메뉴 건너뛰기




Volumn 2, Issue 1, 2015, Pages 72-83

An Analysis of RFID Authentication Schemes for Internet of Things in Healthcare Environment Using Elliptic Curve Cryptography

Author keywords

Authentication; Elliptic curve cryptography; Internet of Things; Performance; Radio Frequency indentification; Security

Indexed keywords

AUTHENTICATION; CRYPTOGRAPHY; GEOMETRY; HEALTH CARE; INFORMATION MANAGEMENT; INTERNET; PUBLIC KEY CRYPTOGRAPHY; RADIO FREQUENCY IDENTIFICATION (RFID); RADIO WAVES; RISK MANAGEMENT;

EID: 84962562081     PISSN: None     EISSN: 23274662     Source Type: Journal    
DOI: 10.1109/JIOT.2014.2360121     Document Type: Article
Times cited : (290)

References (68)
  • 1
    • 84962624455 scopus 로고    scopus 로고
    • UN, World Population Aging 2013
    • UN, "World Population Aging 2013, " 2013, pp. 8-10.
    • (2013) , pp. 8-10
  • 2
    • 24644498485 scopus 로고    scopus 로고
    • RFID: A technical overview and its application to the enterprise
    • May/Jun
    • R. Weinstein, "RFID: A technical overview and its application to the enterprise, " IEEE IT Prof., vol. 7, no. 3, pp. 27-33, May/Jun. 2005.
    • (2005) IEEE IT Prof , vol.7 , Issue.3 , pp. 27-33
    • Weinstein, R.1
  • 3
    • 77956877124 scopus 로고    scopus 로고
    • The Internet of Things: A survey
    • L. Atzori, A. Iera, and G. Morabito, "The Internet of Things: A survey, " Comput. Netw., vol. 54, no. 15, pp. 2787-2805, 2010.
    • (2010) Comput. Netw , vol.54 , Issue.15 , pp. 2787-2805
    • Atzori, L.1    Iera, A.2    Morabito, G.3
  • 4
    • 79952440568 scopus 로고    scopus 로고
    • Real-Time location and inpatient care systems based on passive RFID
    • P. Najera, J. Lopez, and R. Roman, "Real-Time location and inpatient care systems based on passive RFID, " J. Netw. Comput. Appl., vol. 34, no. 3, pp. 980-989, 2011.
    • (2011) J. Netw. Comput. Appl , vol.34 , Issue.3 , pp. 980-989
    • Najera, P.1    Lopez, J.2    Roman, R.3
  • 7
    • 57549090091 scopus 로고    scopus 로고
    • Public views of mobile medical devices and services: A US national survey of consumer sentiments towards RFID healthcare technology
    • J. Katz and R. Rice, "Public views of mobile medical devices and services: A US national survey of consumer sentiments towards RFID healthcare technology, " Int. J. Med. Informat., vol. 78, no. 2, pp. 104-114, 2009.
    • (2009) Int. J. Med. Informat , vol.78 , Issue.2 , pp. 104-114
    • Katz, J.1    Rice, R.2
  • 9
    • 84867882863 scopus 로고    scopus 로고
    • The adoption and implementation of RFID technologies in healthcare: A literature review
    • W. Yao, C. Chu, and Z. Li, "The adoption and implementation of RFID technologies in healthcare: A literature review, " J. Med. Syst., vol. 36, no. 6, pp. 3507-3525, 2012.
    • (2012) J. Med. Syst , vol.36 , Issue.6 , pp. 3507-3525
    • Yao, W.1    Chu, C.2    Li, Z.3
  • 10
    • 33751546328 scopus 로고    scopus 로고
    • Mutual authentication protocol for RFID conforming to EPC class 1 generation 2 standards
    • H. Chien and C. Chen, "Mutual authentication protocol for RFID conforming to EPC class 1 generation 2 standards, " Comput. Stand. Interfaces, vol. 29, no. 2, pp. 254-259, 2007.
    • (2007) Comput. Stand. Interfaces , vol.29 , Issue.2 , pp. 254-259
    • Chien, H.1    Chen, C.2
  • 11
    • 33751513718 scopus 로고    scopus 로고
    • Enhancing security of EPCglobal Gen-2 RFID tag against traceability and cloning
    • D. Duc, J. Park, H. Lee, and K. Kim, "Enhancing security of EPCglobal Gen-2 RFID tag against traceability and cloning, " in Proc. Symp. Cryptogr. Inf. Secur., 2006, pp. 97-107.
