You are currently viewing a new version of our website. To view the old version click .
Sensors
  • Article
  • Open Access

12 June 2023

Enhancing Security and Privacy in Healthcare Systems Using a Lightweight RFID Protocol

,
,
,
and
1
Department of Computer Science, Air University, Islamabad 44000, Pakistan
2
Faculty of Computer Science, National University of Computer and Emerging Sciences (NUCES-FAST), Islamabad 44000, Pakistan
3
Center for Cybersecurity, Brunno Kessler Foundation, 38123 Trento, Italy
4
Department of Computer Science, Iqra National University, Swat 19200, Pakistan
This article belongs to the Special Issue Security in IoT Environments

Abstract

Exploiting Radio Frequency Identification (RFID) technology in healthcare systems has become a common practice, as it ensures better patient care and safety. However, these systems are prone to security vulnerabilities that can jeopardize patient privacy and the secure management of patient credentials. This paper aims to advance state-of-the-art approaches by developing more secure and private RFID-based healthcare systems. More specifically, we propose a lightweight RFID protocol that safeguards patients’ privacy in the Internet of Healthcare Things (IoHT) domain by utilizing pseudonyms instead of real IDs, thereby ensuring secure communication between tags and readers. The proposed protocol has undergone rigorous testing and has been proven to be secure against various security attacks. This article provides a comprehensive overview of how RFID technology is used in healthcare systems and benchmarks the challenges faced by these systems. Then, it reviews the existing RFID authentication protocols proposed for IoT-based healthcare systems in terms of their strengths, challenges, and limitations. To overcome the limitations of existing approaches, we proposed a protocol that addresses the anonymity and traceability issues in existing schemes. Furthermore, we demonstrated that our proposed protocol had a lower computational cost than existing protocols and ensured better security. Finally, our proposed lightweight RFID protocol ensured strong security against known attacks and protected patient privacy using pseudonyms instead of real IDs.

