An Analysis of RFID Authentication Schemes for Internet of Things in Healthcare Environment Using Elliptic Curve Cryptography

被引:208
作者
He, Debiao [1 ]
Zeadally, Sherali [2 ]
机构
[1] Wuhan Univ, Sch Math & Stat, Wuhan 430072, Peoples R China
[2] Univ Kentucky, Coll Commun & Informat, Lexington, KY 40506 USA
来源
IEEE INTERNET OF THINGS JOURNAL | 2015年 / 2卷 / 01期
关键词
Authentication; elliptic curve cryptography (ECC); Internet of Things (IoT); performance; radio-frequency identification (RFID); security; VULNERABILITY ANALYSIS; PROTOCOL; PRIVACY; TECHNOLOGY;
D O I
10.1109/JIOT.2014.2360121
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Advances in information and communication technologies have led to the emergence of Internet of Things (IoT). In the healthcare environment, the use of IoT technologies brings convenience to physicians and patients as they can be applied to various medical areas (such as constant real-time monitoring, patient information management, medical emergency management, blood information management, and health management). The radio-frequency identification (RFID) technology is one of the core technologies of IoT deployments in the healthcare environment. To satisfy the various security requirements of RFID technology in IoT, many RFID authentication schemes have been proposed in the past decade. Recently, elliptic curve cryptography (ECC)-based RFID authentication schemes have attracted a lot of attention and have been used in the healthcare environment. In this paper, we discuss the security requirements of RFID authentication schemes, and in particular, we present a review of ECC-based RFID authentication schemes in terms of performance and security. Although most of them cannot satisfy all security requirements and have satisfactory performance, we found that there are three recently proposed ECC-based authentication schemes suitable for the healthcare environment in terms of their performance and security.
引用
收藏
页码:72 / 83
页数:12
相关论文
共 68 条
  • [22] Fuerbass F, 2007, IEEE INT SYMP CIRC S, P1835
  • [23] State of the art in ultra-low power public key cryptography for wireless sensor networks
    Gaubatz, G
    Kaps, JP
    Öztürk, E
    Sunar, B
    [J]. Third IEEE International Conference on Pervasive Computing and Communications, Workshops, 2005, : 146 - 150
  • [24] Godor G., 2011, 2011 IEEE International Conference on RFID-Technologies and Applications (RFID-TA), P386, DOI 10.1109/RFID-TA.2011.6068667
  • [25] Hung Y., 2011, THESIS FU JEN CATHOL
  • [26] Hutter M, 2010, LECT NOTES COMPUT SC, V6370, P189, DOI 10.1007/978-3-642-16822-2_16
  • [27] Security and privacy issues in e-passports
    Juels, A
    Molnar, D
    Wagner, D
    [J]. First International Conference on Security and Privacy for Emerging Areas in Communications Networks, Proceedings, 2005, : 74 - 85
  • [28] Juels A., 2005, INT C MOBILE COMPUTI, P67, DOI DOI 10.1145/1080793.1080805
  • [29] Kalra S., 2011, Proceedings of the International Conference on Advances in Computing and Artificial Intelligence, P102
  • [30] A study on secure RFID mutual authentication scheme in pervasive computing environment
    Kang, Soo-Young
    Lee, Deok-Gyu
    Lee, Im-Yeong
    [J]. COMPUTER COMMUNICATIONS, 2008, 31 (18) : 4248 - 4254