Secure and Energy-Efficient Key-Agreement Protocol for Multi-Server Architecture

Authentication schemes are practised globally to verify the legitimacy o...

RAMHU: A New Robust Lightweight Scheme for Mutual Users Authentication in Healthcare Applications

Providing a mechanism to authenticate users in healthcare applications i...

Detection and Prevention of New Attacks for ID-based Authentication Protocols

The rapid development of information and network technologies motivates ...

IVeri: Privacy-Preserving Interdomain Verification

In an interdomain network, autonomous systems (ASes) often establish pee...

Cyclic group based mutual authentication protocol for RFID system

Widespread deployment of RFID system arises security and privacy concern...

Privacy-aware Secure Region-based Handover for Small Cell Networks in 5G-enabled Mobile Communication

The 5G mobile communication network provides seamless communications bet...

Achieving Trust-Based and Privacy-Preserving Customer Selection in Ubiquitous Computing

The recent proliferation of smart devices has given rise to ubiquitous c...
This week in AI

Get the week's most popular data science and artificial intelligence research sent straight to your inbox every Saturday.