Smart City Gnosys

Smart city article details

Title A Secure And Lightweight Rfid-Enabled Protocol For Iot Healthcare Environment: A Vector Space Based Approach
ID_Doc 4460
Authors Shariq M.; Singh K.
Year 2022
Published Wireless Personal Communications, 127, 4
DOI http://dx.doi.org/10.1007/s11277-022-09928-z
Abstract Over some past decades, the data related to traditional medical privacy and many other similar cases are at serious risk of disclosure by a third party or an adversary. The risk of personal medical privacy data leakage by some insurance companies can disrupt the healthy environment of medical health industries as well as compromise the privacy of individuals. With the rapid evolution of Machine-to-Machine and Device-to-Device communication making our lives convenient, there has been an tremendous growth in the utilization of numerous Internet of Things (IoT) applications such as smart infrastructure, smart e-healthcare, smart cities, smart grid, smart governance, smart education, and many others. Nowadays, Radio Frequency IDentification (RFID)-enabled system is getting popular for privacy protection in healthcare systems, where RFID tags play a vital role in healthcare. Although, an adversary may tamper with the information of an RFID tag, compromise privacy along with increase forgery cases. To solve such issues, we propose an RFID-enabled authentication protocol for IoT healthcare environment based on a vector space approach to guarantee security in the healthcare system. We present a formal security analysis for the validation of our proposed protocol using BAN inference rules. The security analysis has been done to meet various security requirements such as tag location privacy, untraceability of the RFID tags, and tag anonymity. The performance security demonstrates that our protocol performs better in terms of computation and communication cost on comparing with other existing protocols. © 2022, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.
Author Keywords Anonymity; Authentication; Healthcare; RFID; Security; Untraceability


Similar Articles


Id Similarity Authors Title Published
16768 View0.945Ghosh H.; Maurya P.K.; Bagchi S.Cryptanalysis Of An Rfid-Enabled Authentication Protocol For HealthcareWireless Personal Communications, 138, 4 (2024)
28852 View0.865Adil M.; Khan M.K.; Kumar N.; Attique M.; Farouk A.; Guizani M.; Jin Z.Healthcare Internet Of Things: Security Threats, Challenges, And Future Research DirectionsIEEE Internet of Things Journal, 11, 11 (2024)
47600 View0.862Nurkifli E.H.; Hwang T.Secure Authentication In An Iot-Based Healthcare Environment With Strong Anonymity And Unclonable DeviceProceedings - 2023 6th International Conference on Computer and Informatics Engineering: AI Trust, Risk and Security Management (AI Trism), IC2IE 2023 (2023)
16930 View0.859Somnathe A.T.; Gopinath N.; Deena G.; Anandh R.; Kumar S.; Tiwari K.S.Cyber Security Challenges And Effective Security Measures For Iot-Based Intelligent Healthcare SystemsRecent Advances in Electrical and Electronic Engineering, 18, 6 (2025)
5246 View0.853Chauhan N.; Dwivedi R.K.A Survey On Designing A Secure Smart Healthcare System With BlockchainLecture Notes on Data Engineering and Communications Technologies, 126 (2022)
4451 View0.853Khan N.; Zhang J.; Mallah G.A.; Chaudhry S.A.A Secure And Efficient Information Authentication Scheme For E-Healthcare SystemComputers, Materials and Continua, 76, 3 (2023)