2014
DOI: 10.1007/s10916-014-0066-5
|View full text |Cite
|
Sign up to set email alerts
|

Modifying the ECC-Based Grouping-Proof RFID System to Increase Inpatient Medication Safety

Abstract: RFID technology is increasingly used in applications that require tracking, identification, and authentication. It attaches RFID-readable tags to objects for identification and execution of specific RFID-enabled applications. Recently, research has focused on the use of grouping-proofs for preserving privacy in RFID applications, wherein a proof of two or more tags must be simultaneously scanned. In 2010, a privacy-preserving grouping proof protocol for RFID based on ECC in public-key cryptosystem was proposed… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
9
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 12 publications
(9 citation statements)
references
References 16 publications
0
9
0
Order By: Relevance
“…In the proposed protocol, the type of anti‐collision algorithm is not discussed, and it is assumed that the reader can control the received messages from the tags with the minimum collision. In addition, because the reader assigns a short time duration to each tag, the run‐time of the proposed protocol is shorter than sequential and non‐scalable protocols, for example, and . For instance, in , once the reader sends its messages to the first tag, it must wait until it receives a response from the tag first before it can send a message to the next tag and so forth.…”
Section: The Comparison With Other Protocolsmentioning
confidence: 99%
See 2 more Smart Citations
“…In the proposed protocol, the type of anti‐collision algorithm is not discussed, and it is assumed that the reader can control the received messages from the tags with the minimum collision. In addition, because the reader assigns a short time duration to each tag, the run‐time of the proposed protocol is shorter than sequential and non‐scalable protocols, for example, and . For instance, in , once the reader sends its messages to the first tag, it must wait until it receives a response from the tag first before it can send a message to the next tag and so forth.…”
Section: The Comparison With Other Protocolsmentioning
confidence: 99%
“…Another group of researchers tried to increase the security level based on one‐way or two‐way cryptography methods such as hash functions, elliptic curve cryptography (ECC), stream ciphers, and block ciphers, for example, . For instance, Ko et al .…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…In Section 4, security analysis of Chen and Chong's protocol is discussed. 22 Elliptic Curves Cryptorgraphy is an asymmetric encryption method and has a suitable security level, but it requires roughly 10 K gates to be implemented on a tag and is not appropriate for low-power devices with resource limitations. In Section 7, we compare the improved protocol with other protocols.…”
Section: Introductionmentioning
confidence: 99%
“…[18][19][20][21] For instance, Ko et al proposed an Elliptic Curves Cryptorgraphy-based grouping proof to increase inpatient medication safety. 22 Elliptic Curves Cryptorgraphy is an asymmetric encryption method and has a suitable security level, but it requires roughly 10 K gates to be implemented on a tag and is not appropriate for low-power devices with resource limitations. 23 Sundaresan et al have been presented a lightweight protocol conforming to EPC C1-G2 standard.…”
Section: Introductionmentioning
confidence: 99%