An intelligent RFID-enabled authentication scheme for healthcare applications in vehicular mobile cloud

被引:67
|
作者
Kumar, Neeraj [1 ]
Kaur, Kuljeet [1 ]
Misra, Subhas C. [2 ]
Iqbal, Rahat [3 ]
机构
[1] Thapar Univ, Dept Comp Sci & Engn, Patiala, Punjab, India
[2] Indian Inst Technol, Dept Ind & Management Engn, Kanpur, Uttar Pradesh, India
[3] Coventry Univ, Dept Comp & Digital Environm, Coventry, W Midlands, England
关键词
RFID; Healthcare applications; Authentication mechanism; Petri net; Learning; BAYESIAN COALITION GAME; IMPLEMENTATION; TECHNOLOGY; INTERNET; SERVICE; TAG;
D O I
10.1007/s12083-015-0332-4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, vehicular cloud computing (VCC) has emerged as the one of the fast growing technologies with an aim to provide uninterrupted services to the moving clients even on-the-fly. One of the services provided by VCC is the mobile healthcare in which patient can be provided diagonosis from anywhere during their mobility. This paper proposes an intelligent RFID-enabled authentication scheme for healthcare applications in VCC environment. In the proposed scheme, a Petri Nets-based authentication model is used for authentication of tags, and readers. Both server, and tag authentications are protected by strong elliptical curve cryptography (ECC)-based key generation mechanism. The proposed scheme is found to be secure with respect to mutual authentication of servers and tags, replay attack, tracking attack, users anonymity, eavesdropping, and cloning with forward secrecy. To evaluate the effectiveness of the proposed scheme, it is evaluated with respect to the overhead generated, computation complexity, and % service delivery, where its performance is found better than the case where it is not applied.
引用
收藏
页码:824 / 840
页数:17
相关论文
共 50 条
  • [1] An intelligent RFID-enabled authentication scheme for healthcare applications in vehicular mobile cloud
    Neeraj Kumar
    Kuljeet Kaur
    Subhas C. Misra
    Rahat Iqbal
    Peer-to-Peer Networking and Applications, 2016, 9 : 824 - 840
  • [2] A provably secure authentication scheme for RFID-enabled UAV applications
    Gope, Prosanta
    Millwood, Owen
    Saxena, Neetesh
    COMPUTER COMMUNICATIONS, 2021, 166 : 19 - 25
  • [3] An Intelligent RFID-Enabled Authentication Protocol in VANET
    Shabani, Fateme
    Gharaee, Hossein
    Ghaffari, Fariba
    2018 9TH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), 2018, : 587 - 591
  • [4] Cryptanalysis of an RFID-Enabled Authentication Protocol for Healthcare
    Ghosh, Haradhan
    Maurya, Pramod Kumar
    Bagchi, Satya
    WIRELESS PERSONAL COMMUNICATIONS, 2024, 138 (04) : 2613 - 2635
  • [5] Anonymous and reliable ultralightweight RFID-enabled authentication scheme for IoT systems in cloud computing
    Shariq, Mohd
    Conti, Mauro
    Singh, Karan
    Lal, Chhagan
    Das, Ashok Kumar
    Chaudhry, Shehzad Ashraf
    Masud, Mehedi
    COMPUTER NETWORKS, 2024, 252
  • [6] Software abstractions for mobile RFID-enabled applications
    Carreton, Andoni Lombide
    Pinte, Kevin
    De Meuter, Wolfgang
    SOFTWARE-PRACTICE & EXPERIENCE, 2013, 43 (10): : 1219 - 1239
  • [7] A literature review of RFID-enabled healthcare applications and issues
    Wamba, Samuel Fosso
    Anand, Abhijith
    Carter, Lemuria
    INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 2013, 33 (05) : 875 - 891
  • [8] An Improved IoT/RFID-Enabled Object Tracking and Authentication Scheme for Smart Logistics
    Alzahrani, Bander A.
    Irshad, Azeem
    WIRELESS PERSONAL COMMUNICATIONS, 2023, 129 (01) : 399 - 422
  • [9] An Improved IoT/RFID-Enabled Object Tracking and Authentication Scheme for Smart Logistics
    Bander A. Alzahrani
    Azeem Irshad
    Wireless Personal Communications, 2023, 129 : 399 - 422
  • [10] Continuous RFID-Enabled Authentication: Privacy Implications
    Kurkovsky, Stan
    Syta, Ewa
    Casano, Bernardo
    IEEE TECHNOLOGY AND SOCIETY MAGAZINE, 2011, 30 (03) : 34 - 41