    • (2006) Proc. Symp. Cryptogr. Inf. Secur , pp. 97-107
    • Duc, D.1    Park, J.2    Lee, H.3    Kim, K.4
  • 13
    • 77957851534 scopus 로고    scopus 로고
    • Securing RFID systems conforming to EPC class 1 generation 2 standard
    • T. Yeh, Y. Wanga, T. Kuo, and S. Wang, "Securing RFID systems conforming to EPC class 1 generation 2 standard, " Exp. Syst. Appl., vol. 37, no. 12, pp. 7678-7683, 2010.
    • (2010) Exp. Syst. Appl , vol.37 , Issue.12 , pp. 7678-7683
    • Yeh, T.1    Wanga, Y.2    Kuo, T.3    Wang, S.4
  • 16
  • 18
    • 41549156956 scopus 로고    scopus 로고
    • A new hash-based RFID mutual authentication protocol providing enhanced user privacy protection
    • J. Lim, H. Oh, and S. Kim, "A new hash-based RFID mutual authentication protocol providing enhanced user privacy protection, " in Proc. 4th Int. Conf. Inf. Secur. Pract. Exper. (ISPEC), 2008, pp. 278-289.
    • (2008) Proc. 4th Int. Conf. Inf. Secur. Pract. Exper. (ISPEC , pp. 278-289
    • Lim, J.1    Oh, H.2    Kim, S.3
  • 19
    • 67349277179 scopus 로고    scopus 로고
    • A privacy and authentication protocol for passive RFID tags
    • A. Liu and A. Bailey, "A privacy and authentication protocol for passive RFID tags, " Comput. Commun., vol. 32, no. 7, pp. 1194-1199, 2009.
    • (2009) Comput. Commun , vol.32 , Issue.7 , pp. 1194-1199
    • Liu, A.1    Bailey, A.2
  • 20
    • 57049150751 scopus 로고    scopus 로고
    • A study on secure RFID mutual authentication scheme in pervasive
    • S. Kang, D. Lee, and I. Lee, "A study on secure RFID mutual authentication scheme in pervasive, " Comput. Commun., vol. 31, no. 18, pp. 4248-4254, 2008.
    • (2008) Comput. Commun , vol.31 , Issue.18 , pp. 4248-4254
    • Kang, S.1    Lee, D.2    Lee, I.3
  • 21
    • 78751647847 scopus 로고    scopus 로고
    • Securing against brute-force attack: A hash-based RFID mutual authentication protocol using a secret value
    • J. Cho, S. Yeo, and S. Kim, "Securing against brute-force attack: A hash-based RFID mutual authentication protocol using a secret value, " Comput. Commun., vol. 34, no. 3, pp. 391-397, 2011.
    • (2011) Comput. Commun , vol.34 , Issue.3 , pp. 391-397
    • Cho, J.1    Yeo, S.2    Kim, S.3
  • 25
    • 53749094694 scopus 로고    scopus 로고
    • Public key cryptography based privacy preserving multi-context RFID infrastructure
    • S. Kaya, E. Savas, A. Levi, and O. Ercetin, "Public key cryptography based privacy preserving multi-context RFID infrastructure, " Ad Hoc Netw., vol. 7, no. 1, pp. 136-152, 2009.
    • (2009) Ad Hoc Netw , vol.7 , Issue.1 , pp. 136-152
    • Kaya, S.1    Savas, E.2    Levi, A.3    Ercetin, O.4
  • 27
    • 54049143316 scopus 로고    scopus 로고
    • Elliptic-curve-based security processor for RFID
    • Y. Lee, K. Sakiyama, and L. Batina, "Elliptic-curve-based security processor for RFID, " IEEE Trans. Comput., vol. 57, no. 11, pp. 1514-1527, 2008.
    • (2008) IEEE Trans. Comput , vol.57 , Issue.11 , pp. 1514-1527
    • Lee, Y.1    Sakiyama, K.2    Batina, L.3
  • 29
    • 84968503742 scopus 로고
    • Elliptic curve cryptosystems
    • N. Koblitz, "Elliptic curve cryptosystems, " Math. Comput., vol. 48, no. 1, pp. 203-209, 1987.
    • (1987) Math. Comput , vol.48 , Issue.1 , pp. 203-209
    • Koblitz, N.1
  • 31
    • 34548353243 scopus 로고    scopus 로고
    • Is elliptic-curve cryptography suitable to secure RFID tags?
    • J. Wolkerstorfer, "Is elliptic-curve cryptography suitable to secure RFID tags?, " in Proc. Workshop RFID Light-Weight Cryptogr., 2005, pp. 11-20.
