Skip to main content
Erschienen in: Peer-to-Peer Networking and Applications 3/2021

05.03.2021

A provably secure RFID authentication protocol based on ECQV for the medical internet of things

verfasst von: Abhay Kumar Agrahari, Shirshu Varma

Erschienen in: Peer-to-Peer Networking and Applications | Ausgabe 3/2021

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Radio Frequency Identification (RFID) is an emerging technology that is used for the unique identification of objects. RFID can be used in different application domains, including Health-care systems, where the safety of patient-sensitive data is a primary concern. Since the RFID technology is used in various medicine sectors, particularly real-time patient monitoring, patient medicine Information, medical emergency, and drug administration system, the use of RFID raises severe security and privacy concerns. In order to cope with these security issues, we propose an Elliptic curve based authentication protocol for RFID. The proposed model uses an implicit certificate concept to secure health-care data. We prove this claim for secure communication using the formal security analysis, i.e., BAN logic, security analysis based on the mathematical model, i.e., ROR model, formal verification using AVISPA tool, and informal security analysis. We review some of the RFID authentication schemes based on ECC in terms of performance and security. Our analysis indicates that the proposed protocol provides mobility, scalability, security, and privacy in the health care environment.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Hunt VD, Puglia A, Puglia M (2007) RFID: a guide to radio frequency identification. Wiley, New YorkCrossRef Hunt VD, Puglia A, Puglia M (2007) RFID: a guide to radio frequency identification. Wiley, New YorkCrossRef
2.
Zurück zum Zitat Juels A, Weis SA (2009) Defining strong privacy for RFID. ACM Trans Inf Sys Sec (TISSEC) 13(1):7 Juels A, Weis SA (2009) Defining strong privacy for RFID. ACM Trans Inf Sys Sec (TISSEC) 13(1):7
3.
Zurück zum Zitat Cai S, Li Y, Li T, Deng RH (2009) Attacks and improvements to an RIFD mutual authentication protocol and its extensions. In: Proceedings of the second ACM conference on wireless network security. ACM, pp 51–58 Cai S, Li Y, Li T, Deng RH (2009) Attacks and improvements to an RIFD mutual authentication protocol and its extensions. In: Proceedings of the second ACM conference on wireless network security. ACM, pp 51–58
4.
Zurück zum Zitat Atzori L, Iera A, Morabito G (2010) The internet of things: a survey. Comput Netw 54 (15):2787–2805CrossRef Atzori L, Iera A, Morabito G (2010) The internet of things: a survey. Comput Netw 54 (15):2787–2805CrossRef
5.
Zurück zum Zitat Jin C, Xu C, Zhang X, Zhao J (2015) A secure RFID mutual authentication protocol for healthcare environments using elliptic curve cryptography. J Med Sys 39(3):24CrossRef Jin C, Xu C, Zhang X, Zhao J (2015) A secure RFID mutual authentication protocol for healthcare environments using elliptic curve cryptography. J Med Sys 39(3):24CrossRef
6.
Zurück zum Zitat Chien HY (2009) The study of RFID authentication protocols and security of some popular RFID tags. In: Development and implementation of RFID technology IntechOpen Chien HY (2009) The study of RFID authentication protocols and security of some popular RFID tags. In: Development and implementation of RFID technology IntechOpen
7.
Zurück zum Zitat Wu F, Xu L, Kumari S, Li X, Das AK, Shen J (2018) A lightweight and anonymous RFID tag authentication protocol with cloud assistance for e-healthcare applications. J Ambient Intell Hum Comput 9(4):919–930CrossRef Wu F, Xu L, Kumari S, Li X, Das AK, Shen J (2018) A lightweight and anonymous RFID tag authentication protocol with cloud assistance for e-healthcare applications. J Ambient Intell Hum Comput 9(4):919–930CrossRef
8.
Zurück zum Zitat Yang J, Park J, Lee H, Ren K, Kim K (2005) Mutual authentication protocol for low-cost RFID. In: Workshop on RFID and lightweight crypto. WRLC, pp 17–24 Yang J, Park J, Lee H, Ren K, Kim K (2005) Mutual authentication protocol for low-cost RFID. In: Workshop on RFID and lightweight crypto. WRLC, pp 17–24
9.
Zurück zum Zitat Piramuthu S (2011) RFID mutual authentication protocols. Decis Sup Sys 50(2):387–393CrossRef Piramuthu S (2011) RFID mutual authentication protocols. Decis Sup Sys 50(2):387–393CrossRef
10.
Zurück zum Zitat Liao YP, Hsiao CM (2014) A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol. Ad Hoc Netw 18:133–146CrossRef Liao YP, Hsiao CM (2014) A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol. Ad Hoc Netw 18:133–146CrossRef
11.
