{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,24]],"date-time":"2025-10-24T08:25:45Z","timestamp":1761294345103,"version":"3.41.2"},"reference-count":35,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2021,7,23]],"date-time":"2021-07-23T00:00:00Z","timestamp":1626998400000},"content-version":"vor","delay-in-days":203,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100005374","name":"Nanjing University of Posts and Telecommunications","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100005374","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100010014","name":"Six Talent Peaks Project in Jiangsu Province","doi-asserted-by":"publisher","award":["RJFW-111"],"award-info":[{"award-number":["RJFW-111"]}],"id":[{"id":"10.13039\/501100010014","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61902196","61872194","61872196"],"award-info":[{"award-number":["61902196","61872194","61872196"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Wireless Communications and Mobile Computing"],"published-print":{"date-parts":[[2021,1]]},"abstract":"<jats:p>The Radio Frequency Identification (RFID) technology has been integrated into healthcare systems for the purpose of improving healthcare management. However, people have concerns about the security and privacy of this kind of RFID systems. In order to solve the security problems faced by RFID\u2010based healthcare systems, a novel security authentication protocol based on Physical Unclonable Function (PUF) and Advanced Encryption Standard (AES) encryption algorithm is designed. The protocol uses PUF technology to output unique and random responses to different excitation inputs, encrypts the authentication information sent by the tag, and uses the AES encryption algorithm to encrypt the authentication information between the cloud database and the reader. At the same time, in the authentication process, once the communicating entity completes the identity authentication of the other two entities, it immediately starts to update the key. The security analysis and formal analysis of BAN (proposed by Burrows et al.) logic prove the security and correctness of the protocol. Analysis results show that the computation cost and security performance of the proposed protocol are better than the compared protocols. Our findings will contribute to further enhancing the security for RFID healthcare systems.<\/jats:p>","DOI":"10.1155\/2021\/8844178","type":"journal-article","created":{"date-parts":[[2021,7,24]],"date-time":"2021-07-24T03:05:08Z","timestamp":1627095908000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["A Novel Security Authentication Protocol Based on Physical Unclonable Function for RFID Healthcare Systems"],"prefix":"10.1155","volume":"2021","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2809-2237","authenticated-orcid":false,"given":"He","family":"Xu","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3576-8370","authenticated-orcid":false,"given":"Xin","family":"Chen","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7129-1082","authenticated-orcid":false,"given":"Feng","family":"Zhu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5026-5347","authenticated-orcid":false,"given":"Peng","family":"Li","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"311","published-online":{"date-parts":[[2021,7,23]]},"reference":[{"key":"e_1_2_10_1_2","doi-asserted-by":"crossref","unstructured":"KhanS. Health care monitoring system in Internet of Things (IoT) by using RFID IEEE\u2032s 6th International Conference on Industrial Technology and Management (ICITM 2017) 2017 Cambridge UK https:\/\/doi.org\/10.1109\/ICITM.2017.7917920 2-s2.0-85020105171.","DOI":"10.1109\/ICITM.2017.7917920"},{"key":"e_1_2_10_2_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2018.10.012"},{"key":"e_1_2_10_3_2","doi-asserted-by":"publisher","DOI":"10.4236\/etsn.2017.61001"},{"key":"e_1_2_10_4_2","doi-asserted-by":"crossref","unstructured":"OmarH. Q. KhoshnawA. andMonnetW. Smart patient management monitoring and tracking system using radio-frequency identification (RFID) technology 2016 IEEE EMBS Conference on Biomedical Engineering and Sciences (IECBES) 2017 Kuala Lumpur Malaysia https:\/\/doi.org\/10.1109\/IECBES.2016.7843411 2-s2.0-85015684199.","DOI":"10.1109\/IECBES.2016.7843411"},{"key":"e_1_2_10_5_2","article-title":"Traceability in patient healthcare through the integration of RFID technology in an ICU in a hospital","volume":"18","author":"Mar\u00eda M. P.","year":"2018","journal-title":"Sensors"},{"key":"e_1_2_10_6_2","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-015-0332-4"},{"key":"e_1_2_10_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2019.1800225"},{"key":"e_1_2_10_8_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-014-0046-9"},{"key":"e_1_2_10_9_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-014-0047-8"},{"key":"e_1_2_10_10_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-016-0521-6"},{"key":"e_1_2_10_11_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-015-0213-7"},{"key":"e_1_2_10_12_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-015-0362-8"},{"key":"e_1_2_10_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2780124"},{"key":"e_1_2_10_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2018.2850966"},{"key":"e_1_2_10_15_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2018.09.001"},{"key":"e_1_2_10_16_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-019-00464-9"},{"key":"e_1_2_10_17_2","doi-asserted-by":"publisher","DOI":"10.1145\/77648.77649"},{"key":"e_1_2_10_18_2","first-page":"960","article-title":"Survey