An Analysis of RFID Authentication Schemes for Internet of Things in Healthcare Environment Using Elliptic Curve Cryptography

被引:207
|
作者
He, Debiao [1 ]
Zeadally, Sherali [2 ]
机构
[1] Wuhan Univ, Sch Math & Stat, Wuhan 430072, Peoples R China
[2] Univ Kentucky, Coll Commun & Informat, Lexington, KY 40506 USA
来源
IEEE INTERNET OF THINGS JOURNAL | 2015年 / 2卷 / 01期
关键词
Authentication; elliptic curve cryptography (ECC); Internet of Things (IoT); performance; radio-frequency identification (RFID); security; VULNERABILITY ANALYSIS; PROTOCOL; PRIVACY; TECHNOLOGY;
D O I
10.1109/JIOT.2014.2360121
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Advances in information and communication technologies have led to the emergence of Internet of Things (IoT). In the healthcare environment, the use of IoT technologies brings convenience to physicians and patients as they can be applied to various medical areas (such as constant real-time monitoring, patient information management, medical emergency management, blood information management, and health management). The radio-frequency identification (RFID) technology is one of the core technologies of IoT deployments in the healthcare environment. To satisfy the various security requirements of RFID technology in IoT, many RFID authentication schemes have been proposed in the past decade. Recently, elliptic curve cryptography (ECC)-based RFID authentication schemes have attracted a lot of attention and have been used in the healthcare environment. In this paper, we discuss the security requirements of RFID authentication schemes, and in particular, we present a review of ECC-based RFID authentication schemes in terms of performance and security. Although most of them cannot satisfy all security requirements and have satisfactory performance, we found that there are three recently proposed ECC-based authentication schemes suitable for the healthcare environment in terms of their performance and security.
引用
收藏
页码:72 / 83
页数:12
相关论文
共 50 条
  • [31] Practical Three-Factor Authentication Protocol Based on Elliptic Curve Cryptography for Industrial Internet of Things
    Zhao, Xingwen
    Li, Dexin
    Li, Hui
    SENSORS, 2022, 22 (19)
  • [32] A Secure RFID Authentication Protocol for Healthcare Environments Using Elliptic Curve Cryptosystem
    Zhenguo Zhao
    Journal of Medical Systems, 2014, 38
  • [33] A Secure RFID Authentication Protocol for Healthcare Environments Using Elliptic Curve Cryptosystem
    Zhao, Zhenguo
    JOURNAL OF MEDICAL SYSTEMS, 2014, 38 (05)
  • [34] An Efficient RFID Authentication Protocol to Enhance Patient Medication Safety Using Elliptic Curve Cryptography
    Zhang, Zezhong
    Qi, Qingqing
    JOURNAL OF MEDICAL SYSTEMS, 2014, 38 (05)
  • [35] An Efficient RFID Authentication Protocol to Enhance Patient Medication Safety Using Elliptic Curve Cryptography
    Zezhong Zhang
    Qingqing Qi
    Journal of Medical Systems, 2014, 38
  • [36] Voter Authentication Using Modified Elliptic Curve Cryptography
    Sujatha, K.
    Rao, A. Arjuna
    Yejarla, Prathyusha
    Sruthi, K. J.
    SMART COMPUTING AND INFORMATICS, 2018, 77 : 497 - 504
  • [37] Optimized video internet of things using elliptic curve cryptography based encryption and decryption
    Alhayani, Bilal S. A.
    Hamid, Nagham
    Almukhtar, Firas Husham
    Alkawak, Omar A.
    Mahajan, Hemant B.
    Kwekha-Rashid, Ameer Sardar
    Ilhan, Haci
    Marhoon, Haydar Abdulameer
    Mohammed, Husam Jasim
    Chaloob, Ibrahim Zeghaiton
    Alkhayyat, Ahmed
    COMPUTERS & ELECTRICAL ENGINEERING, 2022, 101
  • [38] Elliptic Curve Cryptography-Based RFID Authentication Resisting Active Tracking
    Chien, Hung-Yu
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 94 (04) : 2925 - 2936
  • [39] Elliptic Curve Cryptography-Based RFID Authentication Resisting Active Tracking
    Hung-Yu Chien
    Wireless Personal Communications, 2017, 94 : 2925 - 2936
  • [40] SLEC: A Novel Serverless RFID Authentication Protocol Based on Elliptic Curve Cryptography
    Baashirah, Rania
    Abuzneid, Abdelshakour
    ELECTRONICS, 2019, 8 (10)