Security Enhanced RFID Authentication Protocols for Healthcare Environment

被引:0
|
作者
Shaohao Xie
Fangguo Zhang
Rong Cheng
机构
[1] Sun Yat-sen University,School of Data and Computer Science
[2] Guangdong Key Laboratory of Information Security,School of Electronic and Communication Engineering
[3] Shenzhen Polytechnic,undefined
来源
关键词
Healthcare; RFID; Privacy; Security; Authentication; Indistinguishability obfuscation;
D O I
暂无
中图分类号
学科分类号
摘要
RFID technology, which is concerned as one of the core technologies of Internet of Things, has been widely deployed in healthcare environment and brings a lot of convenience for people’s daily life. However, the security and privacy challenges of RFID authentication protocols are receiving more and more attention. One of the problems is that the current RFID protocols usually use a backend server to store the detailed information of tagged objects, which may lead to the issue of information leakage if the server is hacked or attacked by the adversary. To address this challenge, in this paper, we propose a security enhanced RFID authentication protocol for healthcare environment using the technique of indistinguishability obfuscation, which prevents the leakage of sensitive data from the backend server. Meanwhile, we extend the protocol to fit for the scenario of cloud environment where the tags’ information is stored in the cloud server. To our knowledge, our protocols are the first applications of indistinguishability obfuscation in the field of RFID authentication system. Moreover, our protocols are scalable and practical, and they are analyzed to achieve most of the security properties of the RFID system.
引用
收藏
页码:71 / 86
页数:15
相关论文
共 50 条
  • [21] Security analysis of two ultra-lightweight RFID authentication protocols
    Li, Tieyan
    Wang, Guilin
    [J]. NEW APPROACHES FOR SECURITY, PRIVACY AND TRUST IN COMPLEX ENVIRONMENTS, 2007, 232 : 109 - +
  • [22] RFID mutual authentication protocols
    Piramuthu, Selwyn
    [J]. DECISION SUPPORT SYSTEMS, 2011, 50 (02) : 387 - 393
  • [23] A Survey of RFID Authentication Protocols
    Yousuf, Yawer
    Potdar, Vidyasagar
    [J]. 2008 22ND INTERNATIONAL WORKSHOPS ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOLS 1-3, 2008, : 1346 - 1350
  • [24] Study Of RFID Authentication Protocols
    Jadhao, A. G.
    Ugale, S. P.
    [J]. 2018 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION (ICCUBEA), 2018,
  • [25] On Ultralightweight RFID Authentication Protocols
    D'Arco, Paolo
    De Santis, Alfredo
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2011, 8 (04) : 548 - 563
  • [26] RFID Security Protocols
    Daou, Hoda
    Kayssi, Ayman
    Chehab, Ali
    [J]. IIT: 2008 INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION TECHNOLOGY, 2008, : 233 - 237
  • [27] Privacy Enhanced Authentication Protocol for RFID Tag System Security
    Yeo, Sang-Soo
    Kwak, Jin
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2007, 7 (09): : 1 - 6
  • [28] The Lightweight RFID Grouping-Proof Protocols with Identity Authentication and Forward Security
    Shi, Zhicai
    Zhang, Xiaomei
    Liu, Jin
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2020, 2020
  • [29] Security Framework of Ultralightweight Mutual Authentication Protocols for Low Cost RFID tags
    Khalid, Madiha
    Mujahid, Umar
    [J]. PROCEEDINGS OF 2017 INTERNATIONAL CONFERENCE ON COMMUNICATION, COMPUTING AND DIGITAL SYSTEMS (C-CODE), 2017, : 26 - 31
  • [30] Security Attacks and Enhancements to Chaotic Map-Based RFID Authentication Protocols
    Süleyman Kardaş
    Ziya Alper Genç
    [J]. Wireless Personal Communications, 2018, 98 : 1135 - 1154