An Analysis of RFID Authentication Schemes for Internet of Things in Healthcare Environment Using Elliptic Curve Cryptography

被引:208
作者
He, Debiao [1 ]
Zeadally, Sherali [2 ]
机构
[1] Wuhan Univ, Sch Math & Stat, Wuhan 430072, Peoples R China
[2] Univ Kentucky, Coll Commun & Informat, Lexington, KY 40506 USA
来源
IEEE INTERNET OF THINGS JOURNAL | 2015年 / 2卷 / 01期
关键词
Authentication; elliptic curve cryptography (ECC); Internet of Things (IoT); performance; radio-frequency identification (RFID); security; VULNERABILITY ANALYSIS; PROTOCOL; PRIVACY; TECHNOLOGY;
D O I
10.1109/JIOT.2014.2360121
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Advances in information and communication technologies have led to the emergence of Internet of Things (IoT). In the healthcare environment, the use of IoT technologies brings convenience to physicians and patients as they can be applied to various medical areas (such as constant real-time monitoring, patient information management, medical emergency management, blood information management, and health management). The radio-frequency identification (RFID) technology is one of the core technologies of IoT deployments in the healthcare environment. To satisfy the various security requirements of RFID technology in IoT, many RFID authentication schemes have been proposed in the past decade. Recently, elliptic curve cryptography (ECC)-based RFID authentication schemes have attracted a lot of attention and have been used in the healthcare environment. In this paper, we discuss the security requirements of RFID authentication schemes, and in particular, we present a review of ECC-based RFID authentication schemes in terms of performance and security. Although most of them cannot satisfy all security requirements and have satisfactory performance, we found that there are three recently proposed ECC-based authentication schemes suitable for the healthcare environment in terms of their performance and security.
引用
收藏
页码:72 / 83
页数:12
相关论文
共 68 条
  • [1] RFID Technology for IoT-Based Personal Healthcare in Smart Spaces
    Amendola, Sara
    Lodato, Rossella
    Manzari, Sabina
    Occhiuzzi, Cecilia
    Marrocco, Gaetano
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2014, 1 (02): : 144 - 152
  • [2] [Anonymous], 1990, CRYPTO '89 Proceedings on Advances in cryptology, DOI DOI 10.1007/0-387-34805-0'22
  • [3] [Anonymous], 2013, WORLD POP AG 2013, P8
  • [4] [Anonymous], ENHANCING SECURITY E
  • [5] The Internet of Things: A survey
    Atzori, Luigi
    Iera, Antonio
    Morabito, Giacomo
    [J]. COMPUTER NETWORKS, 2010, 54 (15) : 2787 - 2805
  • [6] Babaheidarian P, 2012, INT ISC CONF INFO SE, P111, DOI 10.1109/ISCISC.2012.6408200
  • [7] Public-key cryptography for RFID-tags
    Batina, L.
    Guajardo, J.
    Kerins, T.
    Mentens, N.
    Tuyls, P.
    Verbauwhede, I.
    [J]. FIFTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, 2007, : 217 - +
  • [8] Batina L, 2012, LECT NOTES COMPUT SC, V7055, P183, DOI 10.1007/978-3-642-25286-0_12
  • [9] Bringer J, 2008, LECT NOTES COMPUT SC, V5339, P149, DOI 10.1007/978-3-540-89641-8_11
  • [10] Burmester M., 2008, P 2008 ACM S INF COM, P283