Scalable, efficient, and secure RFID with elliptic curve cryptosystem for Internet of Things in healthcare environment
Tóm tắt
Từ khóa
Tài liệu tham khảo
H. Sundmaeker, P. Guillemin, P. Friess, S. Woelfflé, Vision and challenges for realising the Internet of Things. Cluster of European Research Projects on the Internet of Things, European Commision3(3), 34–36 (2010)
L. Atzori, A. Iera, G. Morabito, Computer networks: the International Journal of Computer and Telecommunications Networking. Volume54, 2787–2805 (2010)
Z. Zhao, A secure RFID authentication protocol for healthcare environments using elliptic curve cryptosystem. Journal of medical systems38(5), 46 (2014)
A. Juels, RFID security and privacy: a research survey. IEEE journal on selected areas in communications24(2), 381–394 (2006)
D.C. Ranasinghe, M. Sheng, S. Zeadally, Unique radio innovation for the 21st century: building scalable and global RFID networks (2010)
S. Cai, Y. Li, T. Li, and R. H. Deng, "Attacks and improvements to an RFID mutual authentication protocol and its extensions," in Proceedings of the second ACM conference on Wireless network security, 2009, pp. 51-58: ACM.
M.S. Farash, O. Nawaz, K. Mahmood, S.A. Chaudhry, M.K. Khan, A provably secure RFID authentication protocol based on elliptic curve for healthcare environments. Journal of medical systems40(7), 165 (2016)
D. He, S. Zeadally, An analysis of RFID authentication schemes for internet of things in healthcare environment using elliptic curve cryptography. IEEE internet of things journal2(1), 72–83 (2015)
Q. Z. Sheng, X. Li, and S. Zeadally, "Enabling next-generation RFID applications: solutions and challenges," Computer, vol. 41, no. 9, 2008.
X. Yang, X. Yi, Y. Zeng, I. Khalil, X. Huang, and S. Nepal, "An improved lightweight RFID authentication protocol for Internet of Things," in International Conference on Web Information Systems Engineering, 2018, pp. 111-126: Springer.
Y. Hung, "The study of adopting RFID technology in medical institute with the perspectives of cost benefit," in International Medical Informatics Symposium in Taiwan, Taiwan, 2007.
J.E. Katz, R.E. Rice, Public views of mobile medical devices and services: a US national survey of consumer sentiments towards RFID healthcare technology. International journal of medical informatics78(2), 104–114 (2009)
J. Leu, The benefit analysis of RFID use in the health management center—the experience in Shin Kong Wu Ho-Su Memorial Hospital (National Taiwan University, 2010)
W. Yao, C.-H. Chu, Z. Li, The adoption and implementation of RFID technologies in healthcare: a literature review. Journal of medical systems36(6), 3507–3525 (2012)
P. Najera, J. Lopez, R. Roman, Real-time location and inpatient care systems based on passive RFID. Journal of Network and Computer Applications34(3), 980–989 (2011)
F. Rahman, M.Z.A. Bhuiyan, S.I. Ahamed, A privacy preserving framework for RFID based healthcare systems. Future Generation Computer Systems72, 339–352 (2017)
J. Kang, Lightweight mutual authentication RFID protocol for secure multi-tag simultaneous authentication in ubiquitous environments. The Journal of Supercomputing, 1–14 (2016)
L. Gao, L. Zhang, M. Ma, Low cost RFID security protocol based on rabin symmetric encryption algorithm. Wireless Personal Communications, 1–14 (2017)
M.H. Dehkordi, Y. Farzaneh, Improvement of the hash-based RFID mutual authentication protocol. Wireless personal communications75(1), 219–232 (2014)
M. Safkhani, P. Peris-Lopez, J.C. Hernandez-Castro, N. Bagheri, Cryptanalysis of the Cho et al. protocol: a hash-based RFID tag mutual authentication protocol. Journal of Computational and Applied Mathematics259, 571–577 (2014)
M.R. Alagheband, M.R. Aref, Simulation-based traceability analysis of RFID authentication protocols. Wireless Personal Communications77(2), 1019–1038 (2014)
C.L. Chen, Y.C. Huang, T.F. Shih, A novel mutual authentication scheme for RFID conforming EPCglobal class 1 generation 2 standards. Information Technology And Control41(3), 220–228 (2012)
W.C. Kuo, B.-L. Chen, L.-C. Wuu, Secure indefinite-index RFID authentication scheme with challenge-response strategy. Information Technology And Control42(2), 124–130 (2013)
M.R. Alagheband, M.R. Aref, Unified privacy analysis of new-found RFID authentication protocols. Security and Communication Networks6(8), 999–1009 (2013)
M.S. Farash, Cryptanalysis and improvement of an efficient mutual authentication RFID scheme based on elliptic curve cryptography. The Journal of Supercomputing70(2), 987–1001 (2014)
Z. Zhang, Q. Qi, An efficient RFID authentication protocol to enhance patient medication safety using elliptic curve cryptography. Journal of medical systems38(5), 47 (2014)
H.-Y. Chien, Elliptic curve cryptography-based RFID authentication resisting active tracking. Wireless Personal Communications94(4), 2925–2936 (2017)
H. Shen, J. Shen, M.K. Khan, J.-H. Lee, Efficient RFID authentication using elliptic curve cryptography for the internet of things. Wireless Personal Communications96(4), 5253–5266 (2017)
D. Hankerson, S. Vanstone, A. Menezes, Guide to elliptic curve cryptography, Springer-Verlag (New York, 2004)
P. Deepthi, P. Sathidevi, New stream ciphers based on elliptic curve point multiplication. Computer Communications32(1), 25–33 (2009)
M.S. Farash, Cryptanalysis and improvement of ‘an improved authentication with key agreement scheme on elliptic curve cryptosystem for global mobility networks’. International Journal of Network Management25(1), 31–51 (2015)
C.-T. Li, C.-Y. Weng, C.-C. Lee, A secure RFID tag authentication protocol with privacy preserving in telecare medicine information system. Journal of medical systems39(8), 77 (2015)
K. Srivastava, A.K. Awasthi, S.D. Kaul, R. Mittal, A hash based mutual RFID tag authentication protocol in telecare medicine information system. Journal of medical systems39(1), 153 (2015)
J. Chou, "A secure RFID authentication protocol to enhance patient medication safety using elliptic curve cryptography," J. Supercomput, 2014.
