An Analysis of RFID Authentication Schemes for Internet of Things in Healthcare Environment Using Elliptic Curve Cryptography

被引:207
|
作者
He, Debiao [1 ]
Zeadally, Sherali [2 ]
机构
[1] Wuhan Univ, Sch Math & Stat, Wuhan 430072, Peoples R China
[2] Univ Kentucky, Coll Commun & Informat, Lexington, KY 40506 USA
来源
IEEE INTERNET OF THINGS JOURNAL | 2015年 / 2卷 / 01期
关键词
Authentication; elliptic curve cryptography (ECC); Internet of Things (IoT); performance; radio-frequency identification (RFID); security; VULNERABILITY ANALYSIS; PROTOCOL; PRIVACY; TECHNOLOGY;
D O I
10.1109/JIOT.2014.2360121
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Advances in information and communication technologies have led to the emergence of Internet of Things (IoT). In the healthcare environment, the use of IoT technologies brings convenience to physicians and patients as they can be applied to various medical areas (such as constant real-time monitoring, patient information management, medical emergency management, blood information management, and health management). The radio-frequency identification (RFID) technology is one of the core technologies of IoT deployments in the healthcare environment. To satisfy the various security requirements of RFID technology in IoT, many RFID authentication schemes have been proposed in the past decade. Recently, elliptic curve cryptography (ECC)-based RFID authentication schemes have attracted a lot of attention and have been used in the healthcare environment. In this paper, we discuss the security requirements of RFID authentication schemes, and in particular, we present a review of ECC-based RFID authentication schemes in terms of performance and security. Although most of them cannot satisfy all security requirements and have satisfactory performance, we found that there are three recently proposed ECC-based authentication schemes suitable for the healthcare environment in terms of their performance and security.
引用
收藏
页码:72 / 83
页数:12
相关论文
共 50 条
  • [21] An efficient and secure RFID authentication protocol using elliptic curve cryptography
    Negin Dinarvand
    Hamid Barati
    Wireless Networks, 2019, 25 : 415 - 428
  • [22] An Offline Direct Authentication Scheme for the Internet of Medical Things Based on Elliptic Curve Cryptography
    Maarouf, Asmaa
    Sakr, Rasha
    Elmougy, Samir
    IEEE ACCESS, 2024, 12 : 134902 - 134925
  • [23] Vulnerability analysis of elliptic curve cryptography-based RFID authentication protocols
    Lv, Chao
    Li, Hui
    Ma, Jianfeng
    Zhang, Yaoyu
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2012, 23 (07): : 618 - 624
  • [24] A Lightweight RFID Authentication Protocol based on Elliptic Curve Cryptography
    Liu, Ya-Li
    Qin, Xiao-Lin
    Wang, Chao
    Li, Bo-Han
    JOURNAL OF COMPUTERS, 2013, 8 (11) : 2880 - 2887
  • [25] An efficient mutual authentication RFID scheme based on elliptic curve cryptography
    Chou, Jue-Sam
    JOURNAL OF SUPERCOMPUTING, 2014, 70 (01): : 75 - 94
  • [26] A Novel Authentication Management RFID Protocol Based on Elliptic Curve Cryptography
    Guoliang Liu
    Huichuan Zhang
    Fanyue Kong
    Lei Zhang
    Wireless Personal Communications, 2018, 101 : 1445 - 1455
  • [27] A Novel Authentication Management RFID Protocol Based on Elliptic Curve Cryptography
    Liu, Guoliang
    Zhang, Huichuan
    Kong, Fanyue
    Zhang, Lei
    WIRELESS PERSONAL COMMUNICATIONS, 2018, 101 (03) : 1445 - 1455
  • [28] Secure Mutual Authentication Protocol for RFID Based on Elliptic Curve Cryptography
    Alamr, Amjad Ali
    Kausar, Firdous
    Kim, Jong Sung
    2016 INTERNATIONAL CONFERENCE ON PLATFORM TECHNOLOGY AND SERVICE (PLATCON), 2016,
  • [29] An efficient mutual authentication RFID scheme based on elliptic curve cryptography
    Jue-Sam Chou
    The Journal of Supercomputing, 2014, 70 : 75 - 94
  • [30] Lightweight elliptic curve cryptography accelerator for internet of things applications
    Andres Lara-Nino, Carlos
    Diaz-Perez, Arturo
    Morales-Sandoval, Miguel
    AD HOC NETWORKS, 2020, 103