2020
DOI: 10.1186/s13635-020-00114-x
|View full text |Cite
|
Sign up to set email alerts
|

Scalable, efficient, and secure RFID with elliptic curve cryptosystem for Internet of Things in healthcare environment

Abstract: The rapid development of IoT technology has led to the usage of various devices in our daily life. Along with the ever-increasing rise of the Internet of Things, the use of appropriate methods for establishing secure communications in health care systems is vital. The adoption of high-security optimal mechanisms for this purpose has been more effective regarding the efficiency of medical information systems; hence, many studies are being conducted in this field today. One of the most important components is th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
15
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 24 publications
(15 citation statements)
references
References 51 publications
(90 reference statements)
0
15
0
Order By: Relevance
“…In IoT-based healthcare, studies on encryption and authentication protocols for user 8 Mobile Information Systems Figure 6: Keyword co-occurrence network obtained using VOSviewer. Mobile Information Systems authentication [120][121][122][123] and data encryption for patient privacy protection [124][125][126][127] are relevant. Safe and efficient medical data retrieval is important for remote medical monitoring.…”
Section: Keyword Clustering and Evolution Of Research On Iotmentioning
confidence: 99%
“…In IoT-based healthcare, studies on encryption and authentication protocols for user 8 Mobile Information Systems Figure 6: Keyword co-occurrence network obtained using VOSviewer. Mobile Information Systems authentication [120][121][122][123] and data encryption for patient privacy protection [124][125][126][127] are relevant. Safe and efficient medical data retrieval is important for remote medical monitoring.…”
Section: Keyword Clustering and Evolution Of Research On Iotmentioning
confidence: 99%
“…Subsequently, these tags cannot utilize the energy-demanding asymmetric algorithms such as the Rivest-Shamir-Adleman (RSA) algorithm. Consequently, the Elliptic-curve Cryptography (ECC) algorithms are employed in many RFID applications due to their advantages over the traditional asymmetric algorithms [15,16]. For example, ECC offers smaller key sizes as compared to the RSA for the same security, i.e., the security of 163-bit ECC is considered equivalent to 1024-bits RSA [11].…”
Section: Introductionmentioning
confidence: 99%
“…In addition, two types of coordinate systems, i.e., affine and projective, are involved. The latter is more frequently used to optimize the time required to perform one PM computation [16,18]. Additionally, two field representations, i.e., the prime (GF(P)) and binary (GF(2 m )), are available.…”
Section: Introductionmentioning
confidence: 99%
“…The applications that require software implementations are (i) OpenSSL protocols [6], (ii) bitcoin digital signatures [7], (iii) image encryption/ decryption [8,9], and many others. Similarly, the applications that require hardware implementations of ECC are (i) internet of things [10], (ii) radio frequency identification [11,12], (iii) teleoperated robotic systems [13], (iv) network servers [14], and several others. The applications highlighted in [10][11][12][13] require low-cost (or area optimized) implementations.…”
Section: Introductionmentioning
confidence: 99%
“…Similarly, the applications that require hardware implementations of ECC are (i) internet of things [10], (ii) radio frequency identification [11,12], (iii) teleoperated robotic systems [13], (iv) network servers [14], and several others. The applications highlighted in [10][11][12][13] require low-cost (or area optimized) implementations. On the other hand, high-speed implementations are required for network related applications where multiple devices want to communicate using a cloud platform.…”
Section: Introductionmentioning
confidence: 99%