An Analysis of RFID Authentication Schemes for Internet of Things in Healthcare Environment Using Elliptic Curve Cryptography

被引:207
|
作者
He, Debiao [1 ]
Zeadally, Sherali [2 ]
机构
[1] Wuhan Univ, Sch Math & Stat, Wuhan 430072, Peoples R China
[2] Univ Kentucky, Coll Commun & Informat, Lexington, KY 40506 USA
来源
IEEE INTERNET OF THINGS JOURNAL | 2015年 / 2卷 / 01期
关键词
Authentication; elliptic curve cryptography (ECC); Internet of Things (IoT); performance; radio-frequency identification (RFID); security; VULNERABILITY ANALYSIS; PROTOCOL; PRIVACY; TECHNOLOGY;
D O I
10.1109/JIOT.2014.2360121
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Advances in information and communication technologies have led to the emergence of Internet of Things (IoT). In the healthcare environment, the use of IoT technologies brings convenience to physicians and patients as they can be applied to various medical areas (such as constant real-time monitoring, patient information management, medical emergency management, blood information management, and health management). The radio-frequency identification (RFID) technology is one of the core technologies of IoT deployments in the healthcare environment. To satisfy the various security requirements of RFID technology in IoT, many RFID authentication schemes have been proposed in the past decade. Recently, elliptic curve cryptography (ECC)-based RFID authentication schemes have attracted a lot of attention and have been used in the healthcare environment. In this paper, we discuss the security requirements of RFID authentication schemes, and in particular, we present a review of ECC-based RFID authentication schemes in terms of performance and security. Although most of them cannot satisfy all security requirements and have satisfactory performance, we found that there are three recently proposed ECC-based authentication schemes suitable for the healthcare environment in terms of their performance and security.
引用
收藏
页码:72 / 83
页数:12
相关论文
共 50 条
  • [1] Efficient RFID Authentication Using Elliptic Curve Cryptography for the Internet of Things
    Shen, Han
    Shen, Jian
    Khan, Muhammad Khurram
    Lee, Jong-Hyouk
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 96 (04) : 5253 - 5266
  • [2] Efficient RFID Authentication Using Elliptic Curve Cryptography for the Internet of Things
    Han Shen
    Jian Shen
    Muhammad Khurram Khan
    Jong-Hyouk Lee
    Wireless Personal Communications, 2017, 96 : 5253 - 5266
  • [3] An Efficient RFID Authentication Scheme Based on Elliptic Curve Cryptography for Internet of Things
    Mustapha Benssalah
    Izza Sarah
    Karim Drouiche
    Wireless Personal Communications, 2021, 117 : 2513 - 2539
  • [4] An Efficient RFID Authentication Scheme Based on Elliptic Curve Cryptography for Internet of Things
    Benssalah, Mustapha
    Sarah, Izza
    Drouiche, Karim
    WIRELESS PERSONAL COMMUNICATIONS, 2021, 117 (03) : 2513 - 2539
  • [5] Fuzzy Elliptic Curve Cryptography for Authentication in Internet of Things
    Abdaoui, Abderrazak
    Erbad, Aiman
    Al-Ali, Abdulla Khalid
    Mohamed, Amr
    Guizani, Mohsen
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (12) : 9987 - 9998
  • [6] Three elliptic curve cryptography-based RFID authentication protocols for Internet of Things
    An, Rui
    Feng, Hui
    Liu, Qin
    Li, Li
    ADVANCES ON BROAD-BAND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS, 2017, 2 : 857 - 878
  • [7] An elliptic curve cryptosystem-based secure RFID mutual authentication for Internet of things in healthcare environment
    Davood Noori
    Hassan Shakeri
    Masood Niazi Torshiz
    EURASIP Journal on Wireless Communications and Networking, 2022
  • [8] An elliptic curve cryptosystem-based secure RFID mutual authentication for Internet of things in healthcare environment
    Noori, Davood
    Shakeri, Hassan
    Torshiz, Masood Niazi
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2022, 2022 (01)
  • [9] Application of Elliptic Curve Cryptography in Node Authentication of Internet of Things
    Shen Guicheng
    Yu Zhen
    2013 NINTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2013), 2013, : 452 - 455
  • [10] A Secure RFID Mutual Authentication Protocol for Healthcare Environments Using Elliptic Curve Cryptography
    Chunhua Jin
    Chunxiang Xu
    Xiaojun Zhang
    Jining Zhao
    Journal of Medical Systems, 2015, 39