Research Article
Secure Patient Authentication Framework in the Healthcare System Using Wireless Medical Sensor Networks
Algorithm 1
Algorithmic representation of the proposed protocol.
(1) | Provide Identity, Password | (2) | Extract saved credentials from the server | (3) | if (A==A) then | (4) | Transmits Message1 | (5) | if(T − T1 ≤ ∆T) then | (6) | Extracts O from the record of GW | (7) | = F ⊕ h(R1||A||T1), B = h(||A||R1), = J2 ⊕ h(A||T1) | (8) | and J1 = h(||B||||T1) | (9) | if(J1==J1) then | (10) | key and computes | (11) | L3 = h(h(h(IDia||||R2))||IDSN||R2), | (12) | L4 = h(IDia||R1||R2) ⊕ sk, L5 = R2 ⊕ IDSN and L6 = El(IDSN||R1||R2||L5) | (13) | Transmits Message2 and computes | (14) | = L5 ⊕ sk, L7 = L4 ⊕ sk, L8 = h(h(L7||IDP)||sk||) and | (15) | = h(h(h(IDia||||))||IDSN||R2) | (16) | if(==L3) then | (17) | key | (18) | Computes | (19) | if(==L13) | (20) | key | (21) | Return(1) Pass | (22) | else | (23) | Return(0), fail | (24) | end if | (25) | Return(1) Pass | (26) | else | (27) | Return(0), fail | (28) | end if | (29) | else | (30) | Return(1), Pass | (31) | end if | (32) | else | (33) | Return(1) Pass | (34) | end if | (35) | else | (36) | Return(1), Pass | (37) | end if |
|