메뉴 건너뛰기




Volumn 38, Issue 5, 2014, Pages

A Secure RFID Authentication Protocol for Healthcare Environments Using Elliptic Curve Cryptosystem

Author keywords

Authentication protocol; Elliptic curve cryptography; Healthcare environment; Radio frequency identification

Indexed keywords


EID: 84901582234     PISSN: 01485598     EISSN: 1573689X     Source Type: Journal    
DOI: 10.1007/s10916-014-0046-9     Document Type: Article
Times cited : (83)

References (35)
  • 1
    • 33144457479 scopus 로고    scopus 로고
    • RFID security and privacy: a research survey
    • Juels, A., RFID security and privacy: a research survey. IEEE J. Sel Areas Commun 24:381–394, 2006.
    • (2006) IEEE J. Sel Areas Commun , vol.24 , pp. 381-394
    • Juels, A.1
  • 3
    • 79952440568 scopus 로고    scopus 로고
    • Real-time location and inpatient care systems based on passive RFID
    • Najera, P., Lopez, J., and Roman, R., Real-time location and inpatient care systems based on passive RFID. J. Netw. Comput. Appl. 34(3):980–989, 2011.
    • (2011) J. Netw. Comput. Appl. , vol.34 , Issue.3 , pp. 980-989
    • Najera, P.1    Lopez, J.2    Roman, R.3
  • 5
    • 57549090091 scopus 로고    scopus 로고
    • Public views of mobile medical devices and services: A US national survey of consumer sentiments towards RFID healthcare technology
    • Katz, J. E., and Rice, R. E., Public views of mobile medical devices and services: A US national survey of consumer sentiments towards RFID healthcare technology. Int. J. Med. Inform. 78(2):104–114, 2009.
    • (2009) Int. J. Med. Inform. , vol.78 , Issue.2 , pp. 104-114
    • Katz, J.E.1    Rice, R.E.2
  • 6
    • 84922424994 scopus 로고    scopus 로고
    • The benefit analysis of RFID use in the health management center—the experience in Shin Kong Wu Ho-Su Memorial Hospital: National Taiwan University
    • Leu, J. G., The benefit analysis of RFID use in the health management center—the experience in Shin Kong Wu Ho-Su Memorial Hospital: National Taiwan University, 2010.
    • (2010) G.
    • Leu, J.1
  • 7
    • 70350710817 scopus 로고    scopus 로고
    • RFID-based operation room and medicare system for patient safety enhancement—a case study of keelung branch
    • Yu, C., Chen, C., Liao, P., and Lee, Y., RFID-based operation room and medicare system for patient safety enhancement—a case study of keelung branch. J. Inf. Manag. 15:97–122, 2008.
    • (2008) J. Inf. Manag. , vol.15 , pp. 97-122
    • Yu, C.1    Chen, C.2    Liao, P.3    Lee, Y.4
  • 9
    • 35048876270 scopus 로고    scopus 로고
    • Security and privacy aspects of low-cost radio frequency identification systems. Security in Pervasive Computing - SPC 2003
    • Weis, S. A., Sarma, S. E., Rivest, R. L., and Engles, D. W., Security and privacy aspects of low-cost radio frequency identification systems. Security in Pervasive Computing - SPC 2003, Springer-Verlag. 2802:201–212, 2003.
    • (2003) Springer-Verlag , vol.2802 , pp. 201-212
    • Weis, S.A.1    Sarma, S.E.2    Rivest, R.L.3    Engles, D.W.4
  • 10
    • 84939907773 scopus 로고    scopus 로고
    • Cryptographic approach to privacy friendly tags, RFID Privacy Workshop:
    • Okhubo, M., Suzuki, K., and Kinoshita, S., Cryptographic approach to privacy friendly tags. RFID Privacy Workshop, 2003.
    • (2003) and Kinoshita, S.
    • Okhubo, M.1    Suzuki, K.2
  • 11
    • 2942625823 scopus 로고    scopus 로고
    • Hash based enhancement of location privacy for radio frequency identification devices using varying identifiers. International Workshop on Pervasive Computing and Communication Security—PerSec 2004
