Abstract
Radio Frequency Identification(RFID) is an automatic identification technology, which can be widely used in healthcare environments to locate and track staff, equipment and patients. However, potential security and privacy problems in RFID system remain a challenge. In this paper, we design a mutual authentication protocol for RFID based on elliptic curve cryptography(ECC). We use pre-computing method within tag’s communication, so that our protocol can get better efficiency. In terms of security, our protocol can achieve confidentiality, unforgeability, mutual authentication, tag’s anonymity, availability and forward security. Our protocol also can overcome the weakness in the existing protocols. Therefore, our protocol is suitable for healthcare environments.
Similar content being viewed by others
References
Wang, S. W., Chen, W. H., Ong, C. S., Liu, L., and Chuang, Y. W., RFID application in hospitals: a case study on a demonstration RFID project in a Taiwan hospital. In: Hawaii International Conference on System Sciences. IEEE. pp. 184–194, 2006
Najera, P., Lopez, J., and Roman, R., Real-time location and inpatient care systems based on passive RFID. J. Netw. Comput. Appl. 34(3):980–989, 2011
Hung, Y. K., The study of adopting RFID technology in medical institute with the perspectives of cost benefit. International Medical Informatics Symposium in Taiwan, Taiwan, 2007
Katz, J. E., and Rice, R. E., Public views of mobile medical devices and services: A US national survey of consumer sentiments towards RFID healthcare technology. Int. J. Med. Inform. 78(2):104–114, 2009
Leu, J. G., The benefit analysis of RFID use in the health management center the experience in Shin Kong Wu Ho-Su Memorial Hospital: National Taiwan University, 2010
Yu, C., Chen, C., Liao, P., and Lee, Y., RFID-based operation room and medicare system for patient safety enhancement-a case study of keelung branch. J. Inf. Manag. 15:97–122, 2008
Huang, H. H., and Ku, C. Y., A rfid grouping proof protocol for medication safety of inpatient. J. Med. Syst. 33(6): 467–474, 2009
Chien, H. Y., Yang, C. C., Wu, T. C., and Lee, C. F., Two rfid based solutions to enhance inpatient medication safety. J. Med. Syst. 35(3):369–375, 2011
Peris-Lopez, P., Orfila, A., Mitrokotsa, A., and van der Lubbe, J. C., A comprehensive rfid solution to enhance inpatient medication safety. Int. J. Med. Inform. 80(1): 13–24, 2011
Yen, Y. C., Lo, N. W., and Wu, T.. C., Two rfid-based solutions for secure inpatient medication administration. J. Med. Syst. 36(5):2769–2778, 2012
Chen, Y. Y., Wang, Y. J., and Jan, J. K., A secure 2G-RFID-Sys mechanism for applying to the medical emergency system. J. Med. Syst. 37(3):1–10, 2013
Safkhani, M., Bagheri, N., and Naderi, M., On the designing of a tamper resistant prescription rfid access control system. J. Med. Syst. 36(6):3995–4004, 2012
Wu, Z. Y., Chen, L., and Wu, J. C., A reliable rfid mutual authentication scheme for healthcare environments. J. Med. Syst. 37:1–9, 2013
Picazo-Sanchez, P., Bagheri, N., and Peris-Lopez, P., Two RFID Standard-based Security Protocols for Healthcare Environments. J. Med. Syst. 37:9962, 2013
Tuyls, P., and Batina, L., RFID-tags for Anti-Counterfeiting. In: Topics in cryptology-CT-RSA 2006. pp. 115–131, 2006
Batina, L., Guajardo, J., Kerins, T., Mentens, N., Tuyls, P., and Verbauwhede, I., Public-key cryptography for RFID-tags. Fifth annual IEEE international conference on PerCom workshops’ 07. IEEE. pp. 217–222, 2007