    • (2005) Proc. Workshop RFID Light-Weight Cryptogr , pp. 11-20
    • Wolkerstorfer, J.1
  • 33
    • 0000537828 scopus 로고
    • Efficient identification and signatures for smart cards
    • C. Schnorr, "Efficient identification and signatures for smart cards, " in Proc. Adv. Cryptol.(CRYPTO'89), 1989, pp. 239-252.
    • (1989) Proc. Adv. Cryptol.(CRYPTO'89 , pp. 239-252
    • Schnorr, C.1
  • 35
    • 0001859260 scopus 로고
    • Provably secure and practical identification schemes and corresponding signature schemes
    • T. Okamoto, "Provably secure and practical identification schemes and corresponding signature schemes, " in Proc. Adv. Cryptol.(CRYPTO'92), 1992, pp. 31-53.
    • (1992) Proc. Adv. Cryptol.(CRYPTO'92 , pp. 31-53
    • Okamoto, T.1
  • 36
    • 49049105964 scopus 로고    scopus 로고
    • EC-RAC (ECDLP based randomized access control): Provably secure RFID authentication protocol
    • Y. Lee, L. Batina, and I. Verbauwhede, "EC-RAC (ECDLP based randomized access control): Provably secure RFID authentication protocol, " in Proc. IEEE Int. Conf. RFID, 2008, pp. 97-104.
    • (2008) Proc IEEE Int. Conf. RFID , pp. 97-104
    • Lee, Y.1    Batina, L.2    Verbauwhede, I.3
  • 38
    • 70349268101 scopus 로고    scopus 로고
    • Untraceable RFID authentication protocols: Revision of EC-RAC
    • Y. Lee, L. Batina, and I. Verbauwhede, "Untraceable RFID authentication protocols: Revision of EC-RAC, " in Proc. IEEE Int. Conf. RFID, 2009, pp. 178-185.
    • (2009) Proc IEEE Int. Conf. RFID , pp. 178-185
    • Lee, Y.1    Batina, L.2    Verbauwhede, I.3
  • 39
    • 77952353685 scopus 로고    scopus 로고
    • Untraceable RFID protocols are not trivially composable: Attacks on the revision of EC-RAC
    • T. Deursen and S. Radomirovic, "Untraceable RFID protocols are not trivially composable: Attacks on the revision of EC-RAC, " Cryptology ePrint Archive, Report, 2009/332, 2009.
    • (2009) Cryptology EPrint Archive, Report , vol.332 , pp. 2009
    • Deursen, T.1    Radomirovic, S.2
  • 40
    • 84962603175 scopus 로고    scopus 로고
    • A combined approach of elliptic curve and zero knowledge based forward secure protocol
    • M. Sandhya and T. Rangaswamy, "A combined approach of elliptic curve and zero knowledge based forward secure protocol, " World Acad. Sci. Eng. Technol., vol. 56, pp. 847-852, 2009.
    • (2009) World Acad. Sci. Eng. Technol , vol.56 , pp. 847-852
    • Sandhya, M.1    Rangaswamy, T.2
  • 41
    • 65249186388 scopus 로고    scopus 로고
    • A secure elliptic curve-based RFID protocol
    • S. Martinez, M. Valls, and C. Roig, "A secure elliptic curve-based RFID protocol, " J. Comput. Sci. Technol., vol. 24, no. 2, pp. 309-318, 2009.
    • (2009) J. Comput. Sci. Technol , vol.24 , Issue.2 , pp. 309-318
    • Martinez, S.1    Valls, M.2    Roig, C.3
  • 42
    • 80051974120 scopus 로고    scopus 로고
    • Vulnerability analysis of elliptic curvebased RFID protocol
    • C. Lv, H. Li, J. Ma, and B. Niu, "Vulnerability analysis of elliptic curvebased RFID protocol, " China Commun., vol. 8, no. 4, pp. 153-158, 2011.
    • (2011) China Commun , vol.8 , Issue.4 , pp. 153-158
    • Lv, C.1    Li, H.2    Ma, J.3    Niu, B.4
  • 46
    • 84872290581 scopus 로고    scopus 로고
    • Vulnerability analysis of elliptic curve cryptography-based RFID authentication protocols
    • C. Lv, H. Li, and J. Ma, "Vulnerability analysis of elliptic curve cryptography-based RFID authentication protocols, " Trans. Emerg. Telecommun. Technol., vol. 23, no. 7, pp. 618-624, 2012.
