Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
. 2020 Aug 27;20(17):4846.
doi: 10.3390/s20174846.

A Novel Lightweight Authentication Scheme for RFID-Based Healthcare Systems

Affiliations

A Novel Lightweight Authentication Scheme for RFID-Based Healthcare Systems

Feng Zhu et al. Sensors (Basel). .

Abstract

The Internet of Things (IoT) has been integrated into legacy healthcare systems for the purpose of improving healthcare processes. As one of the key technologies of IoT, radio frequency identification (RFID) technology has been applied to offer services like patient monitoring, drug administration, and medical asset tracking. However, people have concerns about the security and privacy of RFID-based healthcare systems, which require a proper solution. To solve the problem, recently in 2019, Fan et al. proposed a lightweight RFID authentication scheme in the IEEE Network. They claimed that their scheme can resist various attacks in RFID systems with low implementation cost, and thus is suitable for RFID-based healthcare systems. In this article, our contributions mainly consist of two parts. First, we analyze the security of Fan et al.'s scheme and find out its security vulnerabilities. Second, we propose a novel lightweight authentication scheme to overcome these security weaknesses. The security analysis shows that our scheme can satisfy the necessary security requirements. Besides, the performance evaluation demonstrates that our scheme is of low cost. Thus, our scheme is well-suited for practical RFID-based healthcare systems.

Keywords: authentication; healthcare systems; lightweight; radio frequency identification; security.

PubMed Disclaimer

Conflict of interest statement

The authors declare no conflict of interest.

Figures

Figure 1
Figure 1
A typical radio frequency identification (RFID)-based healthcare system.
Figure 2
Figure 2
Tags’ index data table in Fan et al.’s scheme.
Figure 3
Figure 3
Readers’ index data table in Fan et al.’s scheme.
Figure 4
Figure 4
Authentication and update phases of Fan et al.’s scheme.
Figure 5
Figure 5
Tags’ index data table in our proposed scheme.
Figure 6
Figure 6
Readers’ index data table in our proposed scheme.
Figure 7
Figure 7
Authentication phase of our improved scheme.

Similar articles

Cited by

References

    1. Chen D., Zhang N., Qin Z., Mao X., Qin Z., Shen X., Li X.Y. S2M: A Lightweight Acoustic Fingerprints-based Wireless Device Authentication Protocol. IEEE Internet Things J. 2016;4:88–100. doi: 10.1109/JIOT.2016.2619679. - DOI
    1. Granjal J., Monteiro E., Silva J.S. Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues. IEEE Commun. Surv. Tutor. 2015;17:1294–1312. doi: 10.1109/COMST.2015.2388550. - DOI
    1. Atzori L., Iera A., Morabito G. The Internet of Things: A Survey. Comput. Netw. 2010;54:2787–2805. doi: 10.1016/j.comnet.2010.05.010. - DOI
    1. Fan K., Gong Y., Liang C., Li H., Yang Y. Lightweight and Ultralightweight RFID Mutual Authentication Protocol with Cache in the Reader for IoT in 5G. Secur. Commun. Netw. 2016;9:3095–3104. doi: 10.1002/sec.1314. - DOI
    1. Juels A. RFID Security and Privacy: A Research Survey. IEEE J. Sel. Areas Commun. 2006;24:381–394. doi: 10.1109/JSAC.2005.861395. - DOI