An intelligent RFID-enabled authentication scheme for healthcare applications in vehicular mobile cloud

N. Kumar, Kuljeet Kaur, Subhas C. Misra, Rahat Iqbal

Research output: Contribution to journalArticle

35 Citations (Scopus)

Abstract

Recently, vehicular cloud computing (VCC) has emerged as the one of the fast growing technologies with an aim to provide uninterrupted services to the moving clients even on-the-fly. One of the services provided by VCC is the mobile healthcare in which patient can be provided diagonosis from anywhere during their mobility. This paper proposes an intelligent RFID-enabled authentication scheme for healthcare applications in VCC environment. In the proposed scheme, a Petri Nets-based authentication model is used for authentication of tags, and readers. Both server, and tag authentications are protected by strong elliptical curve cryptography (ECC)-based key generation mechanism. The proposed scheme is found to be secure with respect to mutual authentication of servers and tags, replay attack, tracking attack, users anonymity, eavesdropping, and cloning with forward secrecy. To evaluate the effectiveness of the proposed scheme, it is evaluated with respect to the overhead generated, computation complexity, and % service delivery, where its performance is found better than the case where it is not applied.
Original languageEnglish
JournalPeer-to-Peer Networking and Applications
VolumeIn press
DOIs
Publication statusPublished - 2015

Fingerprint

Radio frequency identification (RFID)
Authentication
Cloud computing
Servers
Cloning
Petri nets
Cryptography

Bibliographical note

This article is in press. Full citation details will be given when the article has been published in print.

Keywords

  • Communications Engineering
  • Networks
  • Information Systems and Communication Service
  • Computer Communication Networks
  • Signal
  • Image and Speech Processing

Cite this

An intelligent RFID-enabled authentication scheme for healthcare applications in vehicular mobile cloud. / Kumar, N.; Kaur, Kuljeet; Misra, Subhas C.; Iqbal, Rahat.

In: Peer-to-Peer Networking and Applications, Vol. In press, 2015.

Research output: Contribution to journalArticle

@article{f03a2ed8766e40f5a3a46f88b4f9cfb0,
title = "An intelligent RFID-enabled authentication scheme for healthcare applications in vehicular mobile cloud",
abstract = "Recently, vehicular cloud computing (VCC) has emerged as the one of the fast growing technologies with an aim to provide uninterrupted services to the moving clients even on-the-fly. One of the services provided by VCC is the mobile healthcare in which patient can be provided diagonosis from anywhere during their mobility. This paper proposes an intelligent RFID-enabled authentication scheme for healthcare applications in VCC environment. In the proposed scheme, a Petri Nets-based authentication model is used for authentication of tags, and readers. Both server, and tag authentications are protected by strong elliptical curve cryptography (ECC)-based key generation mechanism. The proposed scheme is found to be secure with respect to mutual authentication of servers and tags, replay attack, tracking attack, users anonymity, eavesdropping, and cloning with forward secrecy. To evaluate the effectiveness of the proposed scheme, it is evaluated with respect to the overhead generated, computation complexity, and {\%} service delivery, where its performance is found better than the case where it is not applied.",
keywords = "Communications Engineering, Networks, Information Systems and Communication Service, Computer Communication Networks, Signal, Image and Speech Processing",
author = "N. Kumar and Kuljeet Kaur and Misra, {Subhas C.} and Rahat Iqbal",
note = "This article is in press. Full citation details will be given when the article has been published in print.",
year = "2015",
doi = "10.1007/s12083-015-0332-4",
language = "English",
volume = "In press",
journal = "Peer-to-Peer Networking and Applications",
issn = "1936-6442",
publisher = "Springer Verlag",

}

TY - JOUR

T1 - An intelligent RFID-enabled authentication scheme for healthcare applications in vehicular mobile cloud

AU - Kumar, N.

AU - Kaur, Kuljeet

AU - Misra, Subhas C.

AU - Iqbal, Rahat

N1 - This article is in press. Full citation details will be given when the article has been published in print.

PY - 2015

Y1 - 2015

N2 - Recently, vehicular cloud computing (VCC) has emerged as the one of the fast growing technologies with an aim to provide uninterrupted services to the moving clients even on-the-fly. One of the services provided by VCC is the mobile healthcare in which patient can be provided diagonosis from anywhere during their mobility. This paper proposes an intelligent RFID-enabled authentication scheme for healthcare applications in VCC environment. In the proposed scheme, a Petri Nets-based authentication model is used for authentication of tags, and readers. Both server, and tag authentications are protected by strong elliptical curve cryptography (ECC)-based key generation mechanism. The proposed scheme is found to be secure with respect to mutual authentication of servers and tags, replay attack, tracking attack, users anonymity, eavesdropping, and cloning with forward secrecy. To evaluate the effectiveness of the proposed scheme, it is evaluated with respect to the overhead generated, computation complexity, and % service delivery, where its performance is found better than the case where it is not applied.

AB - Recently, vehicular cloud computing (VCC) has emerged as the one of the fast growing technologies with an aim to provide uninterrupted services to the moving clients even on-the-fly. One of the services provided by VCC is the mobile healthcare in which patient can be provided diagonosis from anywhere during their mobility. This paper proposes an intelligent RFID-enabled authentication scheme for healthcare applications in VCC environment. In the proposed scheme, a Petri Nets-based authentication model is used for authentication of tags, and readers. Both server, and tag authentications are protected by strong elliptical curve cryptography (ECC)-based key generation mechanism. The proposed scheme is found to be secure with respect to mutual authentication of servers and tags, replay attack, tracking attack, users anonymity, eavesdropping, and cloning with forward secrecy. To evaluate the effectiveness of the proposed scheme, it is evaluated with respect to the overhead generated, computation complexity, and % service delivery, where its performance is found better than the case where it is not applied.

KW - Communications Engineering

KW - Networks

KW - Information Systems and Communication Service

KW - Computer Communication Networks

KW - Signal

KW - Image and Speech Processing

U2 - 10.1007/s12083-015-0332-4

DO - 10.1007/s12083-015-0332-4

M3 - Article

VL - In press

JO - Peer-to-Peer Networking and Applications

JF - Peer-to-Peer Networking and Applications

SN - 1936-6442

ER -