Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

Cryptanalysis of an RFID-Enabled Authentication Protocol for Healthcare

Published: 19 October 2024 Publication History

Abstract

A cutting-edge idea known as the Internet of Things (IoT) connects different physical items with the online environment. IoT technology is expanding quickly and will soon have an important encounter on how we live our everyday lives. IoT applications use radio frequency identification (RFID) to automatically identify the linked devices. RFID-enabled technologies are becoming more common nowadays for protecting privacy in a variety of industries, including the smart grid, smart cities, and smart education. Healthcare is one of the prominent applications of RFID technology. Patients can receive quick and convenient care at home due to RFID-enabled healthcare solutions. However, there are instances of technology forgery, putting patients’ medical information in danger. Utilizing an authentication protocol is extensively regarded as the most efficient way for RFID-enabled healthcare systems to prevent malicious attacks and the misuse of resources. Very recently, Shariq and Singh proposed a lightweight RFID-enabled protocol for healthcare using the properties of vector space. This article presents evidence that Shariq and Singh’s protocol has some wrong steps and is also liable to tag anonymity and impersonation attacks. Moreover, we proposed a secured authentication protocol to overcome the flaws of Shariq and Singh’s protocol using vector addition, scalar multiplication, and dot products. We analyze the formal security utilizing BAN logic and Scyther simulation tools. The proposed protocol performs better than related protocols regarding costs associated with computation, transmission, storage, and security measures.

