{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T18:28:17Z","timestamp":1772303297477,"version":"3.50.1"},"reference-count":23,"publisher":"SAGE Publications","issue":"12","license":[{"start":{"date-parts":[[2015,12,1]],"date-time":"2015-12-01T00:00:00Z","timestamp":1448928000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"funder":[{"DOI":"10.13039\/501100001868","name":"National Science Council","doi-asserted-by":"publisher","award":["MOST 103-2221-E-260-022"],"award-info":[{"award-number":["MOST 103-2221-E-260-022"]}],"id":[{"id":"10.13039\/501100001868","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2015,12,1]]},"abstract":"<jats:p> Mobile healthcare (M-health) systems can monitor the patients\u2019 conditions remotely and provide the patients and doctors with access to electronic medical records, and Radio Frequency Identification (RFID) technology plays an important role in M-health services. It is important to securely access RFID data in M-health systems: here, authentication, privacy, anonymity, and tracking resistance are desirable security properties. In 2014, He et al. proposed an elliptic curve cryptography- (ECC-) based RFID authentication protocol which is quite attractive to M-health applications, owing to its claimed performance of security, scalability, and efficiency. Unfortunately, we find their scheme fails to achieve the privacy protection if an adversary launches active tracking attacks. In this paper, we demonstrate our active attack on He et al.'s scheme and propose a new scheme to improve the security. Performance evaluation shows the improved scheme could meet the challenges of M-health applications. <\/jats:p>","DOI":"10.1155\/2015\/642425","type":"journal-article","created":{"date-parts":[[2015,12,24]],"date-time":"2015-12-24T21:34:47Z","timestamp":1450992887000},"page":"642425","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":32,"title":["An Elliptic Curve Cryptography-Based RFID Authentication Securing E-Health System"],"prefix":"10.1177","volume":"11","author":[{"given":"Chin-I","family":"Lee","sequence":"first","affiliation":[{"name":"Department of Information Management, Ling Tung University, No. 1, Ling Tung Road, Taichung 408, Taiwan"}]},{"given":"Hung-Yu","family":"Chien","sequence":"additional","affiliation":[{"name":"Department of Information Management, National Chi Nan University, No. 1, University Road, Puli, Nantou 545, Taiwan"}]}],"member":"179","published-online":{"date-parts":[[2015,12,24]]},"reference":[{"key":"B1-2015-642425","first-page":"102","volume-title":"Proceedings of the 1st International Workshop on Privacy in Location-Based Applications","author":"Sadeghi A.-R."},{"key":"B2-2015-642425","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-011-9753-7"},{"key":"B3-2015-642425","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2008.04.016"},{"key":"B4-2015-642425","doi-asserted-by":"publisher","DOI":"10.2307\/2007884"},{"key":"B5-2015-642425","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39799-X_31"},{"key":"B6-2015-642425","doi-asserted-by":"publisher","DOI":"10.1109\/RFID.2008.4519370"},{"key":"B7-2015-642425","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89641-8_11"},{"key":"B9-2015-642425","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2013.02.004"},{"key":"B10-2015-642425","volume-title":"Attack on Liao and Hsiao's Secure ECC-based RFID Authentication Scheme Integrated with ID-Verifier Transfer Protocol","author":"Peeters R.","year":"2013"},{"key":"B11-2015-642425","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-014-0016-2"},{"key":"B12-2015-642425","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-014-0136-8"},{"key":"B13-2015-642425","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-014-0116-z"},{"key":"B15-2015-642425","doi-asserted-by":"publisher","DOI":"10.1109\/18.259647"},{"key":"B16-2015-642425","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2003.07.016"},{"key":"B17-2015-642425","doi-asserted-by":"publisher","DOI":"10.1007\/10722028_23"},{"key":"B18-2015-642425","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44647-8_13"},{"key":"B19-2015-642425","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45682-1_30"},{"key":"B20-2015-642425","first-page":"26","author":"Jurisic A.","year":"1997","journal-title":"Dr. Dobb's Journal"},{"key":"B21-2015-642425","doi-asserted-by":"publisher","DOI":"10.1016\/B978-155860914-3\/50002-X"},{"key":"B22-2015-642425","doi-asserted-by":"publisher","DOI":"10.1016\/s1389-1286(01)00302-4"},{"key":"B23-2015-642425","doi-asserted-by":"publisher","DOI":"10.1145\/332833.332838"},{"key":"B24-2015-642425","doi-asserted-by":"publisher","DOI":"10.1145\/565702.565708"},{"key":"B25-2015-642425","doi-asserted-by":"publisher","DOI":"10.1145\/502034.502049"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2015\/642425","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1155\/2015\/642425","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2015\/642425","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,7]],"date-time":"2021-05-07T13:46:38Z","timestamp":1620395198000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1155\/2015\/642425"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,12,1]]},"references-count":23,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2015,12,1]]}},"alternative-id":["10.1155\/2015\/642425"],"URL":"https:\/\/doi.org\/10.1155\/2015\/642425","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"value":"1550-1477","type":"print"},{"value":"1550-1477","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,12,1]]}}}