An Analysis of RFID Authentication Schemes for Internet of Things in Healthcare Environment Using Elliptic Curve Cryptography

作者: Debiao He , Sherali Zeadally

DOI: 10.1109/JIOT.2014.2360121

关键词:

摘要: Advances in information and communication technologies have led to the emergence of Internet Things (IoT). In healthcare environment, use IoT brings convenience physicians patients as they can be applied various medical areas (such constant real-time monitoring, patient management, emergency blood health management). The radio-frequency identification (RFID) technology is one core deployments environment. To satisfy security requirements RFID IoT, many authentication schemes been proposed past decade. Recently, elliptic curve cryptography (ECC)-based attracted a lot attention used this paper, we discuss schemes, particular, present review ECC-based terms performance security. Although most them cannot all satisfactory performance, found that there are three recently suitable for environment their

参考文章(62)
Jihwan Lim, Heekuck Oh, Sangjin Kim, A new hash-based RFID mutual authentication protocol providing enhanced user privacy protection information security practice and experience. pp. 278- 289 ,(2008) , 10.1007/978-3-540-79104-1_20
Quan Z. Sheng, Damith C. Ranasinghe, Sherali Zeadally, Unique Radio Innovation for the 21st Century ,(2010)
Shaohui Wang, Sujuan Liu, Danwei Chen, Analysis and Construction of Efficient RFID Authentication Protocol with Backward Privacy China Conference on Wireless Sensor Networks. pp. 458- 466 ,(2012) , 10.1007/978-3-642-36252-1_43
A. Juels, D. Molnar, D. Wagner, Security and Privacy Issues in E-passports international workshop on security. pp. 74- 88 ,(2005) , 10.1109/SECURECOMM.2005.59
Junfeng Fan, Jens Hermans, Frederik Vercauteren, On the claimed privacy of EC-RAC III radio frequency identification security and privacy issues. pp. 66- 74 ,(2010) , 10.1007/978-3-642-16822-2_7
Yong Ki Lee, Lejla Batina, Ingrid Verbauwhede, Privacy Challenges in RFID Systems the internet of things. pp. 397- 407 ,(2010) , 10.1007/978-1-4419-1674-7_39
Lejla Batina, Stefaan Seys, Dave Singelée, Ingrid Verbauwhede, Hierarchical ECC-Based RFID authentication protocol international conference on rfid. ,vol. 7055, pp. 183- 201 ,(2011) , 10.1007/978-3-642-25286-0_12
Tatsuaki Okamoto, Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes international cryptology conference. pp. 31- 53 ,(1992) , 10.1007/3-540-48071-4_3
Julien Bringer, Hervé Chabanne, Thomas Icart, Cryptanalysis of EC-RAC, a RFID Identification Protocol cryptology and network security. pp. 149- 161 ,(2008) , 10.1007/978-3-540-89641-8_11
Ton van Deursen, Saša Radomirović, EC-RAC: enriching a capacious RFID attack collection radio frequency identification security and privacy issues. pp. 75- 90 ,(2010) , 10.1007/978-3-642-16822-2_8