References

[1]
Aghili SF and Mala H Tracking and impersonating tags in a CRC-based ultralightweight RFID authentication protocol Peer-to-Peer Networking and Applications 2020 13 3 816-824
[2]
Agrahari AK and Varma S A provably secure RFID authentication protocol based on ECQV for the medical internet of things Peer-to-Peer Networking and Applications 2021 14 3 1277-1289
[3]
Axler Sheldon Linear Algebra Done Right 1997 New York Springer
[4]
Burrows M, Abadi M, and Needham RM A logic of authentication Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences 1989 426 1871 233-271
[5]
Chander B and Gopalakrishnan K A secured and lightweight RFID-tag based authentication protocol with privacy-preserving in telecare medicine information system Computer Communications 2022 191 425-437
[6]
Chaudhry SA, Naqvi H, Shon T, Sher M, and Farash MS Cryptanalysis and improvement of an improved two factor authentication protocol for telecare medical information systems Journal of Medical Systems 2015 39 6 66
[7]
Chaudhry SA, Naqvi H, and Khan MK An enhanced lightweight anonymous biometric based authentication protocol for TMIS Multimedia Tools and Applications 2018 77 5503-5524
[8]
Chaudhry SA, Mahmood K, Naqvi H, and Khan MK An improved and secure biometric authentication protocol for telecare medicine information systems based on elliptic curve cryptography Journal of Medical Systems 2015 39 1-12
[9]
Chen Y and Chen J An efficient and privacy-preserving mutual authentication with key agreement protocol for telecare medicine information system Peer-to-Peer Network Appliations 2022 15 516-528
[10]
Dharminder D, Kundu N, and Mishra D Construction of a chaotic map-based authentication protocol for tmis Journal of Medical Systems 2021 45 8 1-10
[11]
Dolev D and Yao A On the security of public key protocols IEEE Transactions on Information Theory 1983 29 2 198-208
[12]
Gaba GS, Hedabou M, Kumar P, Braeken A, Liyanage M, and Alazab M Zero knowledge proofs based authenticated key agreement protocol for sustainable healthcare Sustainable Cities and Society 2022 80 103766
[13]
Gaikwad VP, Tembhurne JV, Meshram C, and Lee CC Provably secure lightweight client authentication scheme with anonymity for TMIS using chaotic hash function The Journal of Supercomputing 2021 77 8 8281-8304
[14]
Gao M and Lu Y URAP: A new ultra-lightweight RFID authentication protocol in passive RFID system The Journal of Supercomputing 2022 78 10893-10905
[15]
Ghosh H, Maurya PK, and Bagchi S Secret sharing based RFID protocol using ECC for TMIS Peer-to-Peer Networking and Applications 2024 17 2 624-638
[16]
He D, Kumar N, Chen J, Lee CC, Chilamkurti N, and Yeo SS Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks Multimedia Systems 2015 21 1 49-60
[17]
Islam SH and Khan MK Cryptanalysis and improvement of authentication and key agreement protocols for telecare medicine information systems Journal of Medical Systems 2014 38 10 135
[18]
Kumar A, Singh K, Shariq M, Lal C, Conti M, Amin R, and Chaudhry SA An efficient and reliable ultralightweight RFID authentication scheme for healthcare systems Computer Communications 2023 205 147-157
[19]
Kumar P, Lee SG, and Lee HJ E-SAP: Efficient-strong authentication protocol for healthcare applications using wireless medical sensor networks Sensors 2012 12 2 1625-1647
[20]
Kumari S and Renuka K Design of a password authentication and key agreement scheme to access e-healthcare services Wireless Personal Communications 2021 117 27-45
[21]
Li X, Wu F, Khan MK, Xu L, Shen J, and Jo M A secure chaotic map-based remote authentication scheme for telecare medicine information systems Future Generation Computer Systems 2018 84 149-159
[22]
Maurya PK and Bagchi S Cyclic group based mutual authentication protocol for RFID system Wireless Networks 2020 26 1005-1015
[23]
Maurya PK and Bagchi S Quadratic residue-based unilateral authentication protocol for RFID system Multimedia Tools and Applications 2022 82 1-22
[24]
Maurya PK, Ghosh H, and Bagchi S MDS code based ultralightweight authentication protocol for RFID system IEEE Access 2023 11 10563-10577
[25]
Mir O and Nikooghadam M A secure biometrics based authentication with key agreement scheme in telemedicine networks for e-health services Wireless Personal Communications 2015 83 4 1-23
[26]
Qi M, Chen J, and Chen Y A secure biometrics-based authentication key exchange protocol for multi-server TMIS using ECC Computer Methods and Programs in Biomedicine 2018 164 101-109
[27]
Qi M and Chen J New robust biometrics-based mutual authentication scheme with key agreement using elliptic curve cryptography Multimedia Tools and Applications 2018 77 23335-23351
[28]
Qiu S, Xu G, Ahmad H, and Wang L A robust mutual authentication scheme based on elliptic curve cryptography for telecare medical information systems IEEE Access 2018 6 7452-7463
[29]
Rana M, Shafiq A, Altaf I, Alazab M, Mahmood K, Chaudhry SA, and Zikria YB A secure and lightweight authentication scheme for next generation IoT infrastructure Computer Communications 2021 165 85-96
[30]
Salem FM and Amin R A privacy-preserving RFID authentication protocol based on El-Gamal cryptosystem for secure TMIS Information Sciences 2020 527 382-393
[31]
Shariq M and Singh K A secure and lightweight RFID-enabled protocol for IoT healthcare environment: A vector space based approach Wireless Personal Communications 2022 127 3467-3491
[32]
Shamshad S, Ayub MF, Mahmood K, Kumari S, Chaudhry SA, and Chen CM An enhanced scheme for mutual authentication for healthcare services Digital Communications and Networks 2022 8 2 150-161
[33]
Xiao L, Xie S, Han D, Liang W, Guo J, and Chou WK A lightweight authentication scheme for telecare medical information system Connection Science 2021 33 3 769-785
[34]
Xu X, Zhu P, and Wen Q A secure and efficient authentication and key agreement Scheme Based on ECC for telecare medicine information systems Journal of Medical Systems 2014 38 9994

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Wireless Personal Communications: An International Journal
Wireless Personal Communications: An International Journal  Volume 138, Issue 4
Oct 2024
693 pages

Publisher

Kluwer Academic Publishers

United States

Publication History

Published: 19 October 2024
Accepted: 01 October 2024

Author Tags

  1. RFID systems
  2. Authentication protocol
  3. Security
  4. Privacy
  5. TMIS

Qualifiers

  • Research-article

Funding Sources

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 0
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 05 Mar 2025

Other Metrics

Citations

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media