1. Introduction

The Internet of Things (IoT) is a rapidly growing communication paradigm in various fields, including healthcare [1,2,3,4,5]. It involves connecting different physical objects through the internet, thereby allowing automated events and activities to occur. Integrating physical infrastructure with information technology has led to several IoT domains, including healthcare, which has revolutionized the healthcare industry by providing the real-time monitoring of patients and medical equipment [2,6,7].
Despite the numerous advantages of the IoT in the healthcare industry, security and privacy concerns are associated with it. Sensitive personal information is often transferred over an unreliable communication network, leaving it vulnerable to attacks. Moreover, RFID platforms offer a promising solution, but security and privacy concerns remain top priorities. In particular, an attacker could capture, alter, or manipulate patient data, thereby potentially harming patients and medical devices. These concerns are amplified when patients receive IoT facilities over a shared network, thus resulting in more data protection, authenticity, and accessibility-related issues. Therefore, there is a need for a trustworthy and secure RFID authentication system for the IoT health industry to address these concerns.
Radio-Frequency Identification (RFID) systems have gained widespread attention in the healthcare industry for over a decade, wherein they allow for the easy tracking of patients, hospital supplies, medicine, and medical equipment. The architecture of an RFID system (as shown in Figure 1) comprises three main components: reader, back-end server, and tag. The reader gathers data from the tag and updates or verifies it via the back-end server. The tag contains hardware for processing information, an antenna for sending and receiving signals from the reader, and a microchip that stores sensitive data, such as passwords and authentication protocols. The server is considered an authentic entity that stores all the identities of tags and other important information, which helps to establish the reader and tag’s mutual authentication. RFID sensors, connected via an armband, can store patient information, which a doctor can quickly retrieve using a reader. However, the tracking capabilities of RFID systems raise security and privacy concerns. To address these concerns, authentication is a core security measure for recognizing tags, as the reader must know which tag to track [6,8,9].
Figure 1. Architecture of an RFID System.
The main contribution of this work is the proposal of a new lightweight authentication approach for RFID-based systems in the IoT-based healthcare domain. While previous research [10,11,12,13,14] has tried to develop secure and resilient RFID authentication schemes, vulnerabilities still exist. Therefore, this paper addresses these limitations by introducing an improved authentication scheme that offers enhanced protection compared to existing approaches.
Performance evaluation was conducted to assess the efficiency and effectiveness of the proposed protocol compared to state-of-the-art approaches. The evaluation included a computational cost comparison, which measured the computational resources required by the protocol. By benchmarking against existing protocols, the performance evaluation demonstrated the superiority of the proposed protocol in terms of computational efficiency.
For the security analysis, formal verification techniques were employed to ensure the robustness of the proposed protocol against potential security threats. Specifically, the protocol underwent scrutiny using ProVerif, which is a widely recognized formal verification tool for security protocol analysis. Queries were formulated to assess various security properties, such as resistance against event injection and protection against attackers. The responses from ProVerif validated that the proposed protocol satisfied the specified security requirements and could withstand potential security attacks.
In addition to the formal verification technique using ProVerif, this study employed BAN logic for conducting a comprehensive security analysis of the proposed lightweight RFID protocol. BAN logic is a formal modelling and analysis technique designed for security protocols. It enables the specification of security properties and the verification of protocol behaviour against those properties. The proposed protocol was thoroughly examined by leveraging BAN logic to assess its security properties and ensure its resistance against potential attacks. The analysis considered various security aspects, such as tag anonymity, replay attack resistance, synchronization attack resistance, forward secrecy, mutual authentication, anti-DoS attacks, impersonation attacks, insider attacks, and other relevant security concerns.
Similarly, the informal security analysis compared the proposed scheme with existing protocols, thereby revealing its superiority in meeting all the listed security criteria. The proposed scheme outperformed other protocols, thus demonstrating its effectiveness in ensuring tag anonymity, protection against attacks, mutual authentication, and more.
The rigorous security analysis and comprehensive performance evaluation ensured that the proposed lightweight RFID protocol provided enhanced security and privacy, as well as offered efficient and effective performance. This holistic approach guaranteed the protocol’s suitability for deployment in real-world healthcare systems, where security and performance are critical factors.
In summary, this paper aims to enhance the security and privacy of healthcare systems by proposing a lightweight RFID protocol. The proposed protocol addresses existing schemes’ anonymity and traceability issues by utilizing pseudonyms instead of real IDs and ensuring secure communication between tags and readers. The protocol has undergone rigorous testing and has been proven to be secure against various security attacks. Furthermore, the paper provides an overview of how RFID technology is used in healthcare systems and highlights the challenges faced by these systems. It reviews existing RFID authentication protocols proposed for IoT-based healthcare systems, wherein it discusses their strengths, challenges, and limitations. To overcome the limitations of existing approaches, the proposed protocol was introduced, which provided better security and had a lower computational cost than existing protocols. It ensured security against known attacks and protected patient privacy by utilizing pseudonyms. By introducing this novel lightweight RFID protocol and conducting a thorough evaluation using formal verification techniques, this study contributes to the advancement of secure RFID protocols for IoT-based healthcare systems. The proposed protocol aims to address the security and privacy concerns associated with RFID-based healthcare systems, thereby ultimately ensuring better patient care and safety.

