Skip to main content
Erschienen in: Peer-to-Peer Networking and Applications 5/2016

01.09.2016

An intelligent RFID-enabled authentication scheme for healthcare applications in vehicular mobile cloud

verfasst von: Neeraj Kumar, Kuljeet Kaur, Subhas C. Misra, Rahat Iqbal

Erschienen in: Peer-to-Peer Networking and Applications | Ausgabe 5/2016

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Recently, vehicular cloud computing (VCC) has emerged as the one of the fast growing technologies with an aim to provide uninterrupted services to the moving clients even on-the-fly. One of the services provided by VCC is the mobile healthcare in which patient can be provided diagonosis from anywhere during their mobility. This paper proposes an intelligent RFID-enabled authentication scheme for healthcare applications in VCC environment. In the proposed scheme, a Petri Nets-based authentication model is used for authentication of tags, and readers. Both server, and tag authentications are protected by strong elliptical curve cryptography (ECC)-based key generation mechanism. The proposed scheme is found to be secure with respect to mutual authentication of servers and tags, replay attack, tracking attack, users anonymity, eavesdropping, and cloning with forward secrecy. To evaluate the effectiveness of the proposed scheme, it is evaluated with respect to the overhead generated, computation complexity, and % service delivery, where its performance is found better than the case where it is not applied.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Ting SL, Kwok SK, Tsang AHC, Lee WB (2011) Critical elements and lessons learnt from the implementation of an RFID-enabled healthcare management system in a medical organization. J Med Syst 35:657–669CrossRef Ting SL, Kwok SK, Tsang AHC, Lee WB (2011) Critical elements and lessons learnt from the implementation of an RFID-enabled healthcare management system in a medical organization. J Med Syst 35:657–669CrossRef
2.
Zurück zum Zitat Wamba SF, Anand A, Carter L (2013) A literature review of RFID-enabled healthcare applications and issues. Int J Inf Manag 33:875–891CrossRef Wamba SF, Anand A, Carter L (2013) A literature review of RFID-enabled healthcare applications and issues. Int J Inf Manag 33:875–891CrossRef
3.
Zurück zum Zitat Xiao Y, Shen X, Sun B, Cai L (2006) Security and privacy in RFID and applications in telemedicine. IEEE Commun Mag:64–72 Xiao Y, Shen X, Sun B, Cai L (2006) Security and privacy in RFID and applications in telemedicine. IEEE Commun Mag:64–72
4.
Zurück zum Zitat Yu X, Xia X, Chen X (2011) Design and application of RuBee-based Telemedicine data acquisition system. 10th IEEE/ACIS International Conference on Computer and Information Science:365–370. doi:10.1109/ICIS.2011.64 Yu X, Xia X, Chen X (2011) Design and application of RuBee-based Telemedicine data acquisition system. 10th IEEE/ACIS International Conference on Computer and Information Science:365–370. doi:10.​1109/​ICIS.​2011.​64
5.
Zurück zum Zitat Chen M, Gonzalez S, Leung V, Zhang Q, Li M (2010) A 2 G-RFID-based E-healthcare systems. IEEE Wirel Commun:37–43 Chen M, Gonzalez S, Leung V, Zhang Q, Li M (2010) A 2 G-RFID-based E-healthcare systems. IEEE Wirel Commun:37–43
6.
Zurück zum Zitat Ahamed SI, Rahman F, Hoque ME (2008) ERAP: ECC based RFID Authentication Protocol. 12th IEEE International Workshop on Future Trends of Distributed Computing Systems: 219–255 Ahamed SI, Rahman F, Hoque ME (2008) ERAP: ECC based RFID Authentication Protocol. 12th IEEE International Workshop on Future Trends of Distributed Computing Systems: 219–255
7.
Zurück zum Zitat Ahamed SI, Rahman F, Hoque ME, Kawsar F (2008) Secure and efficient tag searching in RFID systems using serverless search protocol. Int J Secur Appl 2(4):57–66 Ahamed SI, Rahman F, Hoque ME, Kawsar F (2008) Secure and efficient tag searching in RFID systems using serverless search protocol. Int J Secur Appl 2(4):57–66
8.
Zurück zum Zitat Won TY, Chun JY, Lee D H (2008) Strong authentication protocol for secure RFID tag search without help of central database. IEEE/IFIP International Conference on Embedded and Ubiquitous Computing:153–158 Won TY, Chun JY, Lee D H (2008) Strong authentication protocol for secure RFID tag search without help of central database. IEEE/IFIP International Conference on Embedded and Ubiquitous Computing:153–158
9.
