Abstract
Mobile healthcare (M-health) systems can monitor the patients’ conditions remotely and provide the patients and doctors with access to electronic medical records, and Radio Frequency Identification (RFID) technology plays an important role in M-health services. It is important to securely access RFID data in M-health systems: here, authentication, privacy, anonymity, and tracking resistance are desirable security properties. In 2014, He et al. proposed an elliptic curve cryptography- (ECC-) based RFID authentication protocol which is quite attractive to M-health applications, owing to its claimed performance of security, scalability, and efficiency. Unfortunately, we find their scheme fails to achieve the privacy protection if an adversary launches active tracking attacks. In this paper, we demonstrate our active attack on He et al.'s scheme and propose a new scheme to improve the security. Performance evaluation shows the improved scheme could meet the challenges of M-health applications.
1. Introduction
Mobile healthcare (M-health) systems can monitor the patients’ conditions remotely and provide the patients and doctors with access to electronic medical records. Such a system improves both convenience and efficiency, because the patients and doctors are no longer required to be present at the same place; therefore, patients can contact their doctor at home and obtain the instant diagnosis and prescription. In the development of M-health systems, Radio Frequency Identification (RFID) technology plays an important role for identifying and accessing patients and objects. Therefore, securely accessing these RFID tags and systems is critical to the success of M-health systems [1, 2].
In a RFID system, there are three types of roles: RFID tags, RFID readers, and a back-end server. Each tag has a unique number which is used to identify a RFID-tagged product. To obtain data from a tag, a reader first issues a query to the tag and then forwards the received information provided by the tag to a back-end server. The back-end server maintains a database of the information of tags and their labelled products. However, since a tag automatically responds to any readers’ queries via radio signal, the owner of the tagged product is even unaware of this action. If the tag transmits a fixed value in response to readers’ queries, it raises potential privacy threats to the labelled objects and the owner's location.
Privacy protection in a RFID system is investigated in two respects. One is anonymity; the other is tracking attack resistance. The former is to provide confidentiality of tag's identity such that an unauthorized observer cannot learn the identity of the tag. The latter is to provide unlinkability of any two RFID transmission sessions; that is, given any two RFID transactions, an attacker cannot tell whether the two transactions came from the same tag or not. Tracking attack could be classified into two categories: passive tracking attack and active tracking attack. The passive tracking attack is that an adversary tries to distinguish whether two RFID transactions came from the same tag by eavesdropping only, while the active tracking attack is that an adversary can actively participate in the transactions (like eavesdropping, interrupt, replay, and modification) to get the data to tell whether two transactions came from the same tag. Both types of tracking might be used to infer users’ location information or even their personal profiles.
Due to the advances of hardware development, many RFID schemes based on the public key techniques have been proposed and implemented [3]. Compared with the other cryptography mechanisms, the elliptic curve cryptography (ECC) [4, 5] is more competitive since it could provide the same security level with much smaller key size. Lee et al. [6] proposed an ECC-based RFID authentication scheme. Bringer et al. [7] and Deursen and Radomirovic [8] found that Lee et al.'s scheme is vulnerable to the tracking attack and the replay attack. Liao and Hsiao [9] proposed an ECC-based RFID authentication scheme integrated with an ID verifier transfer protocol; nevertheless, Peeters and Hermans [10] showed Liao and Hsiao's scheme cannot resist the server impersonation attack. Tan [11] proposed ECC-based RFID three-factor authentication. Arshad and Nikooghadam [12] found that Tan's scheme is not resistant to the replay attack and the denial-of-service attack.
In 2014, He et al. [13] proposed an elliptic curve cryptography- (ECC-) based RFID authentication protocol which aimed at protecting tag's anonymity and unlinkability and improving the computational complexity. Compared with the previous authentication schemes, He et al.'s scheme has better performance in terms of security, computational cost, and storage requirement. Unfortunately, we find that their scheme fails to achieve the privacy protection if an adversary launches active tracking attacks. We will show the weaknesses and propose an improved scheme. The rest of this paper is organized as follows. Section 2 gives the preliminary sketch of the elliptic curve cryptography and bilinear pairing. Section 3 reviews He et al.'s scheme and shows its security weakness. In Section 4, we propose our new scheme, which is followed by security analysis and performance evaluation in Section 5. Finally, conclusions are given in Section 6.
2. Preliminaries
We briefly introduce the elliptic curve cryptography and the bilinear pairing.
2.1. Elliptic Curve Cryptography
Koblitz [4] and Miller [5] introduced elliptic curves for cryptographic applications. Since then, elliptic curve cryptography (ECC) has played an important role in many cryptosystems. An elliptic curve E is defined over the equation
The security of He et al.'s protocol is based on the complexity of the elliptic curve discrete logarithm problem (ECDLP) [14].
