A Time Efficient RFID Mutual Authentication Protocol for HealthCare Environments Using Hyper Ellipti

Page 1

GRD Journals | Global Research and Development Journal for Engineering | International Conference on Innovations in Engineering and Technology (ICIET) - 2016 | July 2016

e-ISSN: 2455-5703

A Time Efficient RFID Mutual Authentication Protocol for HealthCare Environments using Hyper Elliptic curve Cryptosystem 1P.Gowsalya 2D.

Pravin Kumar PG Student Associate Professor 1,2 Department of Computer Science & Engineering 1,2 K.L.N College of Engineering Pottapalayam, Sivagangai 630612, India 1

2

Abstract RFID is a transformative technology in the healthcare industry. By applying RFID tags in healthcare environments, for locating and tracking of staff, equipments and patients made easy. However the potential security and running time of the systems are remains, challengeable in RFID system. In this thesis, a new design called mutual authentication protocol for RFID, based on Hyper elliptic curve cryptosystem was introduced. This methodology provides same level of security compared to the existing scheme with lower number of bits. The protocol can provide better efficiency, because it uses pre-computing method within tag’s communication. In terms of security, the protocol can achieve confidentiality, unforgetability, mutual authentication, tag’s anonymity, availability and forward security. The protocol can overcome the weakness of the existing protocols .It also reduce the computation cost and communication overhead. Keyword- Hyper elliptic curve, Mutual Authentication, Pre-Computing, Security, Running Time __________________________________________________________________________________________________

I. INTRODUCTION Internet of Things (IoT) has emerged as most powerful paradigms. It provides the unique identifiers to people and objects. That allows them to communicate with other objects without requiring human to human or human to computer interaction. Atzori et al (2010) Proposed in the IoT environment, all the objects in our daily life become part of the internet because of their communication and computing capabilities that allows them to communicate with other objects. IoT extends the concept of the Internet and makes it more pervasive. Weinstein (2005) proposed Radio-frequency identification (RFID) is one of the most important technologies used in the IoT, as it can store sensitive data, provides wireless communication with other objects, and to identify/track objects automatically. Compared to the traditional barcode, RFID could be applied to objects with rough surfaces, can do both read/write capability, requires no line-of-sight contact with RFID readers, and can read many RFID tags simultaneously. All these benefits make RFID a superior technology compared to the traditional barcode system.

II. LITERATURE REVIEW Jonathan et al (2014) proposed the enhancement of security in RFID using RSA algorithm. This algorithm is based on factoring large prime numbers. This system works on public and private key system. The public key is made available to everyone. A user can encrypt the data but cannot decrypt data it .The person who possess the private key can decrypt it .The advantage is to improve the data security. The drawback of this algorithm is to use large prime numbers and using RSA mathematical calculation becomes time consuming because of modular exponential. It increases the storage cost and computational time of the system. Pham et al (2012) proposed the mutual authentication protocol for passive tag which is based on cryptographic hash function and then implementing one way encryption using AES algorithm on RFID passive tags. This algorithm between the reader and the tag to satisfy the strict timing requirement and also prevent the DE synchronization between a reader and a tag. The advantage of this algorithm is to protect against the many types of attack such as information leakage, tag tracking etc. The drawback of the algorithm is to use permutation on each cycle. So AES algorithm is time consuming and increases the time complexity of the system. Ohkubo et al(2003) proposed the cryptographic approach to privacy friendly RFID tags. In this paper they use the symmetric key based authentication which prevents privacy protection scheme for RFID relying on low cost hash chain. The secret key of an RFID tag is renewed using one way hash function after the tag response to the readers query. They proposed a new security requirement is called backward untraceability, which prevents a tag to be identified in the past communication sessions. Even if an strong adversary compromise the tag and acquires the knowledge of the current secret key. It is impossible to reveal the past secret key and then identify the tag due to the property of hash chain. The drawback of the method is the protocol does not protect the system

All rights reserved by www.grdjournals.com

187


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.
A Time Efficient RFID Mutual Authentication Protocol for HealthCare Environments Using Hyper Ellipti by GRD Journals - Issuu