Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

A Secure RFID Mutual Authentication Protocol for Healthcare Environments Using Elliptic Curve Cryptography

  • Systems-Level Quality Improvement
  • Published:
Journal of Medical Systems Aims and scope Submit manuscript

Abstract

Radio Frequency Identification(RFID) is an automatic identification technology, which can be widely used in healthcare environments to locate and track staff, equipment and patients. However, potential security and privacy problems in RFID system remain a challenge. In this paper, we design a mutual authentication protocol for RFID based on elliptic curve cryptography(ECC). We use pre-computing method within tag’s communication, so that our protocol can get better efficiency. In terms of security, our protocol can achieve confidentiality, unforgeability, mutual authentication, tag’s anonymity, availability and forward security. Our protocol also can overcome the weakness in the existing protocols. Therefore, our protocol is suitable for healthcare environments.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  1. Wang, S. W., Chen, W. H., Ong, C. S., Liu, L., and Chuang, Y. W., RFID application in hospitals: a case study on a demonstration RFID project in a Taiwan hospital. In: Hawaii International Conference on System Sciences. IEEE. pp. 184–194, 2006

  2. Najera, P., Lopez, J., and Roman, R., Real-time location and inpatient care systems based on passive RFID. J. Netw. Comput. Appl. 34(3):980–989, 2011

  3. Hung, Y. K., The study of adopting RFID technology in medical institute with the perspectives of cost benefit. International Medical Informatics Symposium in Taiwan, Taiwan, 2007

  4. Katz, J. E., and Rice, R. E., Public views of mobile medical devices and services: A US national survey of consumer sentiments towards RFID healthcare technology. Int. J. Med. Inform. 78(2):104–114, 2009

  5. Leu, J. G., The benefit analysis of RFID use in the health management center the experience in Shin Kong Wu Ho-Su Memorial Hospital: National Taiwan University, 2010

  6. Yu, C., Chen, C., Liao, P., and Lee, Y., RFID-based operation room and medicare system for patient safety enhancement-a case study of keelung branch. J. Inf. Manag. 15:97–122, 2008

  7. Huang, H. H., and Ku, C. Y., A rfid grouping proof protocol for medication safety of inpatient. J. Med. Syst. 33(6): 467–474, 2009

  8. Chien, H. Y., Yang, C. C., Wu, T. C., and Lee, C. F., Two rfid based solutions to enhance inpatient medication safety. J. Med. Syst. 35(3):369–375, 2011

  9. Peris-Lopez, P., Orfila, A., Mitrokotsa, A., and van der Lubbe, J. C., A comprehensive rfid solution to enhance inpatient medication safety. Int. J. Med. Inform. 80(1): 13–24, 2011

  10. Yen, Y. C., Lo, N. W., and Wu, T.. C., Two rfid-based solutions for secure inpatient medication administration. J. Med. Syst. 36(5):2769–2778, 2012

  11. Chen, Y. Y., Wang, Y. J., and Jan, J. K., A secure 2G-RFID-Sys mechanism for applying to the medical emergency system. J. Med. Syst. 37(3):1–10, 2013

  12. Safkhani, M., Bagheri, N., and Naderi, M., On the designing of a tamper resistant prescription rfid access control system. J. Med. Syst. 36(6):3995–4004, 2012

  13. Wu, Z. Y., Chen, L., and Wu, J. C., A reliable rfid mutual authentication scheme for healthcare environments. J. Med. Syst. 37:1–9, 2013

  14. Picazo-Sanchez, P., Bagheri, N., and Peris-Lopez, P., Two RFID Standard-based Security Protocols for Healthcare Environments. J. Med. Syst. 37:9962, 2013

  15. Tuyls, P., and Batina, L., RFID-tags for Anti-Counterfeiting. In: Topics in cryptology-CT-RSA 2006. pp. 115–131, 2006

  16. Batina, L., Guajardo, J., Kerins, T., Mentens, N., Tuyls, P., and Verbauwhede, I., Public-key cryptography for RFID-tags. Fifth annual IEEE international conference on PerCom workshops’ 07. IEEE. pp. 217–222, 2007