    • (2012) Trans. Emerg. Telecommun. Technol , vol.23 , Issue.7 , pp. 618-624
    • Lv, C.1    Li, H.2    Ma, J.3
  • 51
    • 82155181956 scopus 로고    scopus 로고
    • Elliptic curve cryptography based authentication protocol for low-cost RFID tags
    • G. Godor and S. Imre, "Elliptic curve cryptography based authentication protocol for low-cost RFID tags, " in Proc. IEEE Int. Conf. RFID-Technol. Appl., 2011, pp. 386-393.
    • (2011) Proc IEEE Int. Conf. RFID-Technol. Appl , pp. 386-393
    • Godor, G.1    Imre, S.2
  • 52
    • 84919496857 scopus 로고    scopus 로고
    • A novel RFID authentication protocol based on elliptic curve cryptosystem
    • Y. Chen, J. Chou, and C. Lin, "A novel RFID authentication protocol based on elliptic curve cryptosystem, " Cryptology ePrint Archive, Report, 2011/381, 2011.
    • (2011) Cryptology EPrint Archive, Report 2011 , vol.381
    • Chen, Y.1    Chou, J.2    Lin, C.3
  • 53
    • 84856094376 scopus 로고    scopus 로고
    • Hierarchical ECC-based RFID authentication protocol
    • L. Batina, S. Seys, and D. Singeee, "Hierarchical ECC-based RFID authentication protocol, " in Proc. RFID Secur. Privacy, 2012, pp. 183-201.
    • (2012) Proc. RFID Secur. Privacy , pp. 183-201
    • Batina, L.1    Seys, S.2    Singeee, D.3
  • 54
    • 84887275465 scopus 로고    scopus 로고
    • A lightweight RFID authentication protocol based on elliptic curve cryptography
    • Y. Liu, X. Qin, and C. Wang, "A lightweight RFID authentication protocol based on elliptic curve cryptography, " J. Comput., vol. 8, no. 11, pp. 2880-2887, 2013.
    • (2013) J. Comput , vol.8 , Issue.11 , pp. 2880-2887
    • Liu, Y.1    Qin, X.2    Wang, C.3
  • 55
    • 84873981263 scopus 로고    scopus 로고
    • Analysis and construction of efficient RFID authentication protocol with backward privacy
    • Berlin, Germany: Springer-Verlag
    • S. Wang, S. Liu, and D. Chen, "Analysis and construction of efficient RFID authentication protocol with backward privacy, " in Advances in Wireless Sensor Networks. Berlin, Germany: Springer-Verlag, 2014, pp. 458-466.
    • (2014) Advances in Wireless Sensor Networks , pp. 458-466
    • Wang, S.1    Liu, S.2    Chen, D.3
  • 56
    • 84879295706 scopus 로고    scopus 로고
    • A secure ECC-based RFID authentication scheme using hybrid protocols
    • Berlin, Germany: Springer-Verlag
    • Y. Liao and C. Hsiao, "A secure ECC-based RFID authentication scheme using hybrid protocols, " in Advances in Intelligent Systems and Applications. Berlin, Germany: Springer-Verlag, 2013, pp. 1-13.
    • (2013) Advances in Intelligent Systems and Applications , pp. 1-13
    • Liao, Y.1    Hsiao, C.2
  • 57
    • 84899644274 scopus 로고    scopus 로고
    • A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol
    • Y. Liao and C. Hsiao, "A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol, " Ad Hoc Netw., vol. 18, pp. 133-146, 2014.
    • (2014) Ad Hoc Netw , vol.18 , pp. 133-146
    • Liao, Y.1    Hsiao, C.2
  • 58
    • 84907591223 scopus 로고    scopus 로고
    • An efficient mutual authentication RFID scheme based on elliptic curve cryptography
    • J. Chou, "An efficient mutual authentication RFID scheme based on elliptic curve cryptography, " J. Supercomput., vol. 70, no. 1, pp. 75-94, 2014.
    • (2014) J. Supercomput , vol.70 , Issue.1 , pp. 75-94
    • Chou, J.1
  • 59
    • 84901582234 scopus 로고    scopus 로고
    • A secure RFID authentication protocol for healthcare environments using elliptic curve cryptosystem
    • Z. Zhao, "A secure RFID authentication protocol for healthcare environments using elliptic curve cryptosystem, " J. Med. Syst., vol. 38, no. 5, 2014, doi: 10.1007/s10916-014-0046-9.
