A hash based mutual RFID tag authentication protocol in telecare medicine information system.

J Med Syst

Department of Applied Mathematics, CIPET, Lucknow, UP, India,

Published: January 2015

Radio Frequency Identification (RFID) is a technology which has multidimensional applications to reduce the complexity of today life. Everywhere, like access control, transportation, real-time inventory, asset management and automated payment systems etc., RFID has its enormous use. Recently, this technology is opening its wings in healthcare environments, where potential applications include patient monitoring, object traceability and drug administration systems etc. In this paper, we propose a secure RFID-based protocol for the medical sector. This protocol is based on hash operation with synchronized secret. The protocol is safe against active and passive attacks such as forgery, traceability, replay and de-synchronization attack.

Download full-text PDF

Source
http://dx.doi.org/10.1007/s10916-014-0153-7DOI Listing

Publication Analysis

Top Keywords

hash based
4
based mutual
4
mutual rfid
4
rfid tag
4
tag authentication
4
protocol
4
authentication protocol
4
protocol telecare
4
telecare medicine
4
medicine system
4

Similar Publications

Hippocampal circuits in the brain enable two distinct cognitive functions: the construction of spatial maps for navigation, and the storage of sequential episodic memories. Although there have been advances in modelling spatial representations in the hippocampus, we lack good models of its role in episodic memory. Here we present a neocortical-entorhinal-hippocampal network model that implements a high-capacity general associative memory, spatial memory and episodic memory.

View Article and Find Full Text PDF

Secure IoT data dissemination with blockchain and transfer learning techniques.

Sci Rep

January 2025

Torrens University Australia, Fortitude Valley, QLD 4006, Leaders Institute, 76 Park Road, Woolloongabba, QLD 4102, Brisbane, Queensland, Australia.

Article Synopsis
  • Streaming IoT data is crucial for building trust in sustainable IoT solutions, but current systems often face issues with reliability, security, and transparency due to their centralized structures.
  • The research introduces TraVel, a framework that uses blockchain and transfer learning to improve the security of IoT data management, utilizing decentralized IPFS for data storage and a private Ethereum blockchain for enhanced data integrity.
  • TraVel implements self-executing smart contracts for access control and uses an adversarial domain adaptation model to filter out malicious data, ensuring only validated data is stored, with successful performance shown in simulations.
View Article and Find Full Text PDF

With the rapid development of the Internet of Things (IoT), the scope of personal data sharing has significantly increased, enhancing convenience in daily life and optimizing resource management. However, this also poses challenges related to data privacy breaches and holdership threats. Typically, blockchain technology and cloud storage provide effective solutions.

View Article and Find Full Text PDF

The major task of a wireless sensor network (WSN) is data collection. Key predistribution (KP) is to establish pairwise keys for secure communication in a WSN, such that all collected data could be securely sent to a backend database. Most research on KP-like schemes is dedicated to enhancing resiliency against node capture attack (NA) and retaining the link connectivity in the meantime.

View Article and Find Full Text PDF

Quantum-resilient software security: A fuzzy AHP-based assessment framework in the era of quantum computing.

PLoS One

January 2025

Cybersecurity Department, College of Computers, Umm Al-Qura University, Makkah City, Kingdom of Saudi Arabia.

The introduction of quantum computing has transformed the setting of information technology, bringing both unprecedented opportunities and significant challenges. As quantum technologies continue to evolve, addressing their implications for software security has become an essential area of research. This paradigm change provides an unprecedented chance to strengthen software security from the start, presenting a plethora of novel alternatives.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!