Lee, Y., Batina, L., and Verbauwhede, I., EC-RAC (ECDLP based randomized access control): provably secure RFID authentication protocol. In: 2008 I.E. international conference on RFID. IEEE. pp. 97–104, 2008
Liao, Y., and Hsiao, C., A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol. Ad Hoc Networks. doi:10.1016/j.adhoc.2013.02.004, 2013
Zhao, Z. G., A Secure RFID Authentication Protocol for Healthcare Environments Using Elliptic Curve Cryptosystem. J. Med. Syst. 38(5):1–7, 2014
Chou, J.-S., A secure RFID authentication protocol to enhance patient medication safety using elliptic curve cryptography. J. Supercomput. 2014. doi:10.1007/s11227-013-1073-x
Zhang, Z. Z., and Qi, Q. Q., An Efficient RFID Authentication Protocol to Enhance Patient Medication Safety Using Elliptic Curve Cryptography. J. Med. Syst. 38(5):1–7, 2014
William S., and Stallings W., Cryptography and Network Security, 4/E[M]. Pearson Education India, 2006
Jonsson, J., and Kaliski, B., Public-key cryptography standards (PKCS)# 1: RSA cryptography specifications version 2.1[J]. 2003
Bringer, J., Chabanne, H., and Icart, T., Cryptanalysis of EC-RAC, a RFID identification protocol. In:International Conference on Cryptology and Network Security–CANS’08, Lecture Notes in Computer Science: Springer–Verlag, 2008
He D., Kumar N., and Khan M. K., Robustanonymous authentication protocol for healthcare applications using wirelessmedical sensor networks. Multimedia Systems. doi:10.1007/s00530-013-0346-9, 2014
He D., and Zeadally S., Authentication protocol for ambient assisted living system. IEEE Commun. Mag. 53(1):2–10, 2015
Han, W., and Zhu, Z., An ID-based mutual authentication with key agreement protocol for multiserver environment on elliptic curve cryptosystem. Int. J. Commun. Syst. 2012. doi:10.1002/dac.2405
He, D., Chen, Y., and Chen, J., Cryptanalysis and improvement of an extended chaotic maps–based key agreement protocol. Nonlinear Dyn. 69(3):1149–1157, 2012
He, D., Kumar, N., Khan, M. K., and Lee, J.-H., Anonymous twofactor authentication for consumer roaming service in Global Mobility Networks. IEEE Trans. Consum. Electron. 59(4):811–817, 2013
Hao, X., Wang, J., Yang, Q., Yan, X., and Li, P., A chaotic map-based authentication scheme for telecare medicine information systems. doi:10.1007/s10916-012-9919-y, 2013
He, D., and Wang D., Robust biometrics-based authenticationscheme for multi-server environment. IEEE Syst. J. doi:10.1109/JSYST.2014.2301517, 2014
He, D., Zhang. Y., and Chen J., Cryptanalysis and improvementof an anonymous authentication protocol for wireless access networks. Wirel. Pers. Commun. 74(2):229–243, 2014
Zhao Z., A Secure RFID Authentication Protocol for Healthcare Environments Using Elliptic Curve Cryptosystem. J. Med. Syst. 38(2):13, 2014
He D., Kumar N., Chilamkurti N. and Lee J.-H., Lightweight ECC based RFID authentication integrated with an ID verifier transfer protocol. J. Med. Syst. 38(10):1–6, 2014
Acknowledgments
This work is supported by the National Natural Science Foundation of China (Grant Nos.61272525 and 61370203)and Science and Technology on Communication Security Laboratory Foundation (NO.9140C110301110C1103).
Author information
Authors and Affiliations
Corresponding author
Additional information
This article is part of the Topical on Collection on Systems-Level Quality Improvement
Rights and permissions
About this article
Cite this article
Jin, C., Xu, C., Zhang, X. et al. A Secure RFID Mutual Authentication Protocol for Healthcare Environments Using Elliptic Curve Cryptography. J Med Syst 39, 24 (2015). https://doi.org/10.1007/s10916-015-0213-7
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s10916-015-0213-7