Literature DB >> 24756871

A secure RFID authentication protocol for healthcare environments using elliptic curve cryptosystem.

Zhenguo Zhao1.   

Abstract

With the fast advancement of the wireless communication technology and the widespread use of medical systems, the radio frequency identification (RFID) technology has been widely used in healthcare environments. As the first important protocol for ensuring secure communication in healthcare environment, the RFID authentication protocols derive more and more attentions. Most of RFID authentication protocols are based on hash function or symmetric cryptography. To get more security properties, elliptic curve cryptosystem (ECC) has been used in the design of RFID authentication protocol. Recently, Liao and Hsiao proposed a new RFID authentication protocol using ECC and claimed their protocol could withstand various attacks. In this paper, we will show that their protocol suffers from the key compromise problem, i.e. an adversary could get the private key stored in the tag. To enhance the security, we propose a new RFID authentication protocol using ECC. Detailed analysis shows the proposed protocol not only could overcome weaknesses in Liao and Hsiao's protocol but also has the same performance. Therefore, it is more suitable for healthcare environments.

Mesh:

Year:  2014        PMID: 24756871     DOI: 10.1007/s10916-014-0046-9

Source DB:  PubMed          Journal:  J Med Syst        ISSN: 0148-5598            Impact factor:   4.460


  6 in total

1.  An efficient authentication scheme for telecare medicine information systems.

Authors:  Zhian Zhu
Journal:  J Med Syst       Date:  2012-04-25       Impact factor: 4.460

2.  SurgiChip--new technology for prevention of wrong site, wrong procedure, wrong person surgery.

Authors:  Debbie Sandlin
Journal:  J Perianesth Nurs       Date:  2005-04       Impact factor: 1.084

3.  Public views of mobile medical devices and services: a US national survey of consumer sentiments towards RFID healthcare technology.

Authors:  James E Katz; Ronald E Rice
Journal:  Int J Med Inform       Date:  2008-07-10       Impact factor: 4.046

4.  A more secure authentication scheme for telecare medicine information systems.

Authors:  He Debiao; Chen Jianhua; Zhang Rui
Journal:  J Med Syst       Date:  2011-03-01       Impact factor: 4.460

5.  An efficient anonymous authentication scheme for wireless body area networks using elliptic curve cryptosystem.

Authors:  Zhenguo Zhao
Journal:  J Med Syst       Date:  2014-01-31       Impact factor: 4.460

6.  A new method to guard inpatient medication safety by the implementation of RFID.

Authors:  Pei Ran Sun; Bo Han Wang; Fan Wu
Journal:  J Med Syst       Date:  2008-08       Impact factor: 4.460

  6 in total
  12 in total

1.  New Authentication Scheme for Wireless Body Area Networks Using the Bilinear Pairing.

Authors:  Chunzhi Wang; Yanmei Zhang
Journal:  J Med Syst       Date:  2015-09-01       Impact factor: 4.460

2.  The current and future needs of our medical systems.

Authors:  Jesse M Ehrenfeld
Journal:  J Med Syst       Date:  2015-02-01       Impact factor: 4.460

3.  A secure RFID mutual authentication protocol for healthcare environments using elliptic curve cryptography.

Authors:  Chunhua Jin; Chunxiang Xu; Xiaojun Zhang; Jining Zhao
Journal:  J Med Syst       Date:  2015-02-10       Impact factor: 4.460

4.  A Provably Secure RFID Authentication Protocol Based on Elliptic Curve for Healthcare Environments.

Authors:  Mohammad Sabzinejad Farash; Omer Nawaz; Khalid Mahmood; Shehzad Ashraf Chaudhry; Muhammad Khurram Khan
Journal:  J Med Syst       Date:  2016-05-24       Impact factor: 4.460

5.  A RFID Authentication Protocol for Epidemic Prevention and Epidemic Emergency Management Systems.

Authors:  Xiuqing Chen; Xiao Zhang; Deqin Geng; Lei Zhou; Junshu Chen; Fan Lu
Journal:  J Healthc Eng       Date:  2021-12-03       Impact factor: 2.682

6.  IoT in medical & pharmaceutical: Designing lightweight RFID security protocols for ensuring supply chain integrity.

Authors:  Masoumeh Safkhani; Samad Rostampour; Ygal Bendavid; Nasour Bagheri
Journal:  Comput Netw       Date:  2020-09-17       Impact factor: 4.474

7.  A Secure ECC-based RFID Mutual Authentication Protocol to Enhance Patient Medication Safety.

Authors:  Chunhua Jin; Chunxiang Xu; Xiaojun Zhang; Fagen Li
Journal:  J Med Syst       Date:  2015-10-29       Impact factor: 4.460

8.  Design and Implementation of High-Performance ECC Processor with Unified Point Addition on Twisted Edwards Curve.

Authors:  Md Mainul Islam; Md Selim Hossain; Moh Khalid Hasan; Md Shahjalal; Yeong Min Jang
Journal:  Sensors (Basel)       Date:  2020-09-10       Impact factor: 3.576

Review 9.  Survey on Prominent RFID Authentication Protocols for Passive Tags.

Authors:  Rania Baashirah; Abdelshakour Abuzneid
Journal:  Sensors (Basel)       Date:  2018-10-22       Impact factor: 3.576

Review 10.  Comparison and Feasibility of Various RFID Authentication Methods Using ECC.

Authors:  Pagán Alexander; Rania Baashirah; Abdelshakour Abuzneid
Journal:  Sensors (Basel)       Date:  2018-09-01       Impact factor: 3.576

View more

北京卡尤迪生物科技股份有限公司 © 2022-2023.