An intelligent RFID-enabled authentication scheme for healthcare applications in vehicular mobile cloud

作者: Neeraj Kumar , Kuljeet Kaur , Subhas C. Misra , Rahat Iqbal

DOI: 10.1007/S12083-015-0332-4

关键词:

摘要: Recently, vehicular cloud computing (VCC) has emerged as the one of fast growing technologies with an aim to provide uninterrupted services moving clients even on-the-fly. One provided by VCC is mobile healthcare in which patient can be diagonosis from anywhere during their mobility. This paper proposes intelligent RFID-enabled authentication scheme for applications environment. In proposed scheme, a Petri Nets-based model used tags, and readers. Both server, tag authentications are protected strong elliptical curve cryptography (ECC)-based key generation mechanism. The found secure respect mutual servers replay attack, tracking users anonymity, eavesdropping, cloning forward secrecy. To evaluate effectiveness it evaluated overhead generated, computation complexity, % service delivery, where its performance better than case not applied.

参考文章(37)
Gene Eu Jan, Chi-Chia Sun, Lun-Ping Hung, You-Siang Jan, Shu-Hui Weng, Real-time monitor system with RFID localization for seniors international symposium on consumer electronics. pp. 75- 76 ,(2013) , 10.1109/ISCE.2013.6570260
Neeraj Kumar, Joel J. P. C. Rodrigues, Naveen Chilamkurti, Bayesian Coalition Game as-a-Service for Content Distribution in Internet of Vehicles IEEE Internet of Things Journal. ,vol. 1, pp. 544- 555 ,(2014) , 10.1109/JIOT.2014.2374606
Nurul Fauzana Binti Imran Gulcharan, Hanita Daud, Nursyarizal Mohd Nor, Taib Ibrahim, Elisha Tadiwa Nyamasvisva, Limitation and Solution for Healthcare Network Using RFID Technology: A Review☆ Procedia Technology. ,vol. 11, pp. 565- 571 ,(2013) , 10.1016/J.PROTCY.2013.12.229
Neeraj Kumar, Rahat Iqbal, Sudip Misra, Joel J.P.C. Rodrigues, An intelligent approach for building a secure decentralized public key infrastructure in VANET Journal of Computer and System Sciences. ,vol. 81, pp. 1042- 1058 ,(2015) , 10.1016/J.JCSS.2014.12.016
Debiao He, Neeraj Kumar, Jong-Hyouk Lee, R. Simon Sherratt, Enhanced three-factor security protocol for consumer USB mass storage devices IEEE Transactions on Consumer Electronics. ,vol. 60, pp. 30- 37 ,(2014) , 10.1109/TCE.2014.6780922
Yeh-Cheng Chen, Hung-Min Sun, Ruey-Shun Chen, Design and implementation of wearable RFID tag for real-time ubiquitous medical care 2014 IEEE Topical Conference on Biomedical Wireless Technologies, Networks, and Sensing Systems (BioWireleSS). pp. 25- 27 ,(2014) , 10.1109/BIOWIRELESS.2014.6827735
Chao Lv, Hui Li, Jianfeng Ma, Meng Zhao, Security analysis of two recently proposed RFID authentication protocols Frontiers of Computer Science in China. ,vol. 5, pp. 335- 340 ,(2011) , 10.1007/S11704-011-0153-4
Reza Entezari-Maleki, Kishor S. Trivedi, Ali Movaghar, Performability Evaluation of Grid Environments Using Stochastic Reward Nets IEEE Transactions on Dependable and Secure Computing. ,vol. 12, pp. 204- 216 ,(2015) , 10.1109/TDSC.2014.2320741
O.C. Ibe, K.S. Trivedi, Stochastic Petri net models of polling systems IEEE Journal on Selected Areas in Communications. ,vol. 8, pp. 1649- 1657 ,(1990) , 10.1109/49.62852
Yu Tian-tian, Feng Quan-yuan, A Security RFID Authentication Protocol Based on Hash Function international symposium on information engineering and electronic commerce. pp. 804- 807 ,(2009) , 10.1109/IEEC.2009.174