Zurück zum Zitat Jialiang H, Youjun X, Zhiqiang X (2014) A hash-based RFID search protocol for mobile reader. Int J Hybrid Inf Technol 7(8):139–150 Jialiang H, Youjun X, Zhiqiang X (2014) A hash-based RFID search protocol for mobile reader. Int J Hybrid Inf Technol 7(8):139–150
10.
Zurück zum Zitat Tian-tian Y, Quan-yuan F (2009) A security RFID authentication protocol based on hash function. 2009 International Symposium on Information Engineering and Electronic Commerce: 804–807 Tian-tian Y, Quan-yuan F (2009) A security RFID authentication protocol based on hash function. 2009 International Symposium on Information Engineering and Electronic Commerce: 804–807
12.
Zurück zum Zitat Chen Y, Lu J, Chen S, Jan J (2009) A low-cost RFID authentication protocol with location privacy protection. 5th International Conference on Information Assurance and Security :109-113 Chen Y, Lu J, Chen S, Jan J (2009) A low-cost RFID authentication protocol with location privacy protection. 5th International Conference on Information Assurance and Security :109-113
13.
Zurück zum Zitat Liao Y, Hsiao C (2014) A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol. Ad Hoc Networks:133–146 Liao Y, Hsiao C (2014) A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol. Ad Hoc Networks:133–146
14.
Zurück zum Zitat Peeters R, Hermans J Attack on Liao and Hsiaos secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol. A follow-up to a paper published by Elseviers Ad Hoc Networks. eprint.iacr.org/2013/399.pdf Peeters R, Hermans J Attack on Liao and Hsiaos secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol. A follow-up to a paper published by Elseviers Ad Hoc Networks. eprint.​iacr.​org/​2013/​399.​pdf
15.
Zurück zum Zitat Deursen T, Radomirovic S (2009) Attacks on RFID protocols (version 1.1). Technical Report Deursen T, Radomirovic S (2009) Attacks on RFID protocols (version 1.1). Technical Report
16.
Zurück zum Zitat Bringer J, Chabanne H, Icart T (2008) Cryptanalysis of EC-RAC, a RFID identification protocol. 7th International Conference on Cryptology And Network Security - CANS08: 149–161 Bringer J, Chabanne H, Icart T (2008) Cryptanalysis of EC-RAC, a RFID identification protocol. 7th International Conference on Cryptology And Network Security - CANS08: 149–161
17.
Zurück zum Zitat Lee Y, Batina L, Verbauwhede I (2008) EC-RAC (ECDLP based randomized access control): provably secure RFID authentication protocol. IEEE Int Conf RFID 2008:97–104 Lee Y, Batina L, Verbauwhede I (2008) EC-RAC (ECDLP based randomized access control): provably secure RFID authentication protocol. IEEE Int Conf RFID 2008:97–104
18.
Zurück zum Zitat Druml N, Menghin M, Kuleta A, Steger C, Weiss R, Bock H, Haid J (2014) A Flexible and Lightweight ECC-Based Authentication Solution for Resource Constrained Systems. 17th Euromicro Conference on Digital System Design, IEEE:372–378. doi:10.1109/DSD.2014.77 Druml N, Menghin M, Kuleta A, Steger C, Weiss R, Bock H, Haid J (2014) A Flexible and Lightweight ECC-Based Authentication Solution for Resource Constrained Systems. 17th Euromicro Conference on Digital System Design, IEEE:372–378. doi:10.​1109/​DSD.​2014.​77
20.
Zurück zum Zitat Farash MS (2014) Cryptanalysis and improvement of an efficient mutual authentication RFID scheme based on elliptic curve cryptography. J Supercomput, Springer. doi:10.1007/s11227-014-1272-0 Farash MS (2014) Cryptanalysis and improvement of an efficient mutual authentication RFID scheme based on elliptic curve cryptography. J Supercomput, Springer. doi:10.​1007/​s11227-014-1272-0
21.
Zurück zum Zitat He D, Kumar N, Chen J, Lee CC, Chilamkurti N, Yeo SS (2015) Robust anonymous authentication protocol for healthcare applications using wireless medical sensor networks. Multimedia Systems 21(1):49–60CrossRef He D, Kumar N, Chen J, Lee CC, Chilamkurti N, Yeo SS (2015) Robust anonymous authentication protocol for healthcare applications using wireless medical sensor networks. Multimedia Systems 21(1):49–60CrossRef
23.
Zurück zum Zitat Hankerson D, Menezes A, Vanstone S (2004) Guide to elliptic curve cryptography. Springer Hankerson D, Menezes A, Vanstone S (2004) Guide to elliptic curve cryptography. Springer
24.
Zurück zum Zitat Chen YC, Sun HM, Chen RS (2014) Design and implementation of wearable RFID tag for real-time ubiquitous medical care. IEEE BioWireleSS:25–27 Chen YC, Sun HM, Chen RS (2014) Design and implementation of wearable RFID tag for real-time ubiquitous medical care. IEEE BioWireleSS:25–27
25.
