Research Article
Secure Patient Authentication Framework in the Healthcare System Using Wireless Medical Sensor Networks
Algorithm 1
Algorithmic representation of the proposed protocol.
| (1) | Provide Identity, Password | | (2) | Extract saved credentials from the server | | (3) | if (A==A) then | | (4) | Transmits Message1 | | (5) | if(T − T1 ≤ ∆T) then | | (6) | Extracts O from the record of GW | | (7) | = F ⊕ h(R1||A||T1), B = h(||A||R1), = J2 ⊕ h(A||T1) | | (8) | and J1 = h(||B||||T1) | | (9) | if(J1==J1) then | | (10) | key and computes | | (11) | L3 = h(h(h(IDia||||R2))||IDSN||R2), | | (12) | L4 = h(IDia||R1||R2) ⊕ sk, L5 = R2 ⊕ IDSN and L6 = El(IDSN||R1||R2||L5) | | (13) | Transmits Message2 and computes | | (14) | = L5 ⊕ sk, L7 = L4 ⊕ sk, L8 = h(h(L7||IDP)||sk||) and | | (15) | = h(h(h(IDia||||))||IDSN||R2) | | (16) | if(==L3) then | | (17) | key | | (18) | Computes | | (19) | if(==L13) | | (20) | key | | (21) | Return(1) Pass | | (22) | else | | (23) | Return(0), fail | | (24) | end if | | (25) | Return(1) Pass | | (26) | else | | (27) | Return(0), fail | | (28) | end if | | (29) | else | | (30) | Return(1), Pass | | (31) | end if | | (32) | else | | (33) | Return(1) Pass | | (34) | end if | | (35) | else | | (36) | Return(1), Pass | | (37) | end if |
|