An efficient and reliable ultralightweight RFID authentication scheme for healthcare systems

被引:13
作者
Kumar, Anand [1 ]
Singh, Karan [1 ]
Shariq, Mohd [1 ,3 ]
Lal, Chhagan [2 ]
Conti, Mauro [3 ]
Amin, Ruhul [4 ]
Chaudhry, Shehzad Ashraf [5 ]
机构
[1] Jawaharlal Nehru Univ, Sch Comp & Syst Sci, New Delhi 110067, India
[2] Delft Univ Technol, Dept Intelligent Syst, CyberSecur Grp, Delft, Netherlands
[3] Univ Padua, Dept Math, I-35131 Padua, Italy
[4] NIT, Dept Comp Sci & Engn, Jamshedpur, Jharkhand, India
[5] Abu Dhabi Univ, Coll Engn, Dept Comp Sci & Informat Technol, Abu Dhabi, U Arab Emirates
关键词
ICT; RFID; Ultralightweight; Authentication; Reformation; TECHNOLOGY;
D O I
10.1016/j.comcom.2023.04.013
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the era of the Internet of Communication Technologies (ICT), the Internet is becoming more popular and widely used across the world. Radio Frequency IDentification (RFID) has become a prominent technology in healthcare systems for identifying tagged objects. The RFID tags are attached to the billions of different healthcare devices or things in several associated applications. However, RFID tags' security and privacy are regarded as the two biggest concerns. An adversary might eavesdrop, tamper, or even intercept the transmitted messages in RFID systems. Also, the privacy of the users (patients, doctors, and nurses) may breach. In past years, numerous ultralightweight RFID authentication schemes have been proposed in the healthcare sector. However, all these schemes were pointed out as insecure under several known security attacks namely, replay, impersonation, full-disclosure, and de-synchronization attacks. Keeping in view such security flaws, we present an efficient and reliable ultralightweight RFID authentication scheme (ER2AS) for healthcare systems to enhance patients' medication safety. The scheme employs bitwise XOR, circular left-right rotations, and our proposed ultralighweight reformation operation to achieve higher-level security. The security and privacy evaluations demonstrate that ER2AS scheme resists several known security attacks. The performance analysis also demonstrates that it incurs lower computation and storage overhead on the RFID tags, thus making it practical to be implemented in real-time healthcare environments.
引用
收藏
页码:147 / 157
页数:11
相关论文
共 42 条
[11]  
Dinarvand N., 2016, Majlesi J. Telecommun. Devices, V5
[12]   An efficient and secure RFID authentication protocol using elliptic curve cryptography [J].
Dinarvand, Negin ;
Barati, Hamid .
WIRELESS NETWORKS, 2019, 25 (01) :415-428
[13]   Cloud-based lightweight secure RFID mutual authentication protocol in IoT [J].
Fan, Kai ;
Luo, Qi ;
Zhang, Kuan ;
Yang, Yintang .
INFORMATION SCIENCES, 2020, 527 :329-340
[14]   A Lightweight Authentication Scheme for Cloud-Based RFID Healthcare Systems [J].
Fan, Kai ;
Zhu, Shanshan ;
Zhang, Kuan ;
Li, Hui ;
Yang, Yintang .
IEEE NETWORK, 2019, 33 (02) :44-49
[15]   Lightweight RFID Protocol for Medical Privacy Protection in IoT [J].
Fan, Kai ;
Jiang, Wei ;
Li, Hui ;
Yang, Yintang .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (04) :1656-1665
[16]   A Provably Secure RFID Authentication Protocol Based on Elliptic Curve for Healthcare Environments [J].
Farash, Mohammad Sabzinejad ;
Nawaz, Omer ;
Mahmood, Khalid ;
Chaudhry, Shehzad Ashraf ;
Khan, Muhammad Khurram .
JOURNAL OF MEDICAL SYSTEMS, 2016, 40 (07)
[17]   RFID Applications and Adoptions in Healthcare: A Review on Patient Safety [J].
Haddara, Moutaz ;
Staaby, Anna .
CENTERIS 2018 - INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS / PROJMAN 2018 - INTERNATIONAL CONFERENCE ON PROJECT MANAGEMENT / HCIST 2018 - INTERNATIONAL CONFERENCE ON HEALTH AND SOCIAL CARE INFORMATION SYSTEMS AND TECHNOLOGIES, CENTERI, 2018, 138 :80-88
[18]   An Analysis of RFID Authentication Schemes for Internet of Things in Healthcare Environment Using Elliptic Curve Cryptography [J].
He, Debiao ;
Zeadally, Sherali .
IEEE INTERNET OF THINGS JOURNAL, 2015, 2 (01) :72-83
[19]  
Iyer Sridhar., 2005, RFID: Technology and Applications
[20]  
Lopez P., 2008, LIGHTWEIGHT CRYPTOGR