Abstract

In the milieu of IOT, the entities in our habitual ex-istence have turned to be a component of the Inter-net due to their excelling communication and com-puting competencies that let them to correspond with another object. Progression in ICT i.e. Infor-mation and communication technologies, has es-corted to the surfacing of IoT. The application of IoT technologies fetches expediency to doctors and patients in Healthcare environment as they can be concerned to numerous fields of medicine. Radio-frequency Identification Devices (RFID) is the ma-jorly famous wireless communication technologies applied in the field of IoT as they could amass in-sightful data, used for wireless communication with another object, and locate and follow specific enti-ties without human interventions. In order to pro-vide enhanced security and performance to RFID authentication scheme Elliptic Curve Cryptography is being applied. An RFID has 3 entities: RFID tag, reader and server. Since the channel of communication amid the RFID tag and RFID reader is unsafe since the data exchange takes place wirelessly and adversary could snare the data easily. Thus to pro-tect RFID tag data we are using data perturbation which is a form of privacy safeguarding data mining for electronic health information’s. Inside this paper, we confer the requirements of security for RFID authentication schemes with a comparative study on RSA, and in precise, we put forward an appraisal of ECC-based RFID authentication methods on the basis of security and performance..

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call