3. Proposed Lightweight RFID Protocol

The proposed scheme is shown in Figure 2, and the steps are explained below. The notations are shown in Table 1.
Figure 2. Proposed lightweight authentication scheme.
Table 1. Notations used in formal representation of proposed authentication scheme.
Step 1: 
The scheme involves the reader and tag exchanging random numbers. The R R is a random number generated by a reader, and it is encrypted with a preshared key K S R between the reader and tag. The resulting value N R = R R K S R is stored by the reader in M 1 , which is a message sent through a public channel to the tag.
Step 2: 
The tag decrypts the random number by computing R R = N R K R T , where K R T is a preshared key among the tag and reader. The tag generates its random number R T and sets a mark value of 00, thus indicating the start of the session. The tag then encrypts its random number with K R T and stores the result in N R as N R = R T K R T . The tag also calculates C r o ( R I D T I D , K ) and stores it in M 2 , which is sent to the reader through a public channel.
Step 3: 
The reader decrypts the tag’s random number by computing R T = N T K R T , where N T is the value received in M 2 . The reader then encrypts the tag’s nonce and the reader’s nonce using a preshared key K S R between the server and reader. This results in N R = R R K S R and N T = R T K S R (the double primes indicate the second encryption). The reader then calculates C r o ( R I D T I D , K ) and stores it along with N T and N R in M 3 , which is sent directly to the server.
Step 4: 
The server attains the random numbers of the reader and tag by decrypting them with K S R as R R = N R K S R and R T = N T K S R , respectively. The server searches the ID table I D T for the index corresponding to the value received in M 3 , which is C r o ( T I D R I D , K ) . The protocol stops if the index value does not match an index in I D T . If the index value matches an index in I D T , a R S random number is produced by the server, which then encrypts it with K S R and stores the result in N S = R S K S R . The server then calculates C r o ( R I D T I D , N S k ) , R o t ( K T I D , R I D k ) , and k N S and stores all three values in M 4 , which is sent to the reader through a public channel.
Step 5: 
The reader checks the T I D and obtains R S as follows. First, it computes the hamming weight of K T I D , which is denoted by W ( T I D K ) . Then, it computes K K T I D . Using these values, it obtains T I D and R S as T I D = C r o ( T I D R I D , K N S ) and R S = N S K S T K K , respectively. The reader then compares the received value C r o ( T I D R I D , K N S ) with the calculated value to verify. If they match, it stores T I D R R and N S = R S K R T in M 5 and forwards M 5 to the tag through a public channel.
Step 6: 
The tag first obtains a random number R S = N S K K R T . Then, it performs an XOR operation between the T I D and the previously received R R , which is denoted as T I D R R . Next, it checks if T I D = T I D R R R R . After that, it updates the session number K by acquiring three random numbers: R S , R R , and R T . Specifically, K is replaced with K n e w , where K n e w = C r o ( N R N R N T , K ) . Remember that K is the default value mutually exchanged by the reader, tag, and server in the first session. Before initiating the next phase, the tag stores C r o ( T I D , K n e w R I D ) in M 6 and is shared with the reader.
Step 7: 
The K in the server and reader is updated. Since some of the parameters are already calculated and present in the reader and server, such as R I D , T I D , R S , R R , R T , and K, they take advantage of this fact and execute C r o ( R I D T I D , C r o ( R S R R R T , K ) ) to obtain K n e w . They then compare it with the K n e w received from the tag, which is denoted as M7= C r o ( R I D T I D , K n e w ) . If they match, the reader updates K n e w = C r o ( R S R R R T , K ) . After this step, some verification operations are performed for the consistency of K n e w in the tag, reader, and server. Finally, the reader shares M7 with the server.
Step 8: 
The server calculates C r o ( R I D T I D ) , and C r o ( R R R S R T , K ) and checks them with C r o ( R I D T I D , K n e w ) ; after that, it updates K n e w = C r o ( R R R S R T , K ) and stores K n e w R T R R in M8. The server sends M8 to the reader via an insecure channel.
Step 9: 
The reader verifies the consistency of K n e w and calculates X O R s K n e w , R T , and N R ; it then stores them in M 9 as M 9 = K n e w R T N R . The reader also sends them to the tag, but it stores them within M 9 before sending them to the tag. Thus, M 9 is sent to the tag through a public channel.
Step 10: 
In addition, both the reader and tag perform the same operations to confirm K n e w by obtaining it with the help of the operation ( K n e w R T R R ) R T R R , and they validate it against the previous value K n e w that was calculated before. If the verification process does not encounter any problems and is smooth, the M a r k value is set to 01, thereby indicating that the synchronization regarding K is completed.
Step 11: 
The reader receives a notification from the tag to update the record. The reader stores mark value XOR with R s in M11; it then forwards M a r k to the server, which means the value is 01 at the server side. A new record { C r o ( R I D T I D , K n e w ) , R o t ( K n e w T I D , K n e w R I D ) } is produced and added to the index table IDT. The tag then sets the M a r k value to 10 after receiving a notification that the data has finished updating. The proposed authentication protocol is completed.

