Improve Healthcare Safety Using Hash-Based Authentication Protocol for RFID Systems

被引:0
|
作者
Baashirah, Rania [1 ]
Abuzneid, Abdelshakour [1 ]
Tammineedi, Akhil [1 ]
Mathew, Maneesha [1 ]
Bandaru, Neelam [1 ]
Delair, Pulkit [1 ]
机构
[1] Univ Bridgeport, Dept Comp Sci & Eng, Bridgeport, CT 06604 USA
关键词
Medication errors; RFID; mutual authentication; Elliptic curve cryptography; IoT; MEDICATION SAFETY;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Medication errors are now rapidly increasing that result in a serious impact on patients Safety. A lot of automated techniques have come up using the Radio-Frequency Identification (RFID) Technology that has now been successfully implemented in hospitals and healthcare institutions. The data that is being transmitted is highly sensitive and has to be authenticated between the server and the tag. Such a mutual authentication is highly necessary to enhance the safety protocols. An RFID authentication protocol using Elliptical Curve Cryptography could overcome security weaknesses and eventually lead to better performance. In order to achieve better security and quicker runtime, ECC must have smaller keys compared to non-ECC. In this paper, elliptic curves over a finite field are being structured that belongs to the category of publickey cryptography. This proposed protocol system not only increases the security to a greater extent but also enhances the performance by enabling large-scale implementations. As security is an instrumental aspect of cryptography, such a proposed system is effectual.
引用
收藏
页码:800 / 805
页数:6
相关论文
共 50 条
  • [21] A Hash-Based RFID Security Protocol for Strong Privacy Protection
    Sun, Da-Zhi
    Zhong, Ji-Dong
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2012, 58 (04) : 1246 - 1252
  • [22] Secure Hash-based Search Protocols for RFID Systems
    He Jialiang
    Xu Zhiqiang
    INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2013, 6 (04): : 49 - 59
  • [23] A Security RFID Authentication Protocol Based on Hash Function
    Yu Tian-tian
    Feng Quan-yuan
    IEEC 2009: FIRST INTERNATIONAL SYMPOSIUM ON INFORMATION ENGINEERING AND ELECTRONIC COMMERCE, PROCEEDINGS, 2009, : 804 - 807
  • [24] A New RFID Secure Authentication Protocol Based on Hash
    Li Hai-lin
    Xu Peng-fei
    PROCEEDINGS OF THE 14TH YOUTH CONFERENCE ON COMMUNICATION, 2009, : 429 - 432
  • [25] A Hash-Based RFID Authentication Mechanism for Context-Aware Management in IoT-Based Multimedia Systems
    Deebak, B. D.
    Al-Turjman, Fadi
    Mostarda, Leonardo
    SENSORS, 2019, 19 (18)
  • [26] Hash-Based Password Authentication Protocol Against Phishing and Pharming Attacks
    Kim, Iksu
    Cho, Yongyun
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2015, 31 (01) : 343 - 355
  • [27] Hash-based RFID security protocol using randomly key-changed identification procedure
    Zhai, Jia
    Park, Chang Mok
    Wang, Gi-Nam
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2006, PT 4, 2006, 3983 : 296 - 305
  • [28] Cryptanalysis of a Hash Based Mutual RFID Tag Authentication Protocol
    Da-Zhi Sun
    Ji-Dong Zhong
    Wireless Personal Communications, 2016, 91 : 1085 - 1093
  • [29] Research on RFID Security Authentication Protocol Based on HASH Function
    Chen, Zhen-huan
    Pan, Xue-feng
    2018 INTERNATIONAL CONFERENCE ON ELECTRICAL, CONTROL, AUTOMATION AND ROBOTICS (ECAR 2018), 2018, 307 : 251 - 255
  • [30] An Improvement RFID Security Authentication Protocol Based on Hash Function
    Sun, Haowen
    Li, Peng
    Xu, He
    Zhu, Feng
    INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING, IMIS-2018, 2019, 773 : 375 - 384