18
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      A Novel Security Authentication Protocol Based on Physical Unclonable Function for RFID Healthcare Systems

      1 , 2 , 1 , 2 , 1 , 2 , 1 , 2
      Wireless Communications and Mobile Computing
      Hindawi Limited

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          The Radio Frequency Identification (RFID) technology has been integrated into healthcare systems for the purpose of improving healthcare management. However, people have concerns about the security and privacy of this kind of RFID systems. In order to solve the security problems faced by RFID-based healthcare systems, a novel security authentication protocol based on Physical Unclonable Function (PUF) and Advanced Encryption Standard (AES) encryption algorithm is designed. The protocol uses PUF technology to output unique and random responses to different excitation inputs, encrypts the authentication information sent by the tag, and uses the AES encryption algorithm to encrypt the authentication information between the cloud database and the reader. At the same time, in the authentication process, once the communicating entity completes the identity authentication of the other two entities, it immediately starts to update the key. The security analysis and formal analysis of BAN (proposed by Burrows et al.) logic prove the security and correctness of the protocol. Analysis results show that the computation cost and security performance of the proposed protocol are better than the compared protocols. Our findings will contribute to further enhancing the security for RFID healthcare systems.

          Related collections

          Most cited references34

          • Record: found
          • Abstract: not found
          • Article: not found

          A logic of authentication

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            Enforcing Position-Based Confidentiality with Machine Learning Paradigm through Mobile Edge Computing in Real-Time Industrial Informatics

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol

                Bookmark

                Author and article information

                Contributors
                Journal
                Wireless Communications and Mobile Computing
                Wireless Communications and Mobile Computing
                Hindawi Limited
                1530-8677
                1530-8669
                July 23 2021
                July 23 2021
                : 2021
                : 1-14
                Affiliations
                [1 ]School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing 210023, China
                [2 ]Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks, Jiangsu Province, Nanjing 210023, China
                Article
                10.1155/2021/8844178
                ba9c1135-730a-4fc8-af68-ae24da0994b7
                © 2021

                https://creativecommons.org/licenses/by/4.0/

                History

                Comments

                Comment on this article