of privacy of radio frequency identification technology","volume":"26","author":"Zhou S.","year":"2015","journal-title":"Journal of Software"},{"key":"e_1_2_10_19_2","first-page":"19","article-title":"Open-loop RFID ownership transfer protocol based on PUF","volume":"4","author":"Wei M.","year":"2019","journal-title":"Journal of Cyber Security"},{"key":"e_1_2_10_20_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-017-3965-1"},{"key":"e_1_2_10_21_2","first-page":"6","article-title":"LMAP: a real lightweight mutual authentication protocol for low-cost RFID tags","volume":"6","author":"Peris-Lopez P.","year":"2006","journal-title":"Workshop on RFID Security"},{"key":"e_1_2_10_22_2","doi-asserted-by":"crossref","unstructured":"HeH. ChenX. andUkkonenL. Clothing-integrated passive RFID strain sensor platform for body movement-based controlling 2019 IEEE International Conference on RFID Technology and Applications (RFID-TA) 2019 Pisa Italy 236\u2013239 https:\/\/doi.org\/10.1109\/RFID-TA.2019.8892118.","DOI":"10.1109\/RFID-TA.2019.8892118"},{"key":"e_1_2_10_23_2","doi-asserted-by":"crossref","unstructured":"LeonidB.andGabrielR. Physically unclonable function-based security and privacy in RFID systems IEEE International Conference on Pervasive Computing and Communications 2007 White Plains NY USA 211\u2013220 https:\/\/doi.org\/10.1109\/PERCOM.2007.26 2-s2.0-34547623904.","DOI":"10.1109\/PERCOM.2007.26"},{"key":"e_1_2_10_24_2","doi-asserted-by":"crossref","unstructured":"IdrissT.andBayoumiM. Lightweight highly secure PUF protocol for mutual authentication and secret message exchange IEEE International Conference on RFID Technology and Application 2017 Warsaw Poland 214\u2013219 https:\/\/doi.org\/10.1109\/RFID-TA.2017.8098893 2-s2.0-85040729551.","DOI":"10.1109\/RFID-TA.2017.8098893"},{"key":"e_1_2_10_25_2","doi-asserted-by":"crossref","unstructured":"IdrissH. IdrissT. andBayoumiM. A highly reliable dual-arbiter PUF for lightweight authentication protocols IEEE International Conference on RFID Technology and Application 2017 Warsaw Poland 248\u2013253 https:\/\/doi.org\/10.1109\/RFID-TA.2017.8098903 2-s2.0-85040728115.","DOI":"10.1109\/RFID-TA.2017.8098903"},{"key":"e_1_2_10_26_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-013-1073-x"},{"key":"e_1_2_10_27_2","first-page":"1","article-title":"A secure ECC-based RFID authentication scheme using hybrid protocols","volume":"2","author":"Liao Y. P.","year":"2013","journal-title":"Advances in Intelligent Systems and Applications"},{"key":"e_1_2_10_28_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2013.02.004"},{"volume-title":"Research on RFID Mutual Authentication Protocol Based on ECC","year":"2014","author":"He J.","key":"e_1_2_10_29_2"},{"key":"e_1_2_10_30_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2014.05.415"},{"key":"e_1_2_10_31_2","doi-asserted-by":"crossref","unstructured":"KhatwaniC.andRoyS. Security analysis of ECC based authentication protocols International Conference on Computational Intelligence and Communication Networks 2016 Jabalpur India 1167\u20131172.","DOI":"10.1109\/CICN.2015.226"},{"key":"e_1_2_10_32_2","doi-asserted-by":"crossref","unstructured":"XieW. XieL. ZhangC. andTangC. Cloud-based RFID authentication IEEE International Conference on RFID 2013 Orlando FL USA 168\u2013175 https:\/\/doi.org\/10.1109\/RFID.2013.6548151 2-s2.0-84881348074.","DOI":"10.1109\/RFID.2013.6548151"},{"key":"e_1_2_10_33_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2977196"},{"key":"e_1_2_10_34_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2898174"},{"key":"e_1_2_10_35_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2953289"}],"container-title":["Wireless Communications and Mobile Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2021\/8844178.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2021\/8844178.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2021\/8844178","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T12:08:01Z","timestamp":1723032481000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2021\/8844178"}},"subtitle":[],"editor":[{"given":"Arun K.","family":"Sangaiah","sequence":"additional","affiliation":[],"role":[{"role":"editor","vocabulary":"crossref"}]}],"short-title":[],"issued":{"date-parts":[[2021,1]]},"references-count":35,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,1]]}},"alternative-id":["10.1155\/2021\/8844178"],"URL":"https:\/\/doi.org\/10.1155\/2021\/8844178","archive":["Portico"],"relation":{},"ISSN":["1530-8669","1530-8677"],"issn-type":[{"type":"print","value":"1530-8669"},{"type":"electronic","value":"1530-8677"}],"subject":[],"published":{"date-parts":[[2021,1]]},"assertion":[{"value":"2020-08-26","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-07-05","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-07-23","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"8844178"}}