DDMIA: Distributed Dynamic Mutual Identity Authentication for Referrals in Blockchain-Based Health Care Networks
نویسندگان
چکیده
Patients go to multiple healthcare providers for treatment, and their health data is generally distributed among providers. The the decentralized care system structure make it ideal blockchain-based information systems. authors consider referral use case; instance, a patient goes his primary Centre (PHC) treatment referred hospital. Authentication usually done using certificates or key cryptography, which could become cumbersome when parties are involved in interaction. security requirements were defined, novel multi-party, mutual identity authentication scheme called “Distributed Dynamic Mutual Identity (DDMIA)” was proposed case e-health network. DDMIA enables PHC authenticate designed Elliptic Curve Cryptography. It proven be secure by assuming hardness of elliptic curve discrete log problem (ECDLP) computational Diffie–Hellman (ECDH) CK-Model. formal analysis BAN logic proved that sessions after authentication. simulated AVISPA tool safe against all active attacks. allows authenticated without registering with parties. eliminates need registration centers as well digital certificates. Hence, can implemented similar multiparty networks.
منابع مشابه
A TESLA-based mutual authentication protocol for GSM networks
The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...
متن کاملIdentity Based Message Authentication for Dynamic Networks
This paper presents a message authentication scheme built on top of an original construct that combines a simple form of identity based cryptography with an iterated version of RSA. Our scheme blends the features of identity based cryptography and stream authentication while at the same time offering security comparable to that of the basic RSA cryptosystem. As opposed to other authentication s...
متن کاملA Distributed Authentication Model for an E-Health Network Using Blockchain
Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...
متن کاملA Distributed Authentication Model for an E-Health Network Using Blockchain
Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...
متن کاملDynamic Distributed Authentication Scheme for Wireless LAN-Based Mesh Networks
Wireless LAN systems have been deployed for wireless internet services for hot spots, home, or offices. Recently, WLAN-Based Mesh Networking is developed with the benefit of easy deployment and easy configuration. Due to the characteristic of distributed environment, Wireless Mesh Networks(WMNs) need a new authentication scheme which allows multi-hop communication. In this paper, we propose a d...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2022
ISSN: ['2169-3536']
DOI: https://doi.org/10.1109/access.2022.3193238