A lightweight and anonymous RFID tag authentication protocol with cloud assistance for e-healthcare applications

被引:0
|
作者
Fan Wu
Lili Xu
Saru Kumari
Xiong Li
Ashok Kumar Das
Jian Shen
机构
[1] Xiamen Institute of Technology,Department of Computer Science and Engineering
[2] Xiamen University,School of Information Science and Technology
[3] Chaudhary Charan Singh University,Department of Mathematics
[4] Hunan University of Science and Technology,School of Computer Science and Engineering
[5] International Institute of Information Technology,Center for Security, Theory and Algorithmic Research
[6] Nanjing University of Information Science and Technology,School of Computer and Software
关键词
Forward untraceability; Backward untraceability; Radio frequency identification; Mutual authentication; Formal proof; e-healthcare application;
D O I
暂无
中图分类号
学科分类号
摘要
As an important part of Internet of Things, Radio Frequency Identification (RFID) system employs low-cost RFID tag to communicate with everything containing animate and inanimate objects. This technology is widely used in the e-healthcare applications. However, the malicious communication environment makes people more and more worried. In order to overcome the hazards in the network, RFID authentication schemes for e-healthcare have been proposed by researchers. But since the computation ability of the tag is relatively weak, it is necessary to put forward a lightweight and secure scheme for medical systems. Moreover, cloud is widely accepted by people and used in many kinds of systems. So we propose a novel and lightweight RFID authentication scheme with cloud for e-healthcare applications. We use an enhanced formal security model to prove the security of our scheme. In this model the channel between the server and the reader is considered to be insecure and informal analysis is used to prove the security of the proposed scheme. Through the formal and informal analysis, our scheme not only resists the common attacks, but also keeps mutual authentication, information integrity, forward untraceability and backward untraceability. Moreover, both the tag and the reader can reach the anonymity. Our scheme is only hash-based and suitable to realize various security requirements. Compared to recent schemes of the same sort, it is more applicable in e-healthcare.
引用
收藏
页码:919 / 930
页数:11
相关论文
共 50 条
  • [31] ECC-based lightweight authentication and access control scheme for IoT E-healthcare
    Yao, Hailong
    Yan, Qiao
    Fu, Xingbing
    Zhang, Zhibin
    Lan, Caihui
    [J]. SOFT COMPUTING, 2022, 26 (09) : 4441 - 4461
  • [32] Cloud-based lightweight secure RFID mutual authentication protocol in IoT
    Fan, Kai
    Luo, Qi
    Zhang, Kuan
    Yang, Yintang
    [J]. INFORMATION SCIENCES, 2020, 527 : 329 - 340
  • [33] ECC-based lightweight authentication and access control scheme for IoT E-healthcare
    Hailong Yao
    Qiao Yan
    Xingbing Fu
    Zhibin Zhang
    Caihui Lan
    [J]. Soft Computing, 2022, 26 : 4441 - 4461
  • [34] Secure and lightweight authentication protocol for anonymous data access in cloud assisted IoT system
    Mahor, Vinod
    Padmavathy, R.
    Chatterjee, Santanu
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2024, 17 (01) : 321 - 336
  • [35] A Study on Authentication Protocol for Secure RFID Tag
    Jung, Yong-hoon
    Kim, Jung-jae
    Jun, Moon-Seog
    [J]. THIRD 2008 INTERNATIONAL CONFERENCE ON CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, VOL 1, PROCEEDINGS, 2008, : 685 - 692
  • [36] Secure and lightweight authentication protocol for anonymous data access in cloud assisted IoT system
    Vinod Mahor
    R. Padmavathy
    Santanu Chatterjee
    [J]. Peer-to-Peer Networking and Applications, 2024, 17 : 321 - 336
  • [37] An Authentication Protocol for RFID Tag and its Simulation
    Shang-Ping, Wang
    Qiao-Mei, Ma
    Ya-Ling, Zhang
    You-Sheng, Li
    [J]. Journal of Networks, 2011, 6 (03) : 446 - 453
  • [38] A Lightweight Serverless RFID Tag Search Protocol
    Tian Yun
    Chen Gongliang
    Li Jianhua
    [J]. ADVANCES IN APPLIED MATERIALS AND ELECTRONICS ENGINEERING II, 2013, 684 : 531 - 534
  • [39] Efficient RFID authentication protocol for minimizing RFID tag computation
    Rhee, Keunwoo
    Kwak, Jin
    Yi, Wan S.
    Park, Chanho
    Park, Sangjoon
    Yang, Hyungkyu
    Kim, Seungjoo
    Won, Dongho
    [J]. ADVANCES IN HYBRID INFORMATION TECHNOLOGY, 2007, 4413 : 607 - +
  • [40] A secure heterogeneous mobile authentication and key agreement scheme for e-healthcare cloud systems
    Lin, Han-Yu
    [J]. PLOS ONE, 2018, 13 (12):