Smart City Gnosys

Smart city article details

Title Cryptanalysis Of An Rfid-Enabled Authentication Protocol For Healthcare
ID_Doc 16768
Authors Ghosh H.; Maurya P.K.; Bagchi S.
Year 2024
Published Wireless Personal Communications, 138, 4
DOI http://dx.doi.org/10.1007/s11277-024-11616-z
Abstract A cutting-edge idea known as the Internet of Things (IoT) connects different physical items with the online environment. IoT technology is expanding quickly and will soon have an important encounter on how we live our everyday lives. IoT applications use radio frequency identification (RFID) to automatically identify the linked devices. RFID-enabled technologies are becoming more common nowadays for protecting privacy in a variety of industries, including the smart grid, smart cities, and smart education. Healthcare is one of the prominent applications of RFID technology. Patients can receive quick and convenient care at home due to RFID-enabled healthcare solutions. However, there are instances of technology forgery, putting patients’ medical information in danger. Utilizing an authentication protocol is extensively regarded as the most efficient way for RFID-enabled healthcare systems to prevent malicious attacks and the misuse of resources. Very recently, Shariq and Singh proposed a lightweight RFID-enabled protocol for healthcare using the properties of vector space. This article presents evidence that Shariq and Singh’s protocol has some wrong steps and is also liable to tag anonymity and impersonation attacks. Moreover, we proposed a secured authentication protocol to overcome the flaws of Shariq and Singh’s protocol using vector addition, scalar multiplication, and dot products. We analyze the formal security utilizing BAN logic and Scyther simulation tools. The proposed protocol performs better than related protocols regarding costs associated with computation, transmission, storage, and security measures. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2024.
Author Keywords Authentication protocol; Privacy; RFID systems; Security; TMIS


Similar Articles


Id Similarity Authors Title Published
4460 View0.945Shariq M.; Singh K.A Secure And Lightweight Rfid-Enabled Protocol For Iot Healthcare Environment: A Vector Space Based ApproachWireless Personal Communications, 127, 4 (2022)
28852 View0.863Adil M.; Khan M.K.; Kumar N.; Attique M.; Farouk A.; Guizani M.; Jin Z.Healthcare Internet Of Things: Security Threats, Challenges, And Future Research DirectionsIEEE Internet of Things Journal, 11, 11 (2024)
4451 View0.858Khan N.; Zhang J.; Mallah G.A.; Chaudhry S.A.A Secure And Efficient Information Authentication Scheme For E-Healthcare SystemComputers, Materials and Continua, 76, 3 (2023)
47600 View0.857Nurkifli E.H.; Hwang T.Secure Authentication In An Iot-Based Healthcare Environment With Strong Anonymity And Unclonable DeviceProceedings - 2023 6th International Conference on Computer and Informatics Engineering: AI Trust, Risk and Security Management (AI Trism), IC2IE 2023 (2023)
11129 View0.856Kute S.; Shreyas Madhav A.V.; Tyagi A.K.; Deshmukh A.Authentication Framework For Healthcare Devices Through Internet Of Things And Machine LearningLecture Notes on Data Engineering and Communications Technologies, 116 (2022)