A Secure and Lightweight RFID-Enabled Protocol for IoT Healthcare Environment: A Vector Space Based Approach

被引:10
作者
Shariq, Mohd [1 ,2 ]
Singh, Karan [1 ]
机构
[1] JNU, Sch Comp & Syst Sci, New Delhi, India
[2] Univ Padua, Dept Math, Padua, Italy
关键词
RFID; Authentication; Healthcare; Security; Anonymity; Untraceability; AUTHENTICATION PROTOCOL; PRIVACY; INTERNET; IDENTIFICATION; SCHEME; THINGS;
D O I
10.1007/s11277-022-09928-z
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Over some past decades, the data related to traditional medical privacy and many other similar cases are at serious risk of disclosure by a third party or an adversary. The risk of personal medical privacy data leakage by some insurance companies can disrupt the healthy environment of medical health industries as well as compromise the privacy of individuals. With the rapid evolution of Machine-to-Machine and Device-to-Device communication making our lives convenient, there has been an tremendous growth in the utilization of numerous Internet of Things (IoT) applications such as smart infrastructure, smart e-healthcare, smart cities, smart grid, smart governance, smart education, and many others. Nowadays, Radio Frequency IDentification (RFID)-enabled system is getting popular for privacy protection in healthcare systems, where RFID tags play a vital role in healthcare. Although, an adversary may tamper with the information of an RFID tag, compromise privacy along with increase forgery cases. To solve such issues, we propose an RFID-enabled authentication protocol for IoT healthcare environment based on a vector space approach to guarantee security in the healthcare system. We present a formal security analysis for the validation of our proposed protocol using BAN inference rules. The security analysis has been done to meet various security requirements such as tag location privacy, untraceability of the RFID tags, and tag anonymity. The performance security demonstrates that our protocol performs better in terms of computation and communication cost on comparing with other existing protocols.
引用
收藏
页码:3467 / 3491
页数:25
相关论文
共 48 条
[11]   Secure and Privacy-Preserving RFID Authentication Scheme for Internet of Things Applications [J].
Das, Manik Lal ;
Kumar, Pardeep ;
Martin, Andrew .
WIRELESS PERSONAL COMMUNICATIONS, 2020, 110 (01) :339-353
[12]   A Lightweight Authentication Scheme for Cloud-Based RFID Healthcare Systems [J].
Fan, Kai ;
Zhu, Shanshan ;
Zhang, Kuan ;
Li, Hui ;
Yang, Yintang .
IEEE NETWORK, 2019, 33 (02) :44-49
[13]   Lightweight RFID Protocol for Medical Privacy Protection in IoT [J].
Fan, Kai ;
Jiang, Wei ;
Li, Hui ;
Yang, Yintang .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (04) :1656-1665
[14]   A Provably Secure RFID Authentication Protocol Based on Elliptic Curve for Healthcare Environments [J].
Farash, Mohammad Sabzinejad ;
Nawaz, Omer ;
Mahmood, Khalid ;
Chaudhry, Shehzad Ashraf ;
Khan, Muhammad Khurram .
JOURNAL OF MEDICAL SYSTEMS, 2016, 40 (07)
[15]   An Analysis of RFID Authentication Schemes for Internet of Things in Healthcare Environment Using Elliptic Curve Cryptography [J].
He, Debiao ;
Zeadally, Sherali .
IEEE INTERNET OF THINGS JOURNAL, 2015, 2 (01) :72-83
[16]   Fog Computing Based Face Identification and Resolution Scheme in Internet of Things [J].
Hu, Pengfei ;
Ning, Huansheng ;
Qiu, Tie ;
Zhang, Yanfei ;
Luo, Xiong .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2017, 13 (04) :1910-1920
[17]   Review of different classes of RFID authentication protocols [J].
Ibrahim, Alaauldin ;
Dalkilic, Gokhan .
WIRELESS NETWORKS, 2019, 25 (03) :961-974
[18]   Defining Strong Privacy for RFID [J].
Juels, Ari ;
Weis, Stephen A. .
ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2009, 13 (01)
[19]  
Kaur S., 2012, INT J COMPUTER SCI E, V2, P1373
[20]   Securing the Internet of Things: A Standardization Perspective [J].
Keoh, Sye Loong ;
Kumar, Sandeep S. ;
Tschofenig, Hannes .
IEEE INTERNET OF THINGS JOURNAL, 2014, 1 (03) :265-275