    • Henrici, D., and Muller, P., Hash based enhancement of location privacy for radio frequency identification devices using varying identifiers. International Workshop on Pervasive Computing and Communication Security—PerSec 2004, IEEE Computer Society, 149–153, 2004.
    • (2004) IEEE Computer Society , pp. 149-153
    • Henrici, D.1    Muller, P.2
  • 12
    • 84977783611 scopus 로고    scopus 로고
    • Strong and robust rfid authentication enabling perfect ownership transfer. Information and Communications Security, Lecture Notes in Computer Science
    • Lim, C., and Kwon, T., Strong and robust rfid authentication enabling perfect ownership transfer. Information and Communications Security, Lecture Notes in Computer Science, Springer, 4307:1–20, 2006.
    • (2006) Springer , vol.4307 , pp. 1-20
    • Lim, C.1    Kwon, T.2
  • 14
    • 84939907775 scopus 로고    scopus 로고
    • Peris-Lopez, P., Hernandez-Castro, J. C., Estevez-Tapiador, J. M., and Ribagorda, A. LMAP: a real lightweight authentication protocol for low cost rfid tags. In Hand of Workshop on RFID and Lightweight Crypto, 2006
    • Peris-Lopez, P., Hernandez-Castro, J. C., Estevez-Tapiador, J. M., and Ribagorda, A. LMAP: a real lightweight authentication protocol for low cost rfid tags. In Hand of Workshop on RFID and Lightweight Crypto, 2006.
  • 16
    • 36248982045 scopus 로고    scopus 로고
    • SAS1: A new ultralightweight rfid authentication protocol providing strong authentication and strong integrity
    • Chien, H. Y., SAS1: A new ultralightweight rfid authentication protocol providing strong authentication and strong integrity. IEEE Trans. Dependable Secure Comput. 4(4):337–340, 2007.
    • (2007) IEEE Trans. Dependable Secure Comput. , vol.4 , Issue.4 , pp. 337-340
    • Chien, H.Y.1
  • 17
    • 2942560605 scopus 로고    scopus 로고
    • A., “yoking proofs” for rfid tags. First International Workshop on Pervasive Computing and Communication Security
    • Juels, A., “yoking proofs” for rfid tags. First International Workshop on Pervasive Computing and Communication Security, IEEE Computer Society, 138–143, 2004.
    • (2004) IEEE Computer Society , pp. 138-143
  • 18
    • 18944380407 scopus 로고    scopus 로고
    • Surgichip—new technology for prevensions of wrong site, wrong procedure, wrong person surgery
    • Sandlin, D., Surgichip—new technology for prevensions of wrong site, wrong procedure, wrong person surgery. J. Perianesth Nurs. 20(2):144–146, 2005.
    • (2005) J. Perianesth Nurs. , vol.20 , Issue.2 , pp. 144-146
    • Sandlin, D.1
  • 20
    • 49949152652 scopus 로고    scopus 로고
    • A new method to guard inpatient medication safety by the implementation of rfid
    • Sun, P. R., Wang, B. H., and Wu, F., A new method to guard inpatient medication safety by the implementation of rfid. J. Med. Syst. 32(4):327–332, 2008.
    • (2008) J. Med. Syst. , vol.32 , Issue.4 , pp. 327-332
    • Sun, P.R.1    Wang, B.H.2    Wu, F.3
  • 21
    • 77955537415 scopus 로고    scopus 로고
    • Anonymous coexistence proofs for rfid tags
    • Lo, N. W., and Yeh, K. H., Anonymous coexistence proofs for rfid tags. J. Inf. Sci. Eng. 26(4):1213–1230, 2010.
    • (2010) J. Inf. Sci. Eng. , vol.26 , Issue.4 , pp. 1213-1230
    • Lo, N.W.1    Yeh, K.H.2
  • 23
    • 46749130059 scopus 로고    scopus 로고
    • A novel mutual authentication scheme based on quadratic residues for RFID systems
    • Chen, Y., Chou, J. S., and Sun, H. M., A novel mutual authentication scheme based on quadratic residues for RFID systems. Comput. Netw. 52(12):2373–2380, 2008.