    • (2014) J. Med. Syst , vol.38 , Issue.5
    • Zhao, Z.1
  • 60
    • 84898915190 scopus 로고    scopus 로고
    • An efficient RFID authentication protocol to enhance patient medication safety using elliptic curve cryptography
    • Z. Zhang and Q. Qi, "An efficient RFID authentication protocol to enhance patient medication safety using elliptic curve cryptography, " J. Med. Syst., vol. 38, no. 5, 2014, doi: 10.1007/s10916-014-0047-8.
    • (2014) J. Med. Syst , vol.38 , Issue.5
    • Zhang, Z.1    Qi, Q.2
  • 61
    • 84919877584 scopus 로고    scopus 로고
    • Cryptanalysis and improvement of an efficient mutual authentication RFID scheme based on elliptic curve cryptography
    • M. Farash, "Cryptanalysis and improvement of an efficient mutual authentication RFID scheme based on elliptic curve cryptography, " J. Supercomput., 2014, doi: 10.1007/s11227-014-1272-0.
    • (2014) J. Supercomput
    • Farash, M.1
  • 62
    • 33846260842 scopus 로고    scopus 로고
    • High-speed hardware implementations of elliptic curve cryptography: A survey
    • G. Dormale and J. Quisquater, "High-speed hardware implementations of elliptic curve cryptography: A survey, " J. Syst. Archit., vol. 53, no. 2, pp. 72-84, 2007.
    • (2007) J. Syst. Archit , vol.53 , Issue.2 , pp. 72-84
    • Dormale, G.1    Quisquater, J.2
  • 63
    • 37149018890 scopus 로고    scopus 로고
    • A survey of lightweightcryptography implementations
    • T. Eisenbarth, S. Kumar, and C. Paar, "A survey of lightweightcryptography implementations, " IEEE Des. Test Comput., vol. 24, no. 6, pp. 522-533, 2007.
    • (2007) IEEE Des. Test Comput , vol.24 , Issue.6 , pp. 522-533
    • Eisenbarth, T.1    Kumar, S.2    Paar, C.3
  • 64
    • 80052326400 scopus 로고    scopus 로고
    • Elliptic curve cryptography: Survey and its security applications
    • S. Kalra and S. Sood, "Elliptic curve cryptography: Survey and its security applications, " in Proc. Int. Conf. Adv. Comput. Artif. Intell., 2011, pp. 102-106.
    • (2011) Proc. Int. Conf. Adv. Comput. Artif. Intell , pp. 102-106
    • Kalra, S.1    Sood, S.2
  • 65
    • 52449127948 scopus 로고    scopus 로고
    • Enabling next-generation RFID applications: Solutions and challenges
    • Sep
    • Q. Sheng, X. Li, and S. Zeadally, "Enabling next-generation RFID applications: Solutions and challenges, " IEEE Comput., vol. 41, no. 9, pp. 21-28, Sep. 2008.
    • (2008) IEEE Comput , vol.41 , Issue.9 , pp. 21-28
    • Sheng, Q.1    Li, X.2    Zeadally, S.3
  • 66
    • 84906756164 scopus 로고    scopus 로고
    • CPAL: A conditional privacy-preserving authentication with access linkability for roaming service
    • Feb
    • C. Lai et al., "CPAL: A conditional privacy-preserving authentication with access linkability for roaming service, " IEEE Internet Things J., vol. 1, no. 1, pp. 46-57, Feb. 2014.
    • (2014) IEEE Internet Things J , vol.1 , Issue.1 , pp. 46-57
    • Lai, C.1
  • 67
    • 84906261221 scopus 로고    scopus 로고
    • RFID technology for IoT-based personal healthcare in smart spaces
    • Apr
    • S. Amendola, R. Lodato, S. Manzari, C. Occhiuzzi, and G. Marrocco, "RFID technology for IoT-based personal healthcare in smart spaces, " IEEE Internet Things J., vol. 1, no. 2, pp. 144-152, Apr. 2014.
    • (2014) IEEE Internet Things J , vol.1 , Issue.2 , pp. 144-152
    • Amendola, S.1    Lodato, R.2    Manzari, S.3    Occhiuzzi, C.4    Marrocco, G.5
  • 68
    • 84894255457 scopus 로고    scopus 로고
    • An enhanced access control scheme in wireless sensor networks
    • S. Chatterjee, A. K. Das, and J. K. Sing, "An enhanced access control scheme in wireless sensor networks, " Ad Hoc Sens. Wireless Netw., vol. 21, no. 1-2, pp. 121-149, 2014.
    • (2014) Ad Hoc Sens. Wireless Netw , vol.21 , Issue.1-2 , pp. 121-149
    • Chatterjee, S.1    Das, A.K.2    Sing, J.K.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.