2017
DOI: 10.1155/2017/2367312
|View full text |Cite
|
Sign up to set email alerts
|

An Advanced Encryption Standard Powered Mutual Authentication Protocol Based on Elliptic Curve Cryptography for RFID, Proven on WISP

Abstract: Information in patients’ medical histories is subject to various security and privacy concerns. Meanwhile, any modification or error in a patient’s medical data may cause serious or even fatal harm. To protect and transfer this valuable and sensitive information in a secure manner, radio-frequency identification (RFID) technology has been widely adopted in healthcare systems and is being deployed in many hospitals. In this paper, we propose a mutual authentication protocol for RFID tags based on elliptic curve… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
17
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
8
1

Relationship

1
8

Authors

Journals

citations
Cited by 19 publications
(19 citation statements)
references
References 33 publications
(55 reference statements)
0
17
0
Order By: Relevance
“…Fully fledged protocols are defined as protocols supporting both symmetric and asymmetric operations and thus are the focus of this work. From the fully fledged protocols, EC-based operations are the most efficient ones and in particular [15][16][17][18] are analysed in their survey. Each of these schemes has also compared their strength and efficiency with other schemes in literature.…”
Section: Related Workmentioning
confidence: 99%
“…Fully fledged protocols are defined as protocols supporting both symmetric and asymmetric operations and thus are the focus of this work. From the fully fledged protocols, EC-based operations are the most efficient ones and in particular [15][16][17][18] are analysed in their survey. Each of these schemes has also compared their strength and efficiency with other schemes in literature.…”
Section: Related Workmentioning
confidence: 99%
“…İbrahim and Dalkılıç [25] proposed a new mutual authentication protocol based on AES and elliptic curve cryptography (ECC) in the area of healthcare systems. The protocol was designed and implemented on WISP passive RFID tag.…”
Section: Related Workmentioning
confidence: 99%
“…Ibrahim and Dalkılıç focused on the security of healthcare systems, and especially authentication protocols, in their article [16]. They developed a new mutual authentication protocol using elliptic curve cryptography and the advanced encryption standard (AES) for RFID tags.…”
Section: Related Workmentioning
confidence: 99%
“…Test 1: The probability of a 16-bit random number selected from the generated sequence of the PRNG must be bounded by 0.8/2 16 This requirement is basically a 16-bit entropy calculation. Since the generated PRNG outputs are 64-bit numbers, they are divided into four parts to calculate the frequency.…”
Section: Epcgen2 Randomness Requirementsmentioning
confidence: 99%