An Analysis of RFID Authentication Schemes for Internet of Things in Healthcare Environment Using Elliptic Curve Cryptography
Top Cited Papers
- 23 September 2014
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Internet of Things Journal
- Vol. 2 (1), 72-83
- https://doi.org/10.1109/jiot.2014.2360121
Abstract
Advances in information and communication technologies have led to the emergence of Internet of Things (IoT). In the healthcare environment, the use of IoT technologies brings convenience to physicians and patients as they can be applied to various medical areas (such as constant real-time monitoring, patient information management, medical emergency management, blood information management, and health management). The radio-frequency identification (RFID) technology is one of the core technologies of IoT deployments in the healthcare environment. To satisfy the various security requirements of RFID technology in IoT, many RFID authentication schemes have been proposed in the past decade. Recently, elliptic curve cryptography (ECC)-based RFID authentication schemes have attracted a lot of attention and have been used in the healthcare environment. In this paper, we discuss the security requirements of RFID authentication schemes, and in particular, we present a review of ECC-based RFID authentication schemes in terms of performance and security. Although most of them cannot satisfy all security requirements and have satisfactory performance, we found that there are three recently proposed ECC-based authentication schemes suitable for the healthcare environment in terms of their performance and security.Keywords
Funding Information
- National Natural Science Foundation of China (61370224, 61472074)
This publication has 45 references indexed in Scilit:
- Handbook of Applied CryptographyPublished by Taylor & Francis ,2018
- Cryptanalysis and improvement of an efficient mutual authentication RFID scheme based on elliptic curve cryptographyThe Journal of Supercomputing, 2014
- An Efficient RFID Authentication Protocol to Enhance Patient Medication Safety Using Elliptic Curve CryptographyJournal of Medical Systems, 2014
- Elliptic curve cryptographyPublished by Association for Computing Machinery (ACM) ,2011
- EC-RAC (ECDLP Based Randomized Access Control): Provably Secure RFID authentication protocolPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2008
- A Survey of Lightweight-Cryptography ImplementationsIEEE Design & Test of Computers, 2007
- High-speed hardware implementations of Elliptic Curve Cryptography: A surveyJournal of Systems Architecture, 2007
- Public-Key Cryptography for RFID-TagsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2007
- Efficient Identification and Signatures for Smart CardsPublished by Springer Nature ,2001
- Provably Secure and Practical Identification Schemes and Corresponding Signature SchemesPublished by Springer Nature ,2001