Improve Healthcare Safety Using Hash-Based Authentication Protocol for RFID Systems

被引:0
|
作者
Baashirah, Rania [1 ]
Abuzneid, Abdelshakour [1 ]
Tammineedi, Akhil [1 ]
Mathew, Maneesha [1 ]
Bandaru, Neelam [1 ]
Delair, Pulkit [1 ]
机构
[1] Univ Bridgeport, Dept Comp Sci & Eng, Bridgeport, CT 06604 USA
关键词
Medication errors; RFID; mutual authentication; Elliptic curve cryptography; IoT; MEDICATION SAFETY;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Medication errors are now rapidly increasing that result in a serious impact on patients Safety. A lot of automated techniques have come up using the Radio-Frequency Identification (RFID) Technology that has now been successfully implemented in hospitals and healthcare institutions. The data that is being transmitted is highly sensitive and has to be authenticated between the server and the tag. Such a mutual authentication is highly necessary to enhance the safety protocols. An RFID authentication protocol using Elliptical Curve Cryptography could overcome security weaknesses and eventually lead to better performance. In order to achieve better security and quicker runtime, ECC must have smaller keys compared to non-ECC. In this paper, elliptic curves over a finite field are being structured that belongs to the category of publickey cryptography. This proposed protocol system not only increases the security to a greater extent but also enhances the performance by enabling large-scale implementations. As security is an instrumental aspect of cryptography, such a proposed system is effectual.
引用
收藏
页码:800 / 805
页数:6
相关论文
共 50 条
  • [41] RCIA: A New Ultralightweight RFID Authentication Protocol Using Recursive Hash
    Mujahid, Umar
    Najam-ul-Islam, M.
    Shami, M. Ali
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2015,
  • [42] Research on a provable security RFID authentication protocol based on Hash function
    Yu Yinhui
    Zhang Lei
    The Journal of China Universities of Posts and Telecommunications, 2016, (02) : 31 - 37
  • [43] Forward private RFID authentication protocol based on universal hash function
    Gao, S. (shujing_g@126.com), 1600, Binary Information Press, Flat F 8th Floor, Block 3, Tanner Garden, 18 Tanner Road, Hong Kong (10):
  • [44] Research on a provable security RFID authentication protocol based on Hash function
    Yinhui, Yu (yuyh@jlu.edu.cn), 2016, Beijing University of Posts and Telecommunications (23):
  • [45] Research on a provable security RFID authentication protocol based on Hash function
    Yu Yinhui
    Zhang Lei
    The Journal of China Universities of Posts and Telecommunications, 2016, 23 (02) : 31 - 37
  • [46] Lightweight RFID Bidirectional Authentication Protocol Based on Improved Hash Function
    Cao, Fang-Ming
    He, Xiao-Ping
    International Journal of Network Security, 2024, 26 (01) : 98 - 105
  • [47] Hash based server/serverless adaptive and mutual authentication protocol of RFID
    Wang, Guowei
    Jia, Zongpu
    Peng, Weiping
    Open Cybernetics and Systemics Journal, 2015, 9 (01): : 483 - 490
  • [48] SecMAP: A Secure RFID Mutual Authentication Protocol for Healthcare Systems
    Zhu, Feng
    IEEE ACCESS, 2020, 8 : 192192 - 192205
  • [49] A secure and robust hash-based scheme for image authentication
    Ahmed, Fawad
    Siyal, M. Y.
    Abbas, Vali Uddin
    SIGNAL PROCESSING, 2010, 90 (05) : 1456 - 1470
  • [50] Hash-Based Signature for Flexibility Authentication of IoT Devices
    HAN Songshen
    XU Kaiyong
    ZHU Zhiqiang
    GUO Songhui
    LIU Haidong
    LI Zuohui
    WuhanUniversityJournalofNaturalSciences, 2022, 27 (01) : 1 - 10