4. Computation Cost Comparison

This section analyzes the protocols’ computational costs and highlights the proposed scheme’s advantages. Table 2 allows us to assess the efficiency of the proposed scheme in relation to existing protocols.
Table 2. Computation cost comparison (∧ represents exponentiation, ⊕ indicates the XOR operation, “ | | ” is the cascading operation, “Hash” is the hash operation, and “Cro” is the cross operation defined previously. Similarly, PRNG stands for pseudo-random number generator, while “Rot” indicates the displacement operation, and the cost of operations such as ⊕ and “Rot” are relatively lower).
The Kaul et al. [15] RFID scheme has three phases, i.e., initialization, authentication, and updating. These phases perform a PRNG operation for pseudonyms, along with one-way hash functions and bitwise XOR (⊕) operations.
The Chien Protocol [10] employs operations such as XOR (⊕), power exponentiation (∧), cascading operation ( | | ), and displacement operation (Rot). These operations are computationally expensive, especially exponentiation and cascading. The high computational cost of these operations may impact the protocol’s performance, thereby making it less efficient in resource-constrained environments.
The Gossamer Protocol [11] also utilizes XOR (⊕), power exponentiation (∧), and displacement operation (Rot). However, it performs a double displacement operation (Rot 2 ), thereby increasing computational complexity. As a result, the Gossamer Protocol may be more resource-intensive than other schemes.
The Xie Protocol [13] focuses on lightweight operations such as XOR (⊕), cascading operation ( | | ), and hash operation. While these operations have a relatively lower computational cost, the absence of power exponentiation in the protocol limits its overall security and efficiency.
The Sarah Protocol [12] employs a combination of XOR (⊕), power exponentiation (∧), cascading operation ( | | ), and hash operation. Although it offers a comprehensive set of operations, the protocol incurs a higher computational cost due to the involvement of power exponentiation and cascading.
The Fan Protocol [14] utilizes XOR (⊕), cascading operation ( | | ), cross operation (Cro), and displacement operation (Rot). Including cross and displacement operations increases the computational complexity of the protocol. These operations may pose a challenge regarding computational efficiency, especially in resource-constrained environments.
In contrast, the proposed scheme focuses on lightweight operations, primarily XOR (⊕) and a cross operation (Cro). These operations have a lower computational cost than exponentiation, cascading, and displacement operations. By reducing the complexity of operations, the proposed scheme achieves better computational efficiency while maintaining an acceptable level of security. This makes it well-suited for IoT-based healthcare systems, which are often operating in resource-constrained environments.
Overall, the proposed scheme demonstrates a notable advantage in terms of computation cost compared to existing protocols. By utilizing lightweight operations, it minimizes the computational burden without compromising the security requirements. The reduced computational cost translates into improved efficiency, thereby making the proposed scheme a promising choice for secure RFID authentication in healthcare IoT systems.

5. Security Analysis

Formal security analysis of the designed scheme was conducted (using ProVerif) and examined informally (BAN logic).

