Title :
An Analysis of RFID Authentication Schemes for Internet of Things in Healthcare Environment Using Elliptic Curve Cryptography
Author :
Debiao He ; Zeadally, Sherali
Author_Institution :
Sch. of Math. & Stat., Wuhan Univ., Wuhan, China
Abstract :
Advances in information and communication technologies have led to the emergence of Internet of Things (IoT). In the healthcare environment, the use of IoT technologies brings convenience to physicians and patients as they can be applied to various medical areas (such as constant real-time monitoring, patient information management, medical emergency management, blood information management, and health management). The radio-frequency identification (RFID) technology is one of the core technologies of IoT deployments in the healthcare environment. To satisfy the various security requirements of RFID technology in IoT, many RFID authentication schemes have been proposed in the past decade. Recently, elliptic curve cryptography (ECC)-based RFID authentication schemes have attracted a lot of attention and have been used in the healthcare environment. In this paper, we discuss the security requirements of RFID authentication schemes, and in particular, we present a review of ECC-based RFID authentication schemes in terms of performance and security. Although most of them cannot satisfy all security requirements and have satisfactory performance, we found that there are three recently proposed ECC-based authentication schemes suitable for the healthcare environment in terms of their performance and security.
Keywords :
Internet of Things; health care; public key cryptography; radiofrequency identification; ECC-based RFID authentication schemes; Internet of Things; IoT technologies; elliptic curve cryptography; healthcare environment; radio-frequency identification technology; security requirements; Authentication; Biomedical monitoring; Computer security; Cryptography; Elliptic curve cryptography; Intelligent; Internet of Things; Medical devices; Medical services; Radiofrequency identification; Authentication; Elliptic curve cryptography; Internet of Things; Internet of Things (IoT); Performance; Radio Frequency indentification; Security; elliptic curve cryptography (ECC); performance; radio-frequency identification (RFID); security;
Journal_Title :
Internet of Things Journal, IEEE
DOI :
10.1109/JIOT.2014.2360121