Improve Healthcare Safety Using Hash-Based Authentication Protocol for RFID Systems

被引:0
|
作者
Baashirah, Rania [1 ]
Abuzneid, Abdelshakour [1 ]
Tammineedi, Akhil [1 ]
Mathew, Maneesha [1 ]
Bandaru, Neelam [1 ]
Delair, Pulkit [1 ]
机构
[1] Univ Bridgeport, Dept Comp Sci & Eng, Bridgeport, CT 06604 USA
关键词
Medication errors; RFID; mutual authentication; Elliptic curve cryptography; IoT; MEDICATION SAFETY;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Medication errors are now rapidly increasing that result in a serious impact on patients Safety. A lot of automated techniques have come up using the Radio-Frequency Identification (RFID) Technology that has now been successfully implemented in hospitals and healthcare institutions. The data that is being transmitted is highly sensitive and has to be authenticated between the server and the tag. Such a mutual authentication is highly necessary to enhance the safety protocols. An RFID authentication protocol using Elliptical Curve Cryptography could overcome security weaknesses and eventually lead to better performance. In order to achieve better security and quicker runtime, ECC must have smaller keys compared to non-ECC. In this paper, elliptic curves over a finite field are being structured that belongs to the category of publickey cryptography. This proposed protocol system not only increases the security to a greater extent but also enhances the performance by enabling large-scale implementations. As security is an instrumental aspect of cryptography, such a proposed system is effectual.
引用
收藏
页码:800 / 805
页数:6
相关论文
共 50 条
  • [31] Cryptanalysis of a Hash Based Mutual RFID Tag Authentication Protocol
    Sun, Da-Zhi
    Zhong, Ji-Dong
    WIRELESS PERSONAL COMMUNICATIONS, 2016, 91 (03) : 1085 - 1093
  • [32] Mobile RFID Mutual Authentication Protocol Based on Hash Function
    Yu, Wenjin
    Jiang, Yixiang
    2017 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2017, : 358 - 361
  • [33] Weaknesses and Improvement of Secure Hash-Based Strong-Password Authentication Protocol
    Jeong, Hanjae
    Won, Dongho
    Kim, Seungjoo
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2010, 26 (05) : 1845 - 1858
  • [34] An Effective Hash-Based Assessment and Recovery Algorithm for Healthcare Systems
    Haraty, Ramzi A.
    Boukhari, Bahia
    Kaddoura, Sanaa
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2022, 47 (02) : 1523 - 1536
  • [35] An Effective Hash-Based Assessment and Recovery Algorithm for Healthcare Systems
    Ramzi A. Haraty
    Bahia Boukhari
    Sanaa Kaddoura
    Arabian Journal for Science and Engineering, 2022, 47 : 1523 - 1536
  • [36] DePass: A Secure Hash-based Authentication Scheme
    Benzekki, Kamal
    El Fergougui, Abdeslam
    ElAlaoui, Abdelbaki ElBelrhiti
    2017 INTELLIGENT SYSTEMS AND COMPUTER VISION (ISCV), 2017,
  • [37] SRFID: A hash-based security scheme for low cost RFID systems
    Khedr, Walid I.
    EGYPTIAN INFORMATICS JOURNAL, 2013, 14 (01) : 89 - 98
  • [38] A Trapdoor Hash-Based Mechanism for Stream Authentication
    Chandrasekhar, Santosh
    Chakrabarti, Saikat
    Singhal, Mukesh
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2012, 9 (05) : 699 - 713
  • [39] Securing Modbus Transactions Using Hash-Based Message Authentication Codes and Stream Transmission Control Protocol
    Hayes, Garrett
    El-Khatib, Khalil
    2013 THIRD INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND INFORMATION TECHNOLOGY (ICCIT), 2013, : 179 - 184
  • [40] A Secure and Scalable Identification for Hash-based RFID Systems Using Updatable Pre-computation
    Nohara, Yasunobu
    Inoue, Sozo
    WISEC 10: PROCEEDINGS ON THE THIRD ACM CONFERENCE ON WIRELESS NETWORK SECURITY, 2010, : 65 - 74