5.1. Automated ProVerif Security Proof

ProVerif is a software tool that automates and aids in testing essential security aspects such as authentication, accessibility, and anonymity. Three entities are defined in the proposed lightweight scheme—server, tag, and reader—so we need to define four queries—three for each entity and the last for an attacker—to indicate that the secret key is secure and the attacker will not be intercepted.
The description of each query is as follows.
  • Query 1 tests the event injection for the server. It checks if the ProVerif response confirms that the connection on the server is successfully opened and closed. The query result indicates that the event injection from end_S(IDS[]) to start_S(IDS[]) is true, meaning that the server’s communication channel is functioning correctly.
  • Query 2 tests the event injection for the reader. It verifies if the ProVerif response confirms that the connection on the reader is successfully opened and closed. The query result indicates that the event injection from end_R(IDR[]) to start_R(IDR[]) is true, thereby indicating that the reader’s communication channel is functioning correctly.
  • Query 3 focuses on the event injection for the tag. It checks if the ProVerif response confirms that the connection on the tag is successfully opened and closed. The query result indicates that the event injection from end_T(IDT[]) to start_T(IDT[]) is true, thus implying that the tag’s communication channel is functioning correctly.
  • Query 4 examines the security/strength of the secret key KNEW by checking if it is susceptible to an attacker. The ProVerif response indicates that KNEW is secure, given that the result of not attacker(KNEW[]) is true. Therefore, the secret key KNEW is deemed secure, and an attacker cannot intercept it from the public channel.
The summary of security analysis is provided in Table 3. The four queries in the ProVerif security analysis provide insights into the functionality and security aspects of the system under consideration. By evaluating the ProVerif responses, we can gain confidence in the proper operation of the server, reader, and tag, as well as the security of the secret key.
Table 3. ProVerif security analysis.

5.2. BAN Logic Security Proof

The accuracy of the designed protocol was checked through BAN logic. The BAN logic notations are shown in Table 4.
Table 4. Notations table for BAN logic.
  • Goal 1: S | R { C r o ( R I D T I D ) , K }
  • Goal 2: S | R | { C r o ( R I D T I D , K N S ) } , { R o t ( K T I D , K R I D ) N S K } K
  • Goal 3: R | T { C r o ( R I D T I D . K n e w ) } K n e w
  • Goal 4: T | R { K n e w N T N R } K n e w
  • Goal 5: T | R | S K n e w T

5.2.1. Idealized Form

Part 1: In the proposed protocol, the idealized form is discussed below:
  • M1: N R < R R > K R T
  • M2: C r o < R I D T I D > K , N T < R T > K R T
  • M3: C r o < R I D T I D > K , N R < R R > K S R , N T < R T > K S R
  • M4: C r o < R I D T I D , K N S > , R o t < K T I D , K R I D > , < K N S >
  • M5: < T I D > R R , N S < R S > K R T
  • M6: C r o < R I D T I D , K n e w < R R R S R T , K > >
  • M7: ( K n e w R T R R )
  • M8: ( M a r k R S )

5.2.2. Assumption

Part 2: The following assumptions were made to analyze the designed scheme using BAN logic.
  • A 1: T | T K R , R | R K T
  • A 2: R | R K S , S | S K R
  • A 3: S | S K T , T | T K S
  • A 4: R | R R , R | # ( R R ) , R | T | S R R R
  • A 5: T | R T , T | # ( R T ) , T | R | S R T T
  • A 6: S | R S , S | # ( R S ) , S | R | T R S S
  • A 7: T | R S # ( K )

5.2.3. Idealized form Verification

Part 3: With the goals and idealized form set up, the proposed scheme can be verified using BAN logic.
Through the use of the Q X seeing rule,
  • V 1: S < C r o ( R I D T I D , K ) K , N R , N T ( A 2 ) , which demonstrates that only the reader and the server (as well as any other entities that they believe know the value of K) can access S. Combining this with the message seeing rule, P < (X, Y) |- P < X, we obtain
  • V 2: S { C r o ( R I D T I D , K ) } K , where Cro is a cryptographic function, R I D and T I D are identifiers, and K is the shared secret key.
According to line V 2 and the msg-meaning rule, which is Q | Q K T . q < X > K Q | T | X , we attain
  • V 3: S R ¬ Cro ( R I D T I D , K ) K
Using the rule of Freshness Q | # ( X ) Q | # ( X , Y ) and V 3, we attain
  • V 4: S S { Cro ( R I D T I D , K ) } K
By the use of the nonce verification Q | # ( X ) , Q | T | X Q | T | X rule, we attain
  • V 5: S R Cro ( R I D T I D , K ) K
    Hence, according to the above proof process, the first goal (Goal 1) has been achieved. Similarly, we can compute the message sent to the reader from the server as
  • V 6: R < { C r o ( R I D T I D , K N S ) . R o t ( K T I D , K R I D ) N S K } > K , namely, the Goal 2.
    By the same procedure, we can compute Goals 3 and 4. According to (A 1, A 2, A 3) and the process of front demonstration, we can obtain T R K K new T , and R S K new R . Moreover, we combine secret rules and message keys. Given P R K R 1 P R 1 K R and P Q R K R 1 P R 1 K R , we can see that
  • V 7: T R S K new T
    Hence, all the protocol goals have been proved to secure the proposed scheme logically.