    • (2008) Comput. Netw. , vol.52 , Issue.12 , pp. 2373-2380
    • Chen, Y.1    Chou, J.S.2    Sun, H.M.3
  • 24
    • 78751649779 scopus 로고    scopus 로고
    • Improvement of the RFID authentication scheme based on quadratic residues
    • Yeh, T. C., Wu, C. H., and Tseng, Y. M., Improvement of the RFID authentication scheme based on quadratic residues. Comput. Commun. 34(3):337–341, 2011.
    • (2011) Comput. Commun. , vol.34 , Issue.3 , pp. 337-341
    • Yeh, T.C.1    Wu, C.H.2    Tseng, Y.M.3
  • 25
    • 84870065586 scopus 로고    scopus 로고
    • A practical quadratic residues based scheme for authentication and privacy in mobile RFID systems
    • Doss, R., Sundaresan, S., and Zhou, W., A practical quadratic residues based scheme for authentication and privacy in mobile RFID systems. Ad Hoc Netw. 11(1):383–396, 2013.
    • (2013) Ad Hoc Netw. , vol.11 , Issue.1 , pp. 383-396
    • Doss, R.1    Sundaresan, S.2    Zhou, W.3
  • 26
    • 33745654539 scopus 로고    scopus 로고
    • RFID-tags for anti-counterfeiting
    • Tuyls, P., and Batina, L., RFID-tags for anti-counterfeiting. Lect. Notes Comput. Sci 3860:115–131, 2006.
    • (2006) Lect. Notes Comput. Sci , vol.3860 , pp. 115-131
    • Tuyls, P.1    Batina, L.2
  • 28
    • 49049105964 scopus 로고    scopus 로고
    • EC-RAC (ECDLP Based Randomized Access Control): Provably Secure RFID Authentication Protocol
    • Lee, Y. K., Batina, L., and Verbauwhede, I., EC-RAC (ECDLP Based Randomized Access Control): Provably Secure RFID Authentication Protocol, IEEE International Conference on RFID, pp. 97–104, 2008.
    • (2008) IEEE International Conference on RFID , pp. 97-104
    • Lee, Y.K.1    Batina, L.2    Verbauwhede, I.3
  • 31
    • 84864058187 scopus 로고    scopus 로고
    • A More Secure Authentication Scheme for Telecare Medicine Information Systems
    • He, D., Chen, J., and Zhang, R., A More Secure Authentication Scheme for Telecare Medicine Information Systems. J. Med. Syst. 36(3):1989–1995, 2012.
    • (2012) J. Med. Syst. , vol.36 , Issue.3 , pp. 1989-1995
    • He, D.1    Chen, J.2    Zhang, R.3
  • 32
    • 84863989374 scopus 로고    scopus 로고
    • Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol
    • He, D., Chen, Y., and Chen, J., Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol. Nonlinear Dyn. 69(3):1149–1157, 2012.
    • (2012) Nonlinear Dyn. , vol.69 , Issue.3 , pp. 1149-1157
    • He, D.1    Chen, Y.2    Chen, J.3
  • 33
    • 84872265840 scopus 로고    scopus 로고
    • Hao, X., Wang, J., Yang, Q., Yan, X., and Li, P., A chaotic map-based authentication scheme for telecare medicine information systems
    • Hao, X., Wang, J., Yang, Q., Yan, X., and Li, P., A chaotic map-based authentication scheme for telecare medicine information systems. doi: 10.1007/s10916-012-9919-y, 2013.
  • 34
    • 84867843422 scopus 로고    scopus 로고
    • An efficient authentication scheme for telecare medicine information systems
    • Zhu, Z., An efficient authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3833–3838, 2012.
    • (2012) J. Med. Syst. , vol.36 , Issue.6 , pp. 3833-3838
    • Zhu, Z.1
  • 35
    • 84893021026 scopus 로고    scopus 로고
    • An efficient anonymous authentication scheme for wireless body area networks using elliptic curve cryptosystem
    • Zhao, Z., An efficient anonymous authentication scheme for wireless body area networks using elliptic curve cryptosystem. J. Med. Syst. 38(2):13, 2014.
    • (2014) J. Med. Syst. , vol.38 , Issue.2 , pp. 13
    • Zhao, Z.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.