A Secure and Lightweight RFID-Enabled Protocol for IoT Healthcare Environment: A Vector Space Based Approach

被引:8
作者
Shariq, Mohd [1 ,2 ]
Singh, Karan [1 ]
机构
[1] JNU, Sch Comp & Syst Sci, New Delhi, India
[2] Univ Padua, Dept Math, Padua, Italy
关键词
RFID; Authentication; Healthcare; Security; Anonymity; Untraceability; AUTHENTICATION PROTOCOL; PRIVACY; INTERNET; IDENTIFICATION; SCHEME; THINGS;
D O I
10.1007/s11277-022-09928-z
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Over some past decades, the data related to traditional medical privacy and many other similar cases are at serious risk of disclosure by a third party or an adversary. The risk of personal medical privacy data leakage by some insurance companies can disrupt the healthy environment of medical health industries as well as compromise the privacy of individuals. With the rapid evolution of Machine-to-Machine and Device-to-Device communication making our lives convenient, there has been an tremendous growth in the utilization of numerous Internet of Things (IoT) applications such as smart infrastructure, smart e-healthcare, smart cities, smart grid, smart governance, smart education, and many others. Nowadays, Radio Frequency IDentification (RFID)-enabled system is getting popular for privacy protection in healthcare systems, where RFID tags play a vital role in healthcare. Although, an adversary may tamper with the information of an RFID tag, compromise privacy along with increase forgery cases. To solve such issues, we propose an RFID-enabled authentication protocol for IoT healthcare environment based on a vector space approach to guarantee security in the healthcare system. We present a formal security analysis for the validation of our proposed protocol using BAN inference rules. The security analysis has been done to meet various security requirements such as tag location privacy, untraceability of the RFID tags, and tag anonymity. The performance security demonstrates that our protocol performs better in terms of computation and communication cost on comparing with other existing protocols.
引用
收藏
页码:3467 / 3491
页数:25
相关论文
共 48 条
  • [11] Secure and Privacy-Preserving RFID Authentication Scheme for Internet of Things Applications
    Das, Manik Lal
    Kumar, Pardeep
    Martin, Andrew
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2020, 110 (01) : 339 - 353
  • [12] A Lightweight Authentication Scheme for Cloud-Based RFID Healthcare Systems
    Fan, Kai
    Zhu, Shanshan
    Zhang, Kuan
    Li, Hui
    Yang, Yintang
    [J]. IEEE NETWORK, 2019, 33 (02): : 44 - 49
  • [13] Lightweight RFID Protocol for Medical Privacy Protection in IoT
    Fan, Kai
    Jiang, Wei
    Li, Hui
    Yang, Yintang
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (04) : 1656 - 1665
  • [14] A Provably Secure RFID Authentication Protocol Based on Elliptic Curve for Healthcare Environments
    Farash, Mohammad Sabzinejad
    Nawaz, Omer
    Mahmood, Khalid
    Chaudhry, Shehzad Ashraf
    Khan, Muhammad Khurram
    [J]. JOURNAL OF MEDICAL SYSTEMS, 2016, 40 (07)
  • [15] An Analysis of RFID Authentication Schemes for Internet of Things in Healthcare Environment Using Elliptic Curve Cryptography
    He, Debiao
    Zeadally, Sherali
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2015, 2 (01): : 72 - 83
  • [16] Fog Computing Based Face Identification and Resolution Scheme in Internet of Things
    Hu, Pengfei
    Ning, Huansheng
    Qiu, Tie
    Zhang, Yanfei
    Luo, Xiong
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2017, 13 (04) : 1910 - 1920
  • [17] Review of different classes of RFID authentication protocols
    Ibrahim, Alaauldin
    Dalkilic, Gokhan
    [J]. WIRELESS NETWORKS, 2019, 25 (03) : 961 - 974
  • [18] Defining Strong Privacy for RFID
    Juels, Ari
    Weis, Stephen A.
    [J]. ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2009, 13 (01)
  • [19] Kaur S., 2012, INT J COMPUTER SCI E, V2, P1373
  • [20] Securing the Internet of Things: A Standardization Perspective
    Keoh, Sye Loong
    Kumar, Sandeep S.
    Tschofenig, Hannes
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2014, 1 (03): : 265 - 275