5.2.4. Goals

There are two participators—the authorized user ( U i ) and the authorized server ( L S j )—in our proposed protocol. Four goals were set to satisfy the correctness of the designed authentication scheme.
  • The server L S j believes that U i and L S j share a secret parameter D I D i ;
  • L S i believes in U i and U i also believes that U i and L S j share the secret value D I D i ;
  • U i believes that L S j shares the secret key of D I D i with U i ;
  • U i believes in L S j and also believes that L S j shares a secret key D I D i with U i .
These four goals in the language of the BAN logic are exposed as Goal-1 and Goal-2. BAN logic has proved that U i and L S j attain mutual authentication and securely achieve the session key agreement. Consequently, it can be concluded that the proposed authentication scheme is correct.

6. Informal Security Analysis

In the previous section, a formal analysis of the proposed security scheme was conducted using well-known automated tools such as ProVerif and BAN Logics, thus validating its correctness. Building upon the formal analysis, this section focuses on an informal security analysis, which compares the proposed scheme with existing protocols to meet various security criteria, as shown in Table 5.
Table 5. List of security criteria.
The informal security analysis involved a comparison of the proposed scheme with the Chien Protocol [10], Gossamer Protocol [11], Xie Protocol [13], Sarah Protocol [12], and Fan Protocol [14]. Table 6 presents the results of this comparison, which showcase how the proposed scheme fared against each protocol in fulfilling the listed security standards.
Table 6. Informal security proof table. 1: provides, 0: Does not provide.
Upon examining Table 6, it becomes apparent that the proposed scheme outperformed all the compared protocols in meeting the specified security criteria. It achieved a score of one (provides) for all security criteria (R1–R9), thus indicating its capability to fulfil all the requirements. In contrast, the other protocols exhibited varying degrees of effectiveness in meeting the security criteria.
Based on the comparison, it is evident that the proposed scheme exceled in fulfilling all the listed security criteria (R1–R9). It effectively provided tag anonymity, protected against reply and synchronization attacks, ensured forward secrecy, as well as mutual authentication, and guarded against DoS attacks, impersonation attacks, insider attackers, and formal verification. These findings reinforce the robustness and effectiveness of the proposed security scheme, as validated by both the formal analysis and the informal comparison.
Considering the formal analysis results and the strengths highlighted in the informal comparison, it can be concluded that the proposed security scheme offers a robust and comprehensive solution to meet security requirements when compared to the existing protocols.

7. Conclusions

We presented a lightweight RFID protocol that effectively addresses existing schemes’ anonymity and traceability issues. Using pseudonyms instead of real IDs, our proposed protocol ensured patient privacy while establishing secure communication between tags and readers. The protocol has undergone rigorous testing and has demonstrated resilience against various security attacks. We firmly believe that our proposed protocol can contribute to developing secure and privacy-preserving healthcare systems in the context of the Internet of Things.
As part of our future work, we plan to conduct comprehensive simulations to evaluate the proposed protocol under realistic conditions. These simulations will enable us to assess the protocol’s performance metrics in various deployment scenarios, such as communication latency, scalability, and resource utilization. These simulations aim to bridge the gap between theoretical analysis and real-world applicability, thereby providing concrete evidence of the protocol’s effectiveness and efficiency.

Author Contributions

M.A.K.—Conceptualization, Data curation, Software, Writing—Original Draft, Investigation, Validation, and Visualization; S.U.—Methodology, Supervision, Resources, Writing—Original Draft and Visualization; T.A.—Writing—Original Draft, Writing—Review and Editing, Funding Acquisition, Validation, and Visualization; K.J.—Software, Investigation, Writing—Original Draft and Validation; A.B.—Methodology, Formal Analysis, Resources, Writing—Original Draft, Validation, and Investigation; All authors have read and agreed to the published version of the manuscript.

