A Secure RFID Authentication Scheme for Healthcare Environments Based on Digital Signature Algorithm

被引:0
作者
Benssalah, Mustapha [1 ]
Djeddou, Mustapha [1 ]
Drouiche, Karim [2 ]
机构
[1] Ecole Mil Polytech, Signal Proc Lab, BP 17 Bordj Bahri, Algiers 16111, Algeria
[2] Cergy Pontoise Univ, Theoret Phys & Modeling Lab, F-95302 Cergy Pontoise, France
来源
2018 INTERNATIONAL SYMPOSIUM ON NETWORKS, COMPUTERS AND COMMUNICATIONS (ISNCC 2018) | 2018年
关键词
RFID; Elliptic Curve Cryptography; Authentication;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Radio Frequency Identification (RFID) technology can help a wide range of individuals and organizations realize significant productivity expansions and efficiencies. It provides also an efficient and accurate access to medical data for health professionals. In this paper, first we investigate the security of Zhao's protocol, which has been recently proposed as a secure RFID authentication protocol for healthcare environments. We show that the proposed enhancements, to overcome the key compromise problem in Liao and Hsiao protocol, remains vulnerable to tracking attack. Therefore, with the aim of increasing patient safety, we propose a new authentication scheme based on elliptic curve digital signature algorithm (ECDSA) combined with a recursive hash function. The security analysis shows that the suggested scheme could solve security weaknesses of Zhao's protocol and some previously proposed protocols. In addition, the proposed scheme is more efficient in terms of communication and computational cost compared to that of the related protocols.
引用
收藏
页数:6
相关论文
共 50 条
  • [31] A secure cross-domain authentication scheme based on threshold signature for MEC
    Chen, Lei
    Guo, Chong
    Gong, Bei
    Waqas, Muhammad
    Deng, Lihua
    Qin, Haowen
    JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2024, 13 (01):
  • [32] A Scalable and Secure Key Distribution Scheme for Group Signature based Authentication in VANET
    Lim, Kiho
    Tuladhar, Kastuv M.
    Wang, Xiwei
    Liu, Weihua
    2017 IEEE 8TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS AND MOBILE COMMUNICATION CONFERENCE (UEMCON), 2017,
  • [33] A secure cross-domain authentication scheme based on threshold signature for MEC
    Lei Chen
    Chong Guo
    Bei Gong
    Muhammad Waqas
    Lihua Deng
    Haowen Qin
    Journal of Cloud Computing, 13
  • [34] Digital Signature Verification Scheme for Image Authentication
    Singh, Manpreet
    Kaur, Harpreet
    Kakkar, Ajay
    2015 2ND INTERNATIONAL CONFERENCE ON RECENT ADVANCES IN ENGINEERING & COMPUTATIONAL SCIENCES (RAECS), 2015,
  • [36] Lightweight mutual authentication RFID protocol for secure multi-tag simultaneous authentication in ubiquitous environments
    Jungho Kang
    The Journal of Supercomputing, 2019, 75 : 4529 - 4542
  • [38] Design of Secure Mutual Authentication Scheme for Metaverse Environments Using Blockchain
    Ryu, Jongseok
    Son, Seunghwan
    Lee, Joonyoung
    Park, Yohan
    Park, Youngho
    IEEE ACCESS, 2022, 10 : 98944 - 98958
  • [39] VQ-based digital signature scheme for multimedia content authentication
    Sun, QB
    Zhong, D
    Chang, SF
    Wu, JK
    Narasimhalu, D
    SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS II, 2000, 3971 : 404 - 416
  • [40] Design of Secure Handover Authentication Scheme for Urban Air Mobility Environments
    Kwon, Deokkyu
    Son, Seunghwan
    Park, Yohan
    Kim, Hyungpyo
    Park, Youngho
    Lee, Sangwoo
    Jeon, Yongsung
    IEEE ACCESS, 2022, 10 : 42529 - 42541