Elliptic Curve Discrete Logarithm Problem (ECDLP). Given an elliptic curve E over
2.2. The Bilinear Pairing
The bilinear pairing was initially considered as a negative property on the design of elliptic curve cryptosystems, because it reduces the discrete logarithm problem on some elliptic curves (especially for supersingular curves) to the discrete logarithm problem in a finite field [15]. Such property diminishes the strength of supersingular curves in practice [16]. However, followed by the tripartite key agreement protocol proposed by Joux [17] and the identity-based encryption scheme proposed by Boneh and Franklin [18], pairing becomes beneficial and favorable to the design of cryptographic protocols or cryptosystems [19].
Let Bilinear: for all Nondegenerate: Computable: given
We find that He et al.'s protocol is vulnerable to active tracking attack. We will utilize the bilinear pairing to facilitate our active attacks in Section 4.
3. Weaknesses of He et al.'s Protocol
3.1. Review of He et al.'s Protocol
This section reviews He et al.'s protocol [13]. The system consists of three kinds of entities: readers, a back-end server, and a set of tags; but the RFID reader is omitted from the protocol description since it acts as an intermediate party that relays messages exchanged between a tag and the server. It is assumed that the communication between the reader and back-end server is secure. The proposed protocol comprises two phases: setup and authentication. Notations used in the protocol are defined as follows:
E: an elliptic curve defined by the equation P: a generator point for a group of order n over E.
Setup Phase. To set up the system, the back-end server performs the following tasks:
Define Choose a random number Choose a random point (params, The server also keeps
Authentication Phase. To achieve mutual authentication, the server (S) and the tag (

The authentication phase of He et al.'s protocol.
Step 1 (
).
S randomly chooses
Step 2 (
).
Step 3 (
).
S computes
Step 4.
Upon receiving the server's response,
3.2. The Weaknesses
We find that He et al.'s protocol is vulnerable to active tracking attack. We utilize the bilinear pairing to check whether the two transactions came from the same tag or not. We demonstrate our active attack as follows, where Adv denotes the notion that the adversary impersonates the server to get the responses for tracking. First of all, Adv randomly chooses
Upon receiving the query,
When It computes It checks whether the equation
If the transactions came from the same tag, the above verification equation should hold, because
4. The Proposed Scheme
We propose a new ECC-based scheme, which owns excellent performance in terms of security, computational complexity, and communicational cost. Our scheme can resist all security threats including active tracking attack. Regarding computational complexity, we reduce the number of elliptic curve scalar multiplications, which is the most computationally expensive operation in ECC cryptography. For embedded systems like RFID and wireless sensor network, the communication operations consume the highest amount of energy of all the operations; therefore, reducing the message length is critical for saving the energy of these devices. The proposed scheme consists of two phases: setup and authentication. Since the setup phase is the same as that in He et al.'s protocol, it is omitted here. The authentication phase is described as follows.
Authentication Phase. To achieve mutual authentication, the server (S) and the tag (

The authentication phase of the proposed protocol.
Step 1 (
).
S randomly chooses
Step 2 (
).
Step 3 (
).
S computes
Step 4.
Upon receiving the server's response,
5. Security Analysis and Performance Evaluation
5.1. Security Analysis
We analyze the security of the proposed scheme as follows.
Mutual Authentication. The authentication of the tag is dependent on tag's ability to prove its knowledge of the secret
The authentication of the server is dependent on server's ability to extract
Anonymity. In our scheme,
Tracking Attack Resistance. The essence of the active tracking resistance of the proposed scheme is that each calculation of
First of all, Adv randomly chooses
Upon receiving the query,
Tag Masquerade Attack Resistance. To impersonate a tag, the adversary must be able to generate a valid message
Server Spoofing Attack Resistance. To impersonate the server, the adversary must be able to generate a valid message
5.2. Performance Evaluation
We compare the proposed scheme with He et al.'s protocol [13] and some related schemes [9, 12] in terms of computational cost, communicational cost, and storage cost. Let
Performance comparison.
6. Conclusions
Mobile healthcare systems are becoming more and more popular. Lack of protecting patient and data privacy may hinder the utility of mobile healthcare system. In this paper, we have shown the weakness of He et al.'s protocol. The protocol cannot meet privacy protection requirement since it is vulnerable to active tracking attack. We have proposed a new scheme which not only conquers the security weaknesses but also improves the computational performance.
Footnotes
Conflict of Interests
The authors declare that there is no conflict of interests regarding the publication of this paper.
Acknowledgment
This project is partially supported by the National Science Council, Taiwan, under Grant no. MOST 103-2221-E-260-022.