A.A. Alamr, F. Kausar, J. Kim, C. Seo, A secure ECC-based RFID mutual authentication protocol for internet of things. The Journal of Supercomputing, 1–14 (2016)
Y.-P. Liao and C.-M. Hsiao, "A secure ECC-based RFID authentication scheme using hybrid protocols," in Advances in Intelligent Systems and Applications-Volume 2: Springer, 2013, pp. 1-13.
S. Amendola, R. Lodato, S. Manzari, C. Occhiuzzi, G. Marrocco, RFID technology for IoT-based personal healthcare in smart spaces. IEEE Internet of things journal1(2), 144–152 (2014)
C. Lai, H. Li, X. Liang, R. Lu, K. Zhang, X. Shen, CPAL: a conditional privacy-preserving authentication with access linkability for roaming service. IEEE Internet of Things Journal1(1), 46–57 (2014)
Y.-P. Liao, C.-M. Hsiao, A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol. Ad Hoc Networks18, 133–146 (2014)
H. Shen, C. Gao, D. He, L. Wu, New biometrics-based authentication scheme for multi-server environment in critical systems. Journal of Ambient Intelligence and Humanized Computing6(6), 825–834 (2015)
D. He, S. Zeadally, Authentication protocol for an ambient assisted living system. IEEE Communications Magazine53(1), 71–77 (2015)
D. He, An efficient remote user authentication and key agreement protocol for mobile client–server environment from pairings. Ad Hoc Networks10(6), 1009–1016 (2012)
D.M. Hein, J. Wolkerstorfer, N. Felber, ECC is ready for RFID-a proof in silicon. Selected Areas in Cryptography5381, 401–413 (2008) Springer
Y.K. Lee, K. Sakiyama, L. Batina, I. Verbauwhede, Elliptic-curve-based security processor for RFID. IEEE Transactions on Computers57(11), 1514–1527 (2008)
H. Ning, H. Liu, J. Mao, Y. Zhang, Scalable and distributed key array authentication protocol in radio frequency identification-based sensor systems. IET communications5(12), 1755–1768 (2011)
B. Alomair, A. Clark, J. Cuellar, R. Poovendran, Scalable RFID systems: a privacy-preserving protocol with constant-time identification. IEEE Transactions on Parallel and Distributed Systems23(8), 1536–1550 (2012)
B. Alomair, R. Poovendran, Privacy versus scalability in radio frequency identification systems. Computer Communications33(18), 2155–2163 (2010)
B. Song, C.J. Mitchell, Scalable RFID security protocols supporting tag ownership transfer. Computer Communications34(4), 556–566 (2011)
P. Guo, J. Wang, X. H. Geng, C. S. Kim, and J.-U. Kim, "A variable threshold-value authentication architecture for wireless mesh networks," vol. 15, no. 6, pp. 929-935, 2014.
J. Shen, H.-W. Tan, J. Wang, J.-W. Wang, and S.-Y. Lee, "A novel routing protocol providing good transmission reliability in underwater sensor networks," vol. 16, no. 1, pp. 171-178, 2015.
P. Tuyls and L. Batina, "RFID-tags for anti-counterfeiting," in Cryptographers’ Track at the RSA Conference, 2006, pp. 115-131: Springer.
Y. K. Lee, L. Batina, and I. Verbauwhede, "EC-RAC (ECDLP based randomized access control): provably secure RFID authentication protocol," in RFID, 2008 IEEE International Conference on, 2008, pp. 97-104: IEEE.
L. Batina, J. Guajardo, T. Kerins, N. Mentens, P. Tuyls, and I. Verbauwhede, "Public-key cryptography for RFID-tags," in Pervasive Computing and Communications Workshops, 2007. PerCom Workshops' 07. Fifth Annual IEEE International Conference on, 2007, pp. 217-222: IEEE.
K. Kaur, N. Kumar, M. Singh, and M. S. Obaidat, "Lightweight authentication protocol for RFID-enabled systems based on ECC," in Global Communications Conference (GLOBECOM), 2016 IEEE, 2016, pp. 1-6: IEEE
A. ANSI, "X9. 62-1998: public key cryptography for the financial services industry: the elliptic curve digital signature algorithm (ECDSA)," American National Standards Institute (ANSI), Washington, DC, 1998.
D. Johnson, A. Menezes, S. Vanstone, The elliptic curve digital signature algorithm (ECDSA). International Journal of Information Security1(1), 36–63 (2001)
M. Nikooghadam, A. Zakerolhosseini, M.R. Bonyadi, A protocol for digital signature based on the elliptic curve discrete logarithm problem. Journal of Applied Sciences 8(10), 1919–1925 (2008)
Azarderakhsh et al. A key management scheme for cluster based wireless sensor networks.2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.