  17. Lee, Y., Batina, L., and Verbauwhede, I., EC-RAC (ECDLP based randomized access control): provably secure RFID authentication protocol. In: 2008 I.E. international conference on RFID. IEEE. pp. 97–104, 2008

  18. Liao, Y., and Hsiao, C., A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol. Ad Hoc Networks. doi:10.1016/j.adhoc.2013.02.004, 2013

  19. Zhao, Z. G., A Secure RFID Authentication Protocol for Healthcare Environments Using Elliptic Curve Cryptosystem. J. Med. Syst. 38(5):1–7, 2014

  20. Chou, J.-S., A secure RFID authentication protocol to enhance patient medication safety using elliptic curve cryptography. J. Supercomput. 2014. doi:10.1007/s11227-013-1073-x

  21. Zhang, Z. Z., and Qi, Q. Q., An Efficient RFID Authentication Protocol to Enhance Patient Medication Safety Using Elliptic Curve Cryptography. J. Med. Syst. 38(5):1–7, 2014

  22. William S., and Stallings W., Cryptography and Network Security, 4/E[M]. Pearson Education India, 2006

  23. Jonsson, J., and Kaliski, B., Public-key cryptography standards (PKCS)# 1: RSA cryptography specifications version 2.1[J]. 2003

  24. Bringer, J., Chabanne, H., and Icart, T., Cryptanalysis of EC-RAC, a RFID identification protocol. In:International Conference on Cryptology and Network Security–CANS’08, Lecture Notes in Computer Science: Springer–Verlag, 2008

  25. He D., Kumar N., and Khan M. K., Robustanonymous authentication protocol for healthcare applications using wirelessmedical sensor networks. Multimedia Systems. doi:10.1007/s00530-013-0346-9, 2014

  26. He D., and Zeadally S., Authentication protocol for ambient assisted living system. IEEE Commun. Mag. 53(1):2–10, 2015

  27. Han, W., and Zhu, Z., An ID-based mutual authentication with key agreement protocol for multiserver environment on elliptic curve cryptosystem. Int. J. Commun. Syst. 2012. doi:10.1002/dac.2405

  28. He, D., Chen, Y., and Chen, J., Cryptanalysis and improvement of an extended chaotic maps–based key agreement protocol. Nonlinear Dyn. 69(3):1149–1157, 2012

  29. He, D., Kumar, N., Khan, M. K., and Lee, J.-H., Anonymous twofactor authentication for consumer roaming service in Global Mobility Networks. IEEE Trans. Consum. Electron. 59(4):811–817, 2013

  30. Hao, X., Wang, J., Yang, Q., Yan, X., and Li, P., A chaotic map-based authentication scheme for telecare medicine information systems. doi:10.1007/s10916-012-9919-y, 2013

  31. He, D., and Wang D., Robust biometrics-based authenticationscheme for multi-server environment. IEEE Syst. J. doi:10.1109/JSYST.2014.2301517, 2014

  32. He, D., Zhang. Y., and Chen J., Cryptanalysis and improvementof an anonymous authentication protocol for wireless access networks. Wirel. Pers. Commun. 74(2):229–243, 2014

  33. Zhao Z., A Secure RFID Authentication Protocol for Healthcare Environments Using Elliptic Curve Cryptosystem. J. Med. Syst. 38(2):13, 2014

  34. He D., Kumar N., Chilamkurti N. and Lee J.-H., Lightweight ECC based RFID authentication integrated with an ID verifier transfer protocol. J. Med. Syst. 38(10):1–6, 2014

Download references

Acknowledgments

This work is supported by the National Natural Science Foundation of China (Grant Nos.61272525 and 61370203)and Science and Technology on Communication Security Laboratory Foundation (NO.9140C110301110C1103).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chunhua Jin.

Additional information

This article is part of the Topical on Collection on Systems-Level Quality Improvement

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Jin, C., Xu, C., Zhang, X. et al. A Secure RFID Mutual Authentication Protocol for Healthcare Environments Using Elliptic Curve Cryptography. J Med Syst 39, 24 (2015). https://doi.org/10.1007/s10916-015-0213-7

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s10916-015-0213-7

Keywords