Security Enhanced RFID Authentication Protocols for Healthcare Environment

被引:0
|
作者
Shaohao Xie
Fangguo Zhang
Rong Cheng
机构
[1] Sun Yat-sen University,School of Data and Computer Science
[2] Guangdong Key Laboratory of Information Security,School of Electronic and Communication Engineering
[3] Shenzhen Polytechnic,undefined
来源
关键词
Healthcare; RFID; Privacy; Security; Authentication; Indistinguishability obfuscation;
D O I
暂无
中图分类号
学科分类号
摘要
RFID technology, which is concerned as one of the core technologies of Internet of Things, has been widely deployed in healthcare environment and brings a lot of convenience for people’s daily life. However, the security and privacy challenges of RFID authentication protocols are receiving more and more attention. One of the problems is that the current RFID protocols usually use a backend server to store the detailed information of tagged objects, which may lead to the issue of information leakage if the server is hacked or attacked by the adversary. To address this challenge, in this paper, we propose a security enhanced RFID authentication protocol for healthcare environment using the technique of indistinguishability obfuscation, which prevents the leakage of sensitive data from the backend server. Meanwhile, we extend the protocol to fit for the scenario of cloud environment where the tags’ information is stored in the cloud server. To our knowledge, our protocols are the first applications of indistinguishability obfuscation in the field of RFID authentication system. Moreover, our protocols are scalable and practical, and they are analyzed to achieve most of the security properties of the RFID system.
引用
收藏
页码:71 / 86
页数:15
相关论文
共 50 条
  • [1] Security Enhanced RFID Authentication Protocols for Healthcare Environment
    Xie, Shaohao
    Zhang, Fangguo
    Cheng, Rong
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2021, 117 (01) : 71 - 86
  • [2] A review of authentication protocols for rfid security on smart healthcare
    Dearfian, Hanif Restu
    Amiruddin, Amiruddin
    [J]. TARUMANAGARA INTERNATIONAL CONFERENCE ON THE APPLICATIONS OF TECHNOLOGY AND ENGINEERING, 2019, 508
  • [3] On the Security of RFID Authentication Protocols
    Desai, Nidhi
    Das, Manik Lal
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON ELECTRONICS, COMPUTING AND COMMUNICATION TECHNOLOGIES (CONECCT), 2015,
  • [4] Security problems of RFID authentication protocols
    Pornieks, Valdis
    Ginters, Egils
    [J]. PROCEEDINGS OF THE 6TH WSEAS INTERNATIONAL CONFERENCE ON SYSTEM SCIENCE AND SIMULATION IN ENGINEERING (ICOSSSE '07): SYSTEM SCIENCE AND SIMULATION IN ENGINEERING, 2007, : 325 - +
  • [5] More on the Security of Linear RFID Authentication Protocols
    Krause, Matthias
    Stegemann, Dirk
    [J]. SELECTED AREAS IN CRYPTOGRAPHY, 2009, 5867 : 182 - 196
  • [6] Security Issues in Ultralightweight RFID Authentication Protocols
    Zhuang, Xu
    Zhu, Yan
    Chang, Chin-Chen
    Peng, Qiang
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2018, 98 (01) : 779 - 814
  • [7] Security Issues in Ultralightweight RFID Authentication Protocols
    Xu Zhuang
    Yan Zhu
    Chin-Chen Chang
    Qiang Peng
    [J]. Wireless Personal Communications, 2018, 98 : 779 - 814
  • [8] Scalability and Security Conflict for RFID Authentication Protocols
    Erguler, Imran
    Anarim, Emin
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2011, 59 (01) : 43 - 56
  • [9] Security Analysis of Some RFID Authentication Protocols
    Wang Shaohui
    Wang Faxing
    [J]. 2010 2ND INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY (EBISS 2010), 2010, : 386 - 389
  • [10] Scalability and Security Conflict for RFID Authentication Protocols
    Imran Erguler
    Emin Anarim
    [J]. Wireless Personal Communications, 2011, 59 : 43 - 56