A Secure RFID Authentication Scheme for Healthcare Environments Based on Digital Signature Algorithm

被引:0
作者
Benssalah, Mustapha [1 ]
Djeddou, Mustapha [1 ]
Drouiche, Karim [2 ]
机构
[1] Ecole Mil Polytech, Signal Proc Lab, BP 17 Bordj Bahri, Algiers 16111, Algeria
[2] Cergy Pontoise Univ, Theoret Phys & Modeling Lab, F-95302 Cergy Pontoise, France
来源
2018 INTERNATIONAL SYMPOSIUM ON NETWORKS, COMPUTERS AND COMMUNICATIONS (ISNCC 2018) | 2018年
关键词
RFID; Elliptic Curve Cryptography; Authentication;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Radio Frequency Identification (RFID) technology can help a wide range of individuals and organizations realize significant productivity expansions and efficiencies. It provides also an efficient and accurate access to medical data for health professionals. In this paper, first we investigate the security of Zhao's protocol, which has been recently proposed as a secure RFID authentication protocol for healthcare environments. We show that the proposed enhancements, to overcome the key compromise problem in Liao and Hsiao protocol, remains vulnerable to tracking attack. Therefore, with the aim of increasing patient safety, we propose a new authentication scheme based on elliptic curve digital signature algorithm (ECDSA) combined with a recursive hash function. The security analysis shows that the suggested scheme could solve security weaknesses of Zhao's protocol and some previously proposed protocols. In addition, the proposed scheme is more efficient in terms of communication and computational cost compared to that of the related protocols.
引用
收藏
页数:6
相关论文
共 50 条
  • [41] Efficient and Secure Certificateless Aggregate Signature-Based Authentication Scheme for Vehicular Ad Hoc Networks
    Thumbur, Gowri
    Rao, G. Srinivasa
    Reddy, P. Vasudeva
    Gayathri, N. B.
    Reddy, D. V. R. Koti
    Padmavathamma, M.
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (03) : 1908 - 1920
  • [42] Secure Authentication Scheme with Improved Anonymity for Wireless Environments
    Lee, JongHyup
    Kwon, Taekyoung
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2011, E94B (02) : 554 - 557
  • [43] SYMMETRIC KEY BASED RFID AUTHENTICATION PROTOCOL WITH A SECURE KEY-UPDATING SCHEME
    Zhu, Guangyu
    Khan, Gul N.
    2013 26TH ANNUAL IEEE CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING (CCECE), 2013, : 353 - 357
  • [44] Lightweight, ECC based RFID Authentication Scheme for WLAN
    Kumar, Amit
    Om, Hari
    INTERNATIONAL JOURNAL OF BUSINESS DATA COMMUNICATIONS AND NETWORKING, 2016, 12 (02) : 89 - 103
  • [45] Improvement of the RFID authentication scheme based on quadratic residues
    Yeh, Tzu-Chang
    Wu, Chien-Hung
    Tseng, Yuh-Min
    COMPUTER COMMUNICATIONS, 2011, 34 (03) : 337 - 341
  • [46] An improved digital signature algorithm and authentication protocols in cloud platform
    Wang, Longge
    Song, Tao
    2016 IEEE INTERNATIONAL CONFERENCE ON SMART CLOUD (SMARTCLOUD), 2016, : 319 - 324
  • [47] A more secure digital rights management authentication scheme based on smart card
    Kumari, Saru
    Khan, Muhammad Khurram
    Li, Xiong
    MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (02) : 1135 - 1158
  • [48] An ultra light weight and secure RFID batch authentication scheme for IoMT
    Kang, Junbin
    Fan, Kai
    Zhang, Kuan
    Cheng, Xiaochun
    Li, Hui
    Yang, Yintang
    COMPUTER COMMUNICATIONS, 2021, 167 : 48 - 54
  • [49] A more secure digital rights management authentication scheme based on smart card
    Saru Kumari
    Muhammad Khurram Khan
    Xiong Li
    Multimedia Tools and Applications, 2016, 75 : 1135 - 1158
  • [50] An energy-efficient and secure identity based RFID authentication scheme for vehicular cloud computing
    Akram, Waseem
    Mahmood, Khalid
    Li, Xiong
    Sadiq, Mazhar
    Lv, Zhihan
    Chaudhry, Shehzad Ashraf
    COMPUTER NETWORKS, 2022, 217