Zurück zum Zitat Jan GE, Sun CC, Hung LP, Jan YS, Weng SH (2013) Real-time monitor system with RFID localization for seniors. IEEE 17th International Symposium on Consumer Electronics Jan GE, Sun CC, Hung LP, Jan YS, Weng SH (2013) Real-time monitor system with RFID localization for seniors. IEEE 17th International Symposium on Consumer Electronics
26.
Zurück zum Zitat Amendola S, Lodato R, Manzari S, Occhiuzzi C, Marrocco G (2014) RFID technology for IoT-based personal healthcare in smart spaces. IEEE Inernet Things J 1(2):144–152CrossRef Amendola S, Lodato R, Manzari S, Occhiuzzi C, Marrocco G (2014) RFID technology for IoT-based personal healthcare in smart spaces. IEEE Inernet Things J 1(2):144–152CrossRef
30.
Zurück zum Zitat Mahulea C, Mahulea L, Garca-Soriano JM, Colom JM (2014) Petri Nets with Resources for Modelling Primary Healthcare Systems. Proceedings of the 18th International Conference on System Theory, Control and Computing, IEEE :639–644 Mahulea C, Mahulea L, Garca-Soriano JM, Colom JM (2014) Petri Nets with Resources for Modelling Primary Healthcare Systems. Proceedings of the 18th International Conference on System Theory, Control and Computing, IEEE :639–644
31.
Zurück zum Zitat Ibe O C, Trivedi K S (1990) Stochastic petri net models of polling systems. IEEE J Selected Areas Commun 8(9):1649–1657CrossRef Ibe O C, Trivedi K S (1990) Stochastic petri net models of polling systems. IEEE J Selected Areas Commun 8(9):1649–1657CrossRef
32.
Zurück zum Zitat Entezari-Maleki R, Trivedi KS, Movaghar A (2013) Performance evaluation of grid environments using stochastic reward nets Entezari-Maleki R, Trivedi KS, Movaghar A (2013) Performance evaluation of grid environments using stochastic reward nets
33.
Zurück zum Zitat Malhotra M, Trivedi KS (1995) Dependability modeling using petri-nets. IEEE Trans Reliab 44(3):428–440CrossRef Malhotra M, Trivedi KS (1995) Dependability modeling using petri-nets. IEEE Trans Reliab 44(3):428–440CrossRef
34.
Zurück zum Zitat Kumar N, Misra S, Rodrigues JPC, Obaidat MS (2014) Networks of learning automata: a performance analysis study. IEEE Wirel Commun Mag 21(6):41–47CrossRef Kumar N, Misra S, Rodrigues JPC, Obaidat MS (2014) Networks of learning automata: a performance analysis study. IEEE Wirel Commun Mag 21(6):41–47CrossRef
35.
Zurück zum Zitat Kumar N, Rodrigues JJPC, Chilamkurti N (2014) Bayesian coalition game as-a-service for content distribution in internet of vehicles. IEEE Internet Things J 1(6):544–555CrossRef Kumar N, Rodrigues JJPC, Chilamkurti N (2014) Bayesian coalition game as-a-service for content distribution in internet of vehicles. IEEE Internet Things J 1(6):544–555CrossRef
36.
37.
Zurück zum Zitat He DB, Kumar N, Khan MK, Lee JK (2013) A two factor authentication scheme for Roaming Service in Global Mobility Networks. IEEE Trans Consum Electron 59(4):811–817CrossRef He DB, Kumar N, Khan MK, Lee JK (2013) A two factor authentication scheme for Roaming Service in Global Mobility Networks. IEEE Trans Consum Electron 59(4):811–817CrossRef
38.
Zurück zum Zitat He D, Kumar N, Khan MK, Lee JH (2014) Enhanced three-factor security protocol for USB consumer storage devices. IEEE Trans Consum Electron 60(1):30–37CrossRef He D, Kumar N, Khan MK, Lee JH (2014) Enhanced three-factor security protocol for USB consumer storage devices. IEEE Trans Consum Electron 60(1):30–37CrossRef
39.
Zurück zum Zitat Kumar N, Chilamkurti N, Misra S C (2015) Bayesian coalition game for internet of things: an ambient intelligence approach. IEEE Commun Mag 53(1):48–55CrossRef Kumar N, Chilamkurti N, Misra S C (2015) Bayesian coalition game for internet of things: an ambient intelligence approach. IEEE Commun Mag 53(1):48–55CrossRef
40.
41.
Zurück zum Zitat Krajzewicz D, Erdmann J, Behrisch M, Bieker L (2012) Recent development and applications of SUMO-simulation of urban mobility. Int J Adv Syst Meas 5(3/4):128–138 Krajzewicz D, Erdmann J, Behrisch M, Bieker L (2012) Recent development and applications of SUMO-simulation of urban mobility. Int J Adv Syst Meas 5(3/4):128–138
Metadaten
Titel
An intelligent RFID-enabled authentication scheme for healthcare applications in vehicular mobile cloud
verfasst von
Neeraj Kumar
Kuljeet Kaur
Subhas C. Misra
Rahat Iqbal
Publikationsdatum
01.09.2016
Verlag
Springer US
Erschienen in
Peer-to-Peer Networking and Applications / Ausgabe 5/2016
Print ISSN: 1936-6442
Elektronische ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-015-0332-4

Weitere Artikel der Ausgabe 5/2016

Peer-to-Peer Networking and Applications 5/2016 Zur Ausgabe