4.5 Article

An enhanced scalable and secure RFID authentication protocol for WBAN within an IoT environment

出版社

ELSEVIER
DOI: 10.1016/j.jisa.2020.102705

关键词

Authentication; RFID; Wireless Body Area Network (WBAN); Internet of Things (IoT); Elliptic Curve Cryptography (ECC)

向作者/读者索取更多资源

Nowadays, IoT-based E-healthcare is a rapidly growing field due to advancements in wireless technologies and cloud computing. However, data security and patient privacy are major concerns in Wireless Body Area Networks (WBANs). To address these issues, researchers have proposed an efficient and enhanced RFID authentication scheme for IoT that ensures mutual authentication and patient data security.
Nowadays, Internet of Things (IoT)-based E-healthcare represents an emergent research field due to the fast development of wireless technologies and cloud computing. Radio Frequency Identification (RFID) is an integral technology in IoT thanks to its low cost and autonomous data collection and transfer. These features made it useful in Wireless Body Area Network (WBAN) for healthcare applications. However, data security and patient privacy remain major challenges in WBANs. In this context, many authentication protocols have been designed trying to satisfy both security and implementation requirements. Most recently, Naeem et al. have proposed an RFID authentication scheme for IoT which is claimed to be secure and provides scalability. Unfortunately, we have found that their protocol does not provide authentication and anonymity and it is vulnerable to numerous attacks. To overcome these security issues, we propose, in this paper, an efficient extended and improved IoT-based RFID authentication scheme for WBANs. Our proposed protocol could resist to various attacks and ensure mutual authentication from the tag to the medical server, in addition to patients data security. For this, elliptic curve cryptography (ECC) encryption mechanism and elliptic curve digital signature with message recovery (ECDSMR) have been adopted. Formal and informal analysis have proved that our proposed protocol succeeded to provide many security features and offer reliable data security with a considerably small computational and storage cost compared to existing schemes.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.5
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据