Mutual Authentication Based on HECC for RFID Implant Systems
The Internet of Things (IoT) is an environment in which “things” (objects, animals or people) are provided with unique identifiers (IPv6 addresses) and the ability to communicate over a network without requiring human-to-human or human-to-computer interac
- PDF / 1,283,235 Bytes
- 12 Pages / 439.37 x 666.142 pts Page_size
- 2 Downloads / 224 Views
Mutual
1 Introduction Internet of Things (IoT) involves the concept of connecting everything around, to the internet. These things may include wearable devices, metering devices, environmental sensors etc. As a result of this, in the near future, there may be trillions of connected devices which may communicate with each other by exchanging data. This communication between devices is made possible via wireless networks. Wireless networks use radio communication frequencies and follows radio regulations. Hence, Radio Frequency Identification (RFID) is the key enabler of IoT. IoT along with RFID technology has many applications in smart home, healthcare system, inventory management etc.
© Springer Nature Singapore Pte Ltd. 2016 P. Mueller et al. (Eds.): SSCC 2016, CCIS 625, pp. 18–29, 2016. DOI: 10.1007/978-981-10-2738-3_2
Mutual Authentication Based on HECC for RFID Implant Systems
19
Providing health care was far simpler than it is today. But, advent of legislation, technology and reimbursement charges has forced the entire healthcare system to shift the way care is provided. However, there are opportunities to improve patient experience. Historically, physicians did not have access to a holistic view of the patients’ health so they were forced to make treatment decisions, with limited or partial data. Soon the trend shifted from this to Electronic Medical Records (EMR) by which it is possible to collect complete medical records of a patient. When data from such EMR systems and consumer wearables are merged, it is possible to organize and process data beyond typical clinical scenarios. At the same time, advances in technology provided new and low cost ways to detect diseases. When all these combine, the patients and physicians benefit from more comprehensive views of patient health and treatment progress enabling physicians to more accurately adjust treatments. Hospitals may not have the resources to monitor everyone and people with such resources cannot monitor themselves. Meanwhile, funding constraints depend on optimization solutions to effectively and efficiently distribute and manage equipment. So, facilities need to rely on pervasive technologies like passive RFID tags to supplement monitoring and management efforts. The RFID Implant System mentioned in the proposed work is a resource constrained system which has three main components – Implantable RFID tag which is a passive tag (almost the size of a rice grain) implanted into the patient’s body, RFID Reader which communicates with both the tag and the back-end server, and a Back-end server which stores the information about the patient. The communication channel between the reader and the back end server is secure. But, the wireless communication channel between the reader and the tag is found to be insecure and hence, may be vulnerable to attacks like unauthorized location tracking, eavesdropping attack, impersonation attack, replay attack etc. Hence, both the tag and the reader must be assured that the other end is legitimate. In the healthcare scena
Data Loading...