Lightweight ECC Based RFID Authentication Integrated with an ID Verifier Transfer Protocol

@article{He2014LightweightEB,
  title={Lightweight ECC Based RFID Authentication Integrated with an ID Verifier Transfer Protocol},
  author={Debiao He and Neeraj Kumar and Naveen K. Chilamkurti and Jong-Hyouk Lee},
  journal={Journal of Medical Systems},
  year={2014},
  volume={38},
  pages={1-6}
}
The radio frequency identification (RFID) technology has been widely adopted and being deployed as a dominant identification technology in a health care domain such as medical information authentication, patient tracking, blood transfusion medicine, etc. With more and more stringent security and privacy requirements to RFID based authentication schemes, elliptic curve cryptography (ECC) based RFID authentication schemes have been proposed to meet the requirements. However, many recently… CONTINUE READING
BETA

Figures, Tables, Results, and Topics from this paper.

Key Quantitative Results

  • scheme are listed in Table 1 wherein we confirm that the proposed authentication scheme provides a 40% reduction of the computational cost compared with Liao and Hsiao’s scheme.

Citations

Publications citing this paper.
SHOWING 1-10 OF 31 CITATIONS

Security Analysis of ECC Based Protocols

VIEW 11 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

A Secure RFID Authentication Scheme for Healthcare Environments Based on Digital Signature Algorithm

  • 2018 International Symposium on Networks, Computers and Communications (ISNCC)
  • 2018
VIEW 5 EXCERPTS
CITES BACKGROUND & RESULTS
HIGHLY INFLUENCED

A secure RFID protocol for Telecare Medicine Information Systems using ECC

  • 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)
  • 2016
VIEW 14 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

A Secure RFID Mutual Authentication Protocol for Healthcare Environments Using Elliptic Curve Cryptography

  • Journal of Medical Systems
  • 2015
VIEW 7 EXCERPTS
CITES METHODS, RESULTS & BACKGROUND
HIGHLY INFLUENCED

References

Publications referenced by this paper.
SHOWING 1-10 OF 33 REFERENCES

C

Y. Liao
  • Hsiao, A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol, Ad Hoc Networks,
  • 2013
VIEW 9 EXCERPTS
HIGHLY INFLUENTIAL

M

M. Safkhani, P. Peris-Lopez, J. C. Hernandez-Castro, N. Bagheri
  • Naderi, Cryptanalysis of Cho et al.’s protocol, a hash-based mutual authentication protocol for RFID systems, Cryptology ePrint Archive, Report 2011/311,
  • 2011

Similar Papers

Loading similar papers…