Zurück zum Zitat Zhao Z (2014) A secure RFID authentication protocol for healthcare environments using elliptic curve cryptosystem. J Med Sys 38(5):46CrossRef Zhao Z (2014) A secure RFID authentication protocol for healthcare environments using elliptic curve cryptosystem. J Med Sys 38(5):46CrossRef
12.
Zurück zum Zitat Chou JS (2014) An efficient mutual authentication RFID scheme based on elliptic curve cryptography. J Supercomput 70(1):75–94MathSciNetCrossRef Chou JS (2014) An efficient mutual authentication RFID scheme based on elliptic curve cryptography. J Supercomput 70(1):75–94MathSciNetCrossRef
13.
Zurück zum Zitat Zhang Z, Qi Q (2014) An efficient RFID authentication protocol to enhance patient medication safety using elliptic curve cryptography. J Med Sys 38(5):47CrossRef Zhang Z, Qi Q (2014) An efficient RFID authentication protocol to enhance patient medication safety using elliptic curve cryptography. J Med Sys 38(5):47CrossRef
14.
Zurück zum Zitat Farash MS (2014) Cryptanalysis and improvement of an efficient mutual authentication RFID scheme based on elliptic curve cryptography. J Supercomput 70(2):987–1001MathSciNetCrossRef Farash MS (2014) Cryptanalysis and improvement of an efficient mutual authentication RFID scheme based on elliptic curve cryptography. J Supercomput 70(2):987–1001MathSciNetCrossRef
15.
Zurück zum Zitat Agrahari AK, Varma S (2020) Authentication in RFID Scheme Based on Elliptic Curve Cryptography. Safety, Security, and Reliability of Robotic Systems: Algorithms, Applications, and Technologies, 217. Agrahari AK, Varma S (2020) Authentication in RFID Scheme Based on Elliptic Curve Cryptography. Safety, Security, and Reliability of Robotic Systems: Algorithms, Applications, and Technologies, 217.
16.
Zurück zum Zitat He D, Kumar N, Chilamkurti N, Lee JH (2014) Lightweight ECC based RFID authentication integrated with an ID verifier transfer protocol. J Med Sys 38(10):116CrossRef He D, Kumar N, Chilamkurti N, Lee JH (2014) Lightweight ECC based RFID authentication integrated with an ID verifier transfer protocol. J Med Sys 38(10):116CrossRef
17.
Zurück zum Zitat Lee CI, Chien HY (2015) An elliptic curve cryptography-based RFID authentication securing E-health system. Int J Distrib Sensor Netw 11(12):642425CrossRef Lee CI, Chien HY (2015) An elliptic curve cryptography-based RFID authentication securing E-health system. Int J Distrib Sensor Netw 11(12):642425CrossRef
18.
Zurück zum Zitat Farash MS, Nawaz O, Mahmood K, Chaudhry SA, Khan MK (2016) A provably secure RFID authentication protocol based on elliptic curve for healthcare environments. J Med Sys 40(7):165CrossRef Farash MS, Nawaz O, Mahmood K, Chaudhry SA, Khan MK (2016) A provably secure RFID authentication protocol based on elliptic curve for healthcare environments. J Med Sys 40(7):165CrossRef
19.
Zurück zum Zitat Alamr AA, Kausar F, Kim J, Seo C (2018) A secure ECC-based RFID mutual authentication protocol for internet of things. J Supercomput 74(9):4281–4294CrossRef Alamr AA, Kausar F, Kim J, Seo C (2018) A secure ECC-based RFID mutual authentication protocol for internet of things. J Supercomput 74(9):4281–4294CrossRef
20.
Zurück zum Zitat Naeem M, Chaudhry SA, Mahmood K, Karuppiah M, Kumari S (2020) A scalable and secure RFID mutual authentication protocol using ECC for Internet of Things. Int J Commun Sys 33(13), e3906 Naeem M, Chaudhry SA, Mahmood K, Karuppiah M, Kumari S (2020) A scalable and secure RFID mutual authentication protocol using ECC for Internet of Things. Int J Commun Sys 33(13), e3906
22.
Zurück zum Zitat Miller VS (1985) Use of elliptic curves in cryptography. In: Conference on the theory and application of cryptographic techniques. Springer, Berlin, pp 417–426 Miller VS (1985) Use of elliptic curves in cryptography. In: Conference on the theory and application of cryptographic techniques. Springer, Berlin, pp 417–426
24.
Zurück zum Zitat Barker EB, Kelsey JM (2012) Sp 800-90a. recommendation for random number generation using deterministic random bit generators Barker EB, Kelsey JM (2012) Sp 800-90a. recommendation for random number generation using deterministic random bit generators
25.
Zurück zum Zitat SECG. SEC 1: Elliptic Curve Cryptography May 2009. Version 2.0 SECG. SEC 1: Elliptic Curve Cryptography May 2009. Version 2.0
26.
Zurück zum Zitat Burrows M, Abadi M, Needham RM (1989) A logic of authentication. Proc Royal Soc London A Math Phys Sci 426(1871):233–271MathSciNetMATH Burrows M, Abadi M, Needham RM (1989) A logic of authentication. Proc Royal Soc London A Math Phys Sci 426(1871):233–271MathSciNetMATH
27.
28.