Funding

This work is supported by the Open Access Publishing Fund of the Free University of Bozen-Bolzano.

Institutional Review Board Statement

Not applicable.

Data Availability Statement

Available upon request.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Lee, I.; Lee, K. The Internet of Things (IoT): Applications, investments, and challenges for enterprises. Bus. Horizons 2015, 58, 431–440. [Google Scholar] [CrossRef]
  2. Mahmood, K.; Arshad, J.; Chaudhry, S.A.; Kumari, S. An enhanced anonymous identity-based key agreement protocol for smart grid advanced metering infrastructure. Int. J. Commun. Syst. 2019, 32, 16. [Google Scholar] [CrossRef]
  3. Vijayakumar, P.; Obaidat, M.S.; Azees, M.; Islam, S.H.; Kumar, N. Efficient and Secure Anonymous Authentication with Location Privacy for IoT-Based WBANs. IEEE Trans. Ind. Inform. 2020, 16, 2603–2611. [Google Scholar] [CrossRef]
  4. Mishra, D.; Rana, S. A provably secure content distribution framework for portable DRM systems. J. Inf. Secur. Appl. 2021, 61, 102928. [Google Scholar] [CrossRef]
  5. Gao, M.; Lu, Y. URAP: A new ultra-lightweight RFID authentication protocol in passive RFID system. J. Supercomput. 2022, 78, 10893–10905. [Google Scholar] [CrossRef]
  6. Shariq, M.; Singh, K.; Maurya, P.K.; Ahmadian, A.; Taniar, D. AnonSURP: An anonymous and secure ultralightweight RFID protocol for deployment in internet of vehicles systems. J. Supercomput. 2022, 78, 8577–8602. [Google Scholar] [CrossRef]
  7. An, Y.; Zhang, Y.; Cao, W.; Tong, Z.; He, Z. A Lightweight and Practical Anonymous Authentication Protocol Based on Bit-Self-Test PUF. Electronics 2022, 11, 772. [Google Scholar] [CrossRef]
  8. Rana, S.; Mishra, D. Secure and ubiquitous authenticated content distribution framework for IoT enabled DRM system. Multimed. Tools Appl. 2020, 79, 20319–20341. [Google Scholar] [CrossRef]
  9. Chander, B.; Gopalakrishnan, K. A secured and lightweight RFID-tag based authentication protocol with privacy-preserving in Telecare medicine information system. Computer Commun. 2022, 191, 425–437. [Google Scholar] [CrossRef]
  10. Chen, Y.; Chou, J.S.; Lin, C.F.; Wu, C.L. A Novel RFID Authentication Protocol based on Elliptic Curve Cryptosystem. IACR Cryptol. EPrint Arch. 2011, 2011, 381. [Google Scholar]
  11. Bilal, Z.; Masood, A.; Kausar, F. Security analysis of ultra-lightweight cryptographic protocol for low-cost RFID tags: Gossamer protocol. In Proceedings of the 2009 International Conference on Network-Based Information Systems, Indianapolis, IN, USA, 19–21 August 2009; pp. 260–267. [Google Scholar]
  12. Abughazalah, S.; Markantonakis, K.; Mayes, K. Secure improved cloud-based RFID authentication protocol. In Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance; Springer: Berlin/Heidelberg, Germany, 2015; pp. 147–164. [Google Scholar]
  13. Xie, W.; Xie, L.; Zhang, C.; Zhang, Q.; Tang, C. Cloud-based RFID authentication. In Proceedings of the 2013 IEEE International Conference on RFID (RFID), Penang, Malaysia, 30 April–2 May 2013; pp. 168–175. [Google Scholar]
  14. Fan, K.; Jiang, W.; Li, H.; Yang, Y. Lightweight RFID Protocol for Medical Privacy Protection in IoT. IEEE Trans. Ind. Inform. 2018, 14, 1656–1665. [Google Scholar] [CrossRef]
