Abstract
As a result of remarkable and continuous progress in Micro-Electro-Mechanical technologies, improved user-friendliness of low cast telecommunications like IoTs, mobile networks virtualization and intelligent technologies, we have novel healthcare delivery services with non-connection identification electronic components such as Radio Frequency Identification (RFID). RFID is extensively utilized in medical-oriented services like patient monitoring, object traceability, drug administration system, and Telecare medicine information system (TMIS), which receives special attention from healthcare management. TMIS works as a suspension bridge among patients staying at home, and doctors at healthcare organizations are authorized to validate the preciseness of exchanged data records among dissimilar organization participants. In recent times, TMIS adopted for patient data confidentiality, privacy protection, authentication, security, and safety over public channels. Researchers proposed a wide range of authentication protocols for RFID and TMIS by exploiting different cryptographic primitive solutions. However, most of them have large complex operations, scarce storage, and are not efficient. Whatever the security of TMIS improves, its application becomes wider. This paper designed an efficient and improved authentication protocol with high security for TMIS. The proposed protocol performance analysis in both Scyther and AVISPA tools shows that the protocol achieves high security and is well-suited for TMIS.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.