| Literature DB >> 32867181 |
Feng Zhu1,2, Peng Li1,2, He Xu1,2, Ruchuan Wang1,2.
Abstract
The Internet of Things (IoT) has been integrated into legacy healthcare systems for the purpose of improving healthcare processes. As one of the key technologies of IoT, radio frequency identification (RFID) technology has been applied to offer services like patient monitoring, drug administration, and medical asset tracking. However, people have concerns about the security and privacy of RFID-based healthcare systems, which require a proper solution. To solve the problem, recently in 2019, Fan et al. proposed a lightweight RFID authentication scheme in the IEEE Network. They claimed that their scheme can resist various attacks in RFID systems with low implementation cost, and thus is suitable for RFID-based healthcare systems. In this article, our contributions mainly consist of two parts. First, we analyze the security of Fan et al.'s scheme and find out its security vulnerabilities. Second, we propose a novel lightweight authentication scheme to overcome these security weaknesses. The security analysis shows that our scheme can satisfy the necessary security requirements. Besides, the performance evaluation demonstrates that our scheme is of low cost. Thus, our scheme is well-suited for practical RFID-based healthcare systems.Entities:
Keywords: authentication; healthcare systems; lightweight; radio frequency identification; security
Mesh:
Year: 2020 PMID: 32867181 PMCID: PMC7506697 DOI: 10.3390/s20174846
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1A typical radio frequency identification (RFID)-based healthcare system.
Notations.
| Notation | Description |
|---|---|
| p, q | Two large primes |
| n | n = pq |
| SID, SIDold, SIDnew | The tag’s current, previous and next pseudo identifier, respectively |
| SRID, SRIDold, SRIDnew | The reader’s current, previous and next pseudo identifier, respectively |
| x, xold, xnew | The tag’s current, previous and next secret key, respectively |
| x’ | x2 mod n, n = pq |
| y, yold, ynew | The reader’s current, previous and next secret key, respectively |
| y’ | y2 mod n, n = pq |
| TE | The current time of E |
| Tth | The time threshold |
| NE | The random number generated by E |
| ⨁ | The bitwise exclusive-OR |
| PRNG() | The pseudo random number generator |
| Rot(x, y) | Left shift x⨁y by y mod L bits, in which L is the length of y |
Figure 2Tags’ index data table in Fan et al.’s scheme.
Figure 3Readers’ index data table in Fan et al.’s scheme.
Figure 4Authentication and update phases of Fan et al.’s scheme.
Figure 5Tags’ index data table in our proposed scheme.
Figure 6Readers’ index data table in our proposed scheme.
Figure 7Authentication phase of our improved scheme.
BAN-logic notations.
| Notation | Description |
|---|---|
|
| P believes X |
|
| P receives X |
|
| P sends X |
|
| P has jurisdiction over X |
| #(X) | X is fresh |
|
| X is encrypted by the key k |
|
| P and Q use the shared key k to communicate |
|
| If P then Q |
Security performance comparison.
| Scheme | D1 | D2 | D3 | D4 | D5 |
|---|---|---|---|---|---|
| Fan et al. [ | Yes | No | No | Yes | Yes |
| Safkhani and Vasilakos [ | Yes | No | Yes | Yes | No |
| LRMI [ | No | Yes | No | Yes | Yes |
| SecLAP [ | No | Yes | Yes | No | Yes |
| Zhou et al. [ | Yes | Yes | Yes | No | Yes |
| Our scheme | Yes | Yes | Yes | Yes | Yes |
D1: Untraceability; D2: Forward secrecy; D3: Resilience to impersonation attacks; D4: Resistance to desynchronization attacks; D5: Scalability.
Computation cost comparison (in operations).
| Scheme | Tag | Reader | Server | Total |
|---|---|---|---|---|
| Fan et al. [ | 2 Rot + 4 P | 5 Rot + 6 P + 3 MS + SR | 2 Rot + 2 Rot−1 + 5 P | 9 Rot + 2 Rot−1 + 15 P + 3 MS + SR |
| Safkhani and Vasilakos [ | P + 2 H | P + 2 H | P + 4 H | 3 P + 8 H |
| LRMI [ | P + 4 C | P + 4 C | P + 4 C | 3 P + 12 C |
| SecLAP [ | P + 7 MR | P + 17 MR | P + 5 MR | 3 P + 29 MR |
| Zhou et al. [ | P + H + 3 MS | P + 5 H + 3 MS | 6 H + 6 SR | 11 H + 6 MS + 6 SR + 2 P |
| Our scheme | 5 P | 5 P | 9 P | 19 P |
Rot: rotation operation; Rot−1: the inverse operation of Rot; P: pseudo random number generation; H: hash operation; C: cross operation; M: modular rotation operation; MS: modular squaring operation; SR: squaring root solving operation.
Computation cost comparison (in milliseconds).
| Scheme | Tag | Reader | Server | Total |
|---|---|---|---|---|
| Fan et al. [ | 0.084 | 9.547 | 0.105 | 9.736 |
| Safkhani and Vasilakos [ | 0.527 | 0.527 | 1.033 | 2.087 |
| LRMI [ | 0.021 | 0.021 | 0.021 | 0.063 |
| SecLAP [ | 0.021 | 0.021 | 0.021 | 0.063 |
| Zhou et al. [ | 6.215 | 6.974 | 22.404 | 35.593 |
| Our scheme | 0.105 | 0.105 | 0.189 | 0.399 |
Performance comparison based on the communication and storage cost.
| Scheme | Communication Cost (bits) | Storage Cost (bits) |
|---|---|---|
| Fan et al. [ | 2752 | 1120 |
| Safkhani and Vasilakos [ | 1344 | 96 |
| LRMI [ | 1632 | 192 |
| SecLAP [ | 2112 | 192 |
| Zhou et al. [ | 11008 | 1120 |
| Our scheme | 1344 | 192 |
The hardware implementation cost of the security primitives.
| Security Primitive | Implementation Cost (LUTs/Gates) |
|---|---|
| Rotation function | 112/- [ |
| Cross function | 1/- [ |
| Modular rotation function | 65/- [ |
| Warbler PRNG | 184/760 [ |
| SPONGENT hash function | -/738 [ |
| Modular squaring function | -/1000 [ |
Performance comparison based on the estimated hardware implementation cost.
| Scheme | Security Primitives Used | Implementation Cost (Estimated) |
|---|---|---|
| Fan et al. [ | Rotation function, Warbler PRNG | 112 LUTs + 760 Gates |
| Safkhani and Vasilakos [ | Warbler PRNG, SPONGENT hash function | 1498 Gates |
| LRMI [ | Cross function, Warbler PRNG | 1 LUT + 760 Gates |
| SecLAP [ | Modular rotation function, Warbler PRNG | 65 LUTs + 760 Gates |
| Zhou et al. [ | Warbler PRNG, SPONGENT hash function, Modular squaring function | 2498 Gates |
| Our scheme | Warbler PRNG | 760 Gates |
Performance comparison between our proposed scheme and Fan et al.’s scheme.
| Scheme | Fan et al. [ | Our Scheme | |
|---|---|---|---|
| Performance | |||
|
| Not all satisfied | All satisfied | |
|
| 9.736 milliseconds | 0.399 milliseconds | |
|
| 2752 bits | 1344 bits | |
|
| 1120 bits | 192 bits | |
|
| 112 LUTs + 760 Gates | 760 Gates | |