A Novel Security Authentication Protocol Based on Physical Unclonable Function for RFID Healthcare Systems

The Radio Frequency Identification (RFID) technology has been integrated into healthcare systems for the purpose of improving healthcare management. However, people have concerns about the security and privacy of this kind of RFID systems. In order to solve the security problems faced by RFID-based healthcare systems, a novel security authentication protocol based on Physical Unclonable Function (PUF) and Advanced Encryption Standard (AES) encryption algorithm is designed. The protocol uses PUF technology to output unique and random responses to different excitation inputs, encrypts the authentication information sent by the tag, and uses the AES encryption algorithm to encrypt the authentication information between the cloud database and the reader. At the same time, in the authentication process, once the communicating entity completes the identity authentication of the other two entities, it immediately starts to update the key. The security analysis and formal analysis of BAN (proposed by Burrows et al.) logic prove the security and correctness of the protocol. Analysis results show that the computation cost and security performance of the proposed protocol are better than the compared protocols. Our findings will contribute to further enhancing the security for RFID healthcare systems.

[1]  Jue-Sam Chou An efficient mutual authentication RFID scheme based on elliptic curve cryptography , 2013, The Journal of Supercomputing.

[2]  Subhas C. Misra,et al.  An intelligent RFID-enabled authentication scheme for healthcare applications in vehicular mobile cloud , 2016, Peer-to-Peer Netw. Appl..

[3]  Xiaojun Zhang,et al.  A Secure ECC-based RFID Mutual Authentication Protocol to Enhance Patient Medication Safety , 2015, Journal of Medical Systems.

[4]  Johanna Virkki,et al.  Clothing-Integrated Passive RFID Strain Sensor Platform for Body Movement-Based Controlling , 2019, 2019 IEEE International Conference on RFID Technology and Applications (RFID-TA).

[5]  Musheer Ahmad,et al.  A secure elliptic curve cryptography based mutual authentication protocol for cloud-assisted TMIS , 2019, Telematics Informatics.

[6]  Arun Kumar Sangaiah,et al.  Blockchain-Enabled Distributed Security Framework for Next-Generation IoT: An Edge Cloud and Software-Defined Network-Integrated Approach , 2020, IEEE Internet of Things Journal.

[7]  Zhenguo Zhao,et al.  A Secure RFID Authentication Protocol for Healthcare Environments Using Elliptic Curve Cryptosystem , 2014, Journal of Medical Systems.

[8]  Carlos Dafonte,et al.  Traceability in Patient Healthcare through the Integration of RFID Technology in an ICU in a Hospital , 2018, Sensors.

[9]  Martín Abadi,et al.  A logic of authentication , 1990, TOCS.

[10]  M. Shamim Hossain,et al.  Enforcing Position-Based Confidentiality With Machine Learning Paradigm Through Mobile Edge Computing in Real-Time Industrial Informatics , 2019, IEEE Transactions on Industrial Informatics.

[11]  Leonid Bolotnyy,et al.  Physically Unclonable Function-Based Security and Privacy in RFID Systems , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom'07).

[12]  Magdy Bayoumi,et al.  A highly reliable dual-arbiter PUF for lightweight authentication protocols , 2017, 2017 IEEE International Conference on RFID Technology & Application (RFID-TA).

[13]  Chih-Ming Hsiao,et al.  A Secure ECC-Based RFID Authentication Scheme Using Hybrid Protocols , 2013 .

[14]  Dariush Abbasinezhad-Mood,et al.  Efficient Design of a Novel ECC-Based Public Key Scheme for Medical Data Protection by Utilization of NanoPi Fire , 2018, IEEE Transactions on Reliability.

[15]  Guoai Xu,et al.  A Robust Mutual Authentication Scheme Based on Elliptic Curve Cryptography for Telecare Medical Information Systems , 2018, IEEE Access.

[16]  Quang Vinh Nguyen,et al.  RFID Systems in Healthcare Settings and Activity of Daily Living in Smart Homes: A Review , 2017 .

[17]  Zezhong Zhang,et al.  An Efficient RFID Authentication Protocol to Enhance Patient Medication Safety Using Elliptic Curve Cryptography , 2014, Journal of Medical Systems.

[18]  Magdy Bayoumi,et al.  Lightweight highly secure PUF protocol for mutual authentication and secret message exchange , 2017, 2017 IEEE International Conference on RFID Technology & Application (RFID-TA).

[19]  Muhammad Khurram Khan,et al.  A Provably Secure RFID Authentication Protocol Based on Elliptic Curve for Healthcare Environments , 2016, Journal of Medical Systems.

[20]  Moutaz Haddara,et al.  RFID Applications and Adoptions in Healthcare: A Review on Patient Safety , 2018, Procedia Computer Science.

[21]  Kai Fan,et al.  A Lightweight Authentication Scheme for Cloud-Based RFID Healthcare Systems , 2019, IEEE Network.

[22]  Swapnoneel Roy,et al.  Security Analysis of ECC Based Authentication Protocols , 2015, 2015 International Conference on Computational Intelligence and Communication Networks (CICN).

[23]  Chih-Ming Hsiao,et al.  A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol , 2014, Ad Hoc Networks.

[24]  Pedro Peris-López,et al.  LMAP : A Real Lightweight Mutual Authentication Protocol for Low-cost RFID tags , 2006 .

[25]  Chen Zhang,et al.  Cloud-based RFID authentication , 2013, 2013 IEEE International Conference on RFID (RFID).

[26]  Mou Dasgupta,et al.  An elliptic curve cryptography based enhanced anonymous authentication protocol for wearable health monitoring systems , 2019, International Journal of Information Security.

[27]  Xiaojun Zhang,et al.  A Secure RFID Mutual Authentication Protocol for Healthcare Environments Using Elliptic Curve Cryptography , 2015, Journal of Medical Systems.

[28]  Sarfraz Fayaz Khan,et al.  Health care monitoring system in Internet of Things (IoT) by using RFID , 2017, 2017 6th International Conference on Industrial Technology and Management (ICITM).

[29]  Ethiopia Nigussie,et al.  An Elliptic Curve-based Mutual Authentication Scheme for RFID Implant Systems , 2014, ANT/SEIT.

[30]  Zhou Shijie,et al.  Survey of Privacy of Radio Frequency Identification Technology , 2015 .

[31]  Wrya Monnet,et al.  Smart patient management, monitoring and tracking system using radio-frequency identification (RFID) technology , 2016, 2016 IEEE EMBS Conference on Biomedical Engineering and Sciences (IECBES).

[32]  M. Shamim Hossain,et al.  Energy-Aware Green Adversary Model for Cyberphysical Security in Industrial System , 2020, IEEE Transactions on Industrial Informatics.

[33]  Amit K. Awasthi,et al.  Privacy Model for Threshold RFID System Based on PUF , 2017, Wirel. Pers. Commun..