A Time Efficient RFID Mutual Authentication Protocol for HealthCare Environments Using Hyper Elliptic curve Cryptosystem

P.Gowsalya, K.L.N.College of Engineering; D.Pravin Kumar ,

Hyper elliptic curve, Mutual Authentication, Pre-Computing, Security, Running Time

RFID is a transformative technology in the healthcare industry. By applying RFID tags in healthcare environments, for locating and tracking of staff, equipments and patients made easy. However the potential security and running time of the systems are remains, challengeable in RFID system. In this thesis, a new design called mutual authentication protocol for RFID, based on Hyper elliptic curve cryptosystem was introduced. This methodology provides same level of security compared to the existing scheme with lower number of bits. The protocol can provide better efficiency, because it uses pre-computing method within tag’s communication. In terms of security, the protocol can achieve confidentiality, unforgetability, mutual authentication, tag’s anonymity, availability and forward security. The protocol can overcome the weakness of the existing protocols .It also reduce the computation cost and communication overhead
    [1] Atzori.L, Iera.A, and Morabito.G(2010), “The Internet of Things: A survey,” Computer Network, vol. 54, no. 15, pp. 2787–2805. [2] Bringer.J, Chabanne .H, and Icart .T,(2008) “Cryptanalysis of EC-RAC, a RFID identification protocol,” in Proc. 7th International Conference on Cryptgraphica. Network Security(CNS’08), pp. 149–161. [3] Chunhua Jin , Chunxiang Xu , Xiaojun Zhang ,Jining Zhao (2015), „A Secure RFID Mutual Authentication Protocol for Healthcare Environments Using Elliptic CurveCryptography‟, Journal of medical system ,39: 24,pp.1-8. [4] Deursen .T and Radomirovic .S(2009), “Untraceable RFID protocols are not trivially composable: Attacks on the revision of EC-RAC,” Cryptology ePrint Archive, Report, 2009/332. [5] He D., Chen Y., and Chen, J.(2012), “Cryptanalysis and improvement of an extended chaotic maps–based key agreement protocol‟. Nonlinear Dynamics. 69(3):1149–1157. [6] Jonathan Sangoro, Waweru Mwangi, Michael Kimwele (2014), „Enhancement of Security in RFID using RSA Algorithm‟, Vol 5,no.10,pp. 2222-2871. [7] Kakali Chatterjee, Asok De, and Daya Gupta,(2013)” Mutual Authentication Protocol Using Hyperelliptic Curve Cryptosystem in Constrained Devices”, International Journal of Network Security, Vol.15, No.1, PP.9-15. [8] Lee Y., Batina L., and Verbauwhede I.(2008), “EC-RAC (ECDLP based randomized access control): Provably secure RFID authentication protocol,”iProc. IEEE Inernational. Conference on RFID, pp. 97–104. [9] Liao ,Y and Hsiao .C(2014), “A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol,” Ad Hoc Network, vol. 18,pp. 133–146. [10] Ohkubo M. , Suzuki K. , and Kinoshita S. (2003), “Cryptographic Approachto ‘Privacy-Friendly‟ Tags‟, Proc. Radio Frequency Identification (RFID)Privacy Workshop. [11] Tuan Anh Pham, Mohammad S. Hasan and HongnianYu (2012), “A RFID mutual authentication protocol based on AES Algorithm‟, IEEE, pp. 997-999. [12] Weinstein .R(2005), “RFID: A technical overview and its application to the enterprise,” IEEE IT Prof., vol. 7, no. 3, pp. 27–33. [13] Zhang .Z and Qi .Q(2014), “An efficient RFID authentication protocol to enhance patient medication safety using elliptic curve cryptography, Journal of Medical System., vol. 38, no. 5, doi: 10.1007/s10916-014-0047-8. [14] Zhao .Z(2014), “A secure RFID authentication protocol for healthcare environments using elliptic curve cryptosystem,” Journal of Medical System., vol. 38, no. 5, doi: 10.1007/s10916-014-0046-9.
Paper ID: GRDCF002040
Published in: Conference : International Conference on Innovations in Engineering and Technology (ICIET - 2016)
Page(s): 187 - 192