2018
DOI: 10.1109/tii.2018.2794996
|View full text |Cite
|
Sign up to set email alerts
|

Lightweight RFID Protocol for Medical Privacy Protection in IoT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
145
0
4

Year Published

2019
2019
2021
2021

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 162 publications
(149 citation statements)
references
References 29 publications
0
145
0
4
Order By: Relevance
“…Unfortunately, Benssalah et al’s protocol is still vulnerable to traceability and desynchronization attacks [ 27 ]. In 2018, Fan et al [ 10 ] proposed an ultralightweight RFID authentication protocol, named LRMI, to protect medical privacy in IoT, using cross and rotation functions for authentication. Nevertheless, in 2019, Aghili et al [ 28 ] analyzed the LRMI protocol and found that it cannot withstand traceability and impersonation attacks.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Unfortunately, Benssalah et al’s protocol is still vulnerable to traceability and desynchronization attacks [ 27 ]. In 2018, Fan et al [ 10 ] proposed an ultralightweight RFID authentication protocol, named LRMI, to protect medical privacy in IoT, using cross and rotation functions for authentication. Nevertheless, in 2019, Aghili et al [ 28 ] analyzed the LRMI protocol and found that it cannot withstand traceability and impersonation attacks.…”
Section: Related Workmentioning
confidence: 99%
“…Researchers, who proposed the authentication schemes [ 10 , 14 , 25 , 26 , 27 , 28 , 31 ] for RFID-based healthcare systems in recent years, have a consensus that both the tag-to-reader channel and the reader-to-server channel are insecure so their security should be considered in the authentication schemes. Thus, we assume that an adversary can control both communication channels.…”
Section: Preliminarymentioning
confidence: 99%
See 1 more Smart Citation
“…Therefore, this protocol is not suitable for RFID systems. Fan et al [40] presented a lightweight RFID security protocol for medical privacy and claimed that it satisfies secure authentication and confidentiality. This scheme utilized only XOR operation, hash computation, displacement operation, and cross operation.…”
Section: Related Workmentioning
confidence: 99%
“…Α lightweight RFID medical privacy protection scheme is proposed in [23]. Its authors claim that it requires low computing resources and give extensive proofs regarding its ability to satisfy the security requirements of anonymity, replay attack resistance, synchronisation, forward security, and mutual authentication as well as nondenial of service.…”
Section: Related Workmentioning
confidence: 99%