A provably secure RFID authentication protocol based on ECQV for the medical internet of things

被引:20
作者
Agrahari, Abhay Kumar [1 ]
Varma, Shirshu [1 ]
机构
[1] Indian Inst Informat Technol, Allahabad, Uttar Pradesh, India
关键词
RFID; Internet of things; Cryptography; Healthcare; Authentication; ELLIPTIC CURVE;
D O I
10.1007/s12083-020-01069-z
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Radio Frequency Identification (RFID) is an emerging technology that is used for the unique identification of objects. RFID can be used in different application domains, including Health-care systems, where the safety of patient-sensitive data is a primary concern. Since the RFID technology is used in various medicine sectors, particularly real-time patient monitoring, patient medicine Information, medical emergency, and drug administration system, the use of RFID raises severe security and privacy concerns. In order to cope with these security issues, we propose an Elliptic curve based authentication protocol for RFID. The proposed model uses an implicit certificate concept to secure health-care data. We prove this claim for secure communication using the formal security analysis, i.e., BAN logic, security analysis based on the mathematical model, i.e., ROR model, formal verification using AVISPA tool, and informal security analysis. We review some of the RFID authentication schemes based on ECC in terms of performance and security. Our analysis indicates that the proposed protocol provides mobility, scalability, security, and privacy in the health care environment.
引用
收藏
页码:1277 / 1289
页数:13
相关论文
共 39 条
[31]  
Qiu SM, 2019, KSII T INTERNET INF, V13, P978
[32]   A Privacy Preserving three-factor authenticated key agreement protocol for client-server environment [J].
Reddy, Alavalapati Goutham ;
Das, Ashok Kumar ;
Odelu, Vanga ;
Ahmad, Awais ;
Shin, Ji Sun .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2019, 10 (02) :661-680
[33]  
SEC 2, 2010, REC ELL CURV DOM PAR
[34]  
SECG, 2009, SEC 1 ELL CURV CRYPT
[35]   Anonymous Lightweight Chaotic Map-Based Authenticated Key Agreement Protocol for Industrial Internet of Things [J].
Srinivas, Jangirala ;
Das, Ashok Kumar ;
Wazid, Mohammad ;
Kumar, Neeraj .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (06) :1133-1146
[36]   A lightweight and anonymous RFID tag authentication protocol with cloud assistance for e-healthcare applications [J].
Wu, Fan ;
Xu, Lili ;
Kumari, Saru ;
Li, Xiong ;
Das, Ashok Kumar ;
Shen, Jian .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2018, 9 (04) :919-930
[37]  
Yang J., 2005, ECRYPT WORKSHOP RFID, P17, DOI DOI 10.1109/APSCC.2010.22
[38]   An Efficient RFID Authentication Protocol to Enhance Patient Medication Safety Using Elliptic Curve Cryptography [J].
Zhang, Zezhong ;
Qi, Qingqing .
JOURNAL OF MEDICAL SYSTEMS, 2014, 38 (05)
[39]   An Efficient Anonymous Authentication Scheme for Wireless Body Area Networks Using Elliptic Curve Cryptosystem [J].
Zhao, Zhenguo .
JOURNAL OF MEDICAL SYSTEMS, 2014, 38 (02)