  15. Kaul, S.D.; Awasthi, A.K. RFID authentication protocol to enhance patient medication safety. J. Med. Syst. 2013, 37, 9979. [Google Scholar] [CrossRef]
  16. Chou, J.S. An efficient mutual authentication RFID scheme based on elliptic curve cryptography. J. Supercomput. 2014, 70, 75–94. [Google Scholar] [CrossRef]
  17. Liao, Y.P.; Hsiao, C.M. A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol. Ad Hoc Netw. 2014, 18, 133–146. [Google Scholar] [CrossRef]
  18. Zhao, Z. A secure RFID authentication protocol for healthcare environments using elliptic curve cryptosystem. J. Med. Syst. 2014, 38, 46. [Google Scholar] [CrossRef]
  19. Peeters, R.; Hermans, J. Attack on Liao and Hsiao’s Secure ECC-Based RFID Authentication Scheme Integrated with ID-Verifier Transfer Protocol. Cryptology ePrint Archive. 2013. Available online: https://eprint.iacr.org/2013/399.pdf (accessed on 15 March 2023).
  20. Farash, M.S.; Nawaz, O.; Mahmood, K.; Chaudhry, S.A.; Khan, M.K. A provably secure RFID authentication protocol based on elliptic curve for healthcare environments. J. Med. Syst. 2016, 40, 165. [Google Scholar] [CrossRef]
  21. Srivastava, K.; Awasthi, A.K.; Kaul, S.D.; Mittal, R. A hash based mutual RFID tag authentication protocol in telecare medicine information system. J. Med. Syst. 2015, 39, 153. [Google Scholar] [CrossRef] [PubMed]
  22. Li, C.T.; Weng, C.Y.; Lee, C.C. A secure RFID tag authentication protocol with privacy preserving in telecare medicine information system. J. Med. Syst. 2015, 39, 77. [Google Scholar] [CrossRef]
  23. Jin, C.; Xu, C.; Zhang, X.; Li, F. A secure ECC-based RFID mutual authentication protocol to enhance patient medication safety. J. Med. Syst. 2016, 40, 12. [Google Scholar] [CrossRef] [PubMed]
  24. Prakash Pokala, J.; Reddy, M.C.; Bapana, S.; Vorugunti, C.S. A secure RFID protocol for telecare medicine information systems using ECC. In Proceedings of the 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), Chennai, India, 23–25 March 2016; pp. 2295–2300. [Google Scholar]
  25. Zhou, Z.; Wang, P.; Li, Z. A quadratic residue-based RFID authentication protocol with enhanced security for TMIS. J. Ambient Intell. Humaniz. Comput. 2019, 10, 3603–3615. [Google Scholar] [CrossRef]
  26. Safkhani, M.; Vasilakos, A. A new secure authentication protocol for telecare medicine information system and smart campus. IEEE Access 2019, 7, 23514–23526. [Google Scholar] [CrossRef]
  27. Zheng, L.; Song, C.; Cao, N.; Li, Z.; Zhou, W.; Chen, J.; Meng, L. A new mutual authentication protocol in mobile RFID for smart campus. IEEE Access 2018, 6, 60996–61005. [Google Scholar] [CrossRef]
  28. Chen, X.; Geng, D.; Zhai, J.; Liu, W.; Zhang, H.; Zhu, T. Security analysis and enhancement of the most recent RFID protocol for telecare medicine information system. Wirel. Pers. Commun. 2020, 114, 1371–1387. [Google Scholar] [CrossRef]
  29. Shariq, M.; Singh, K.; Maurya, P.K.; Ahmadian, A.; Ariffin, M.R.K. Urasp: An ultralightweight rfid authentication scheme using permutation operation. Peer- Netw. Appl. 2021, 14, 3737–3757. [Google Scholar] [CrossRef]
  30. Xiao, L.; Xie, S.; Han, D.; Liang, W.; Guo, J.; Chou, W.K. A lightweight authentication scheme for telecare medical information system. Connect. Sci. 2021, 33, 769–785. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.