2023
DOI: 10.3390/s23125518
|View full text |Cite
|
Sign up to set email alerts
|

Enhancing Security and Privacy in Healthcare Systems Using a Lightweight RFID Protocol

Abstract: Exploiting Radio Frequency Identification (RFID) technology in healthcare systems has become a common practice, as it ensures better patient care and safety. However, these systems are prone to security vulnerabilities that can jeopardize patient privacy and the secure management of patient credentials. This paper aims to advance state-of-the-art approaches by developing more secure and private RFID-based healthcare systems. More specifically, we propose a lightweight RFID protocol that safeguards patients’ pr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(8 citation statements)
references
References 28 publications
0
8
0
Order By: Relevance
“…• This paper illustrates a secret disclosure attack against two recent authentication protocols, i.e. Sharigh et al [7] protocol (URASP) and Khan et al [8] protocol (KUAJB from now). • This paper addresses [7]'s authentication protocol security flaw and suggests a new authentication protocol.…”
Section: A Our Contributionsmentioning
confidence: 99%
See 3 more Smart Citations
“…• This paper illustrates a secret disclosure attack against two recent authentication protocols, i.e. Sharigh et al [7] protocol (URASP) and Khan et al [8] protocol (KUAJB from now). • This paper addresses [7]'s authentication protocol security flaw and suggests a new authentication protocol.…”
Section: A Our Contributionsmentioning
confidence: 99%
“…It shows that this protocol is a target for conditional traceability. Khan et al [8] recently proposed a protocol to solve the anonymity and traceability difficulties in existing ultra-lightweight protocols. This protocol which we call it KUAJB (the first letters of the designers' last name) benefits from Cross Operation called Cro(x, y) as the source of non-linearity, which has been already introduced in [40].…”
Section: Computermentioning
confidence: 99%
See 2 more Smart Citations
“…Among the security challenges in IoT, ensuring data privacy, authentication, authorization, and access control are critical [ 7 , 8 ]. Authentication, a fundamental security requirement, is especially challenging in smart home environments due to the resource-constrained nature of the devices [ 9 , 10 ].…”
Section: Introductionmentioning
confidence: 99%