Zurück zum Zitat Koblitz N, Menezes A, Vanstone S (2000) The state of elliptic curve cryptography. Desig Codes Crypt 19(2-3):173–193MathSciNetCrossRef Koblitz N, Menezes A, Vanstone S (2000) The state of elliptic curve cryptography. Desig Codes Crypt 19(2-3):173–193MathSciNetCrossRef
29.
Zurück zum Zitat Ibrahim A, Dalkılıc G (2019) Review of different classes of RFID authentication protocols. Wirel Netw 25(3):961–974CrossRef Ibrahim A, Dalkılıc G (2019) Review of different classes of RFID authentication protocols. Wirel Netw 25(3):961–974CrossRef
30.
Zurück zum Zitat Arshad H, Nikooghadam M (2016) An efficient and secure authentication and key agreement scheme for session initiation protocol using ECC. Multimedia Tools Appl 75(1):181–197CrossRef Arshad H, Nikooghadam M (2016) An efficient and secure authentication and key agreement scheme for session initiation protocol using ECC. Multimedia Tools Appl 75(1):181–197CrossRef
31.
Zurück zum Zitat Qiu S, Xu G, Ahmad H, Xu G, Qiu X, Xu H (2019) An improved lightweight two-factor authentication and key agreement protocol with dynamic identity based on elliptic curve cryptography. TIIS 13 (2):978–1002 Qiu S, Xu G, Ahmad H, Xu G, Qiu X, Xu H (2019) An improved lightweight two-factor authentication and key agreement protocol with dynamic identity based on elliptic curve cryptography. TIIS 13 (2):978–1002
32.
Zurück zum Zitat Kilinc HH, Yanik T (2014) A survey of SIP authentication and key agreement schemes. IEEE Commun Surv Tutor 16(2):1005–1023CrossRef Kilinc HH, Yanik T (2014) A survey of SIP authentication and key agreement schemes. IEEE Commun Surv Tutor 16(2):1005–1023CrossRef
33.
Zurück zum Zitat Bellare P, Rogaway (1993) Random oracles are practical: a paradigm for designing efficient protocols. In: Proceedings of the 1st ACM conference on computer and communications security, in: CCS ’93. ACM, New York, pp 62–73 Bellare P, Rogaway (1993) Random oracles are practical: a paradigm for designing efficient protocols. In: Proceedings of the 1st ACM conference on computer and communications security, in: CCS ’93. ACM, New York, pp 62–73
34.
Zurück zum Zitat Reddy G, Das AK, Odelu V, Ahmad A, Shin JS (2019) A privacy preserving three-factor authenticated key agreement protocol for client–server environment. J Ambient Intell Humaniz Comput 10(2):661–68CrossRef Reddy G, Das AK, Odelu V, Ahmad A, Shin JS (2019) A privacy preserving three-factor authenticated key agreement protocol for client–server environment. J Ambient Intell Humaniz Comput 10(2):661–68CrossRef
35.
Zurück zum Zitat Srinivas J, Das AK, Kumar N, Rodrigues JJ (2018) Cloud centric authentication for wearable healthcare monitoring system. IEEE Transactions on Dependable Secure Computing, 17(5), 942–956. Srinivas J, Das AK, Kumar N, Rodrigues JJ (2018) Cloud centric authentication for wearable healthcare monitoring system. IEEE Transactions on Dependable Secure Computing, 17(5), 942–956.
37.
Zurück zum Zitat Berenjian S, Hajizadeh S, Atani RE (2019) An incentive security model to provide fairness for peer-to-peer networks. In: 2019 IEEE conference on application, information and network security (AINS). IEEE, pp 71–76 Berenjian S, Hajizadeh S, Atani RE (2019) An incentive security model to provide fairness for peer-to-peer networks. In: 2019 IEEE conference on application, information and network security (AINS). IEEE, pp 71–76
38.
Zurück zum Zitat Berenjian S, Shajari M, Farshid N, Hatamian M (2016) Intelligent automated intrusion response system based on fuzzy decision making and risk assessment. In: 2016 IEEE 8th international conference on intelligent systems (IS). IEEE, pp 709–714 Berenjian S, Shajari M, Farshid N, Hatamian M (2016) Intelligent automated intrusion response system based on fuzzy decision making and risk assessment. In: 2016 IEEE 8th international conference on intelligent systems (IS). IEEE, pp 709–714
39.
Zurück zum Zitat Naghizadeh A, Berenjian S, Meamari E, Atani RE (2016) Structural-based tunneling: Preserving mutual anonymity for circular P2P networks. Int J Commun Sys 29(3):602–619CrossRef Naghizadeh A, Berenjian S, Meamari E, Atani RE (2016) Structural-based tunneling: Preserving mutual anonymity for circular P2P networks. Int J Commun Sys 29(3):602–619CrossRef
Metadaten
Titel
A provably secure RFID authentication protocol based on ECQV for the medical internet of things
verfasst von
Abhay Kumar Agrahari
Shirshu Varma
Publikationsdatum
05.03.2021
Verlag
Springer US
Erschienen in
Peer-to-Peer Networking and Applications / Ausgabe 3/2021
Print ISSN: 1936-6442
Elektronische ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-020-01069-z

Weitere Artikel der Ausgabe 3/2021

Peer-to-Peer Networking and Applications 3/2021 Zur Ausgabe

Premium Partner