A provably secure RFID authentication protocol based on ECQV for the medical internet of things

被引:20
作者
Agrahari, Abhay Kumar [1 ]
Varma, Shirshu [1 ]
机构
[1] Indian Inst Informat Technol, Allahabad, Uttar Pradesh, India
关键词
RFID; Internet of things; Cryptography; Healthcare; Authentication; ELLIPTIC CURVE;
D O I
10.1007/s12083-020-01069-z
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Radio Frequency Identification (RFID) is an emerging technology that is used for the unique identification of objects. RFID can be used in different application domains, including Health-care systems, where the safety of patient-sensitive data is a primary concern. Since the RFID technology is used in various medicine sectors, particularly real-time patient monitoring, patient medicine Information, medical emergency, and drug administration system, the use of RFID raises severe security and privacy concerns. In order to cope with these security issues, we propose an Elliptic curve based authentication protocol for RFID. The proposed model uses an implicit certificate concept to secure health-care data. We prove this claim for secure communication using the formal security analysis, i.e., BAN logic, security analysis based on the mathematical model, i.e., ROR model, formal verification using AVISPA tool, and informal security analysis. We review some of the RFID authentication schemes based on ECC in terms of performance and security. Our analysis indicates that the proposed protocol provides mobility, scalability, security, and privacy in the health care environment.
引用
收藏
页码:1277 / 1289
页数:13
相关论文
共 39 条
[1]  
Agrahari AK, 2020, AUTHENTICATION RFID, P217
[2]   A secure ECC-based RFID mutual authentication protocol for internet of things [J].
Alamr, Amjad Ali ;
Kausar, Firdous ;
Kim, Jongsung ;
Seo, Changho .
JOURNAL OF SUPERCOMPUTING, 2018, 74 (09) :4281-4294
[3]   An efficient and secure authentication and key agreement scheme for session initiation protocol using ECC [J].
Arshad, Hamed ;
Nikooghadam, Morteza .
MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (01) :181-197
[4]  
AVISPA, 2018, AUT VAL INT SEC PROT
[5]  
Barker E., 2012, SP 800-90A: Recommendation for Random Number Generation Using Deterministic Random Bit Generators
[6]  
Bellare M., 1993, 1 ACM C COMP COMM SE, P62
[7]  
Berenjian S, 2019, 2019 IEEE CONFERENCE ON APPLICATION, INFORMATION AND NETWORK SECURITY (AINS), P71, DOI [10.1109/ains47559.2019.8968699, 10.1109/AINS47559.2019.8968699]
[8]  
Berenjian S, 2016, 2016 IEEE 8TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS (IS), P709, DOI 10.1109/IS.2016.7737389
[9]   Logic of authentication [J].
Burrows, Michael ;
Abadi, Martin ;
Needham, Roger .
Operating Systems Review (ACM), 1989, 23 (05) :1-13
[10]  
Cai S., 2009, P 2 ACM C WIR NETW S, P51, DOI DOI 10.1145/1514274.1514282