A review of authentication protocols for rfid security on smart healthcare

被引:0
|
作者
Dearfian, Hanif Restu [1 ]
Amiruddin, Amiruddin [1 ]
机构
[1] Sekolah Tinggi Sandi Negara, Bogor, Indonesia
关键词
D O I
10.1088/1757-899X/508/1/012135
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Patient safety is a top priority in the medical tasks where patient identification is one of the important things in the process of anesthesia and surgery. Errors in identifying patients can be fatal to the patient's safety. Such identification of patients that still use traditional methods is very susceptible to causing medical faults. To overcome the weaknesses of such traditional identification, researchers have used Radio Frequency Identification (RFID) technology to automatically identify patients. With RFID technology, automatic identification can be done without having to make physical contact with the patient. However, RFID technology still has flaws, including the absence of a protection mechanism for RFID security. This paper presents the results of a literature study on authentication protocols for the security of RFID implementation for smart healthcare.
引用
收藏
页数:7
相关论文
共 50 条
  • [1] Security Enhanced RFID Authentication Protocols for Healthcare Environment
    Xie, Shaohao
    Zhang, Fangguo
    Cheng, Rong
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2021, 117 (01) : 71 - 86
  • [2] Security Enhanced RFID Authentication Protocols for Healthcare Environment
    Shaohao Xie
    Fangguo Zhang
    Rong Cheng
    [J]. Wireless Personal Communications, 2021, 117 : 71 - 86
  • [3] On the Security of RFID Authentication Protocols
    Desai, Nidhi
    Das, Manik Lal
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON ELECTRONICS, COMPUTING AND COMMUNICATION TECHNOLOGIES (CONECCT), 2015,
  • [4] Security problems of RFID authentication protocols
    Pornieks, Valdis
    Ginters, Egils
    [J]. PROCEEDINGS OF THE 6TH WSEAS INTERNATIONAL CONFERENCE ON SYSTEM SCIENCE AND SIMULATION IN ENGINEERING (ICOSSSE '07): SYSTEM SCIENCE AND SIMULATION IN ENGINEERING, 2007, : 325 - +
  • [5] Security Issues in Ultralightweight RFID Authentication Protocols
    Zhuang, Xu
    Zhu, Yan
    Chang, Chin-Chen
    Peng, Qiang
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2018, 98 (01) : 779 - 814
  • [6] Security Issues in Ultralightweight RFID Authentication Protocols
    Xu Zhuang
    Yan Zhu
    Chin-Chen Chang
    Qiang Peng
    [J]. Wireless Personal Communications, 2018, 98 : 779 - 814
  • [7] More on the Security of Linear RFID Authentication Protocols
    Krause, Matthias
    Stegemann, Dirk
    [J]. SELECTED AREAS IN CRYPTOGRAPHY, 2009, 5867 : 182 - 196
  • [8] Scalability and Security Conflict for RFID Authentication Protocols
    Erguler, Imran
    Anarim, Emin
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2011, 59 (01) : 43 - 56
  • [9] Security Analysis of Some RFID Authentication Protocols
    Wang Shaohui
    Wang Faxing
    [J]. 2010 2ND INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY (EBISS 2010), 2010, : 386 - 389
  • [10] Scalability and Security Conflict for RFID Authentication Protocols
    Imran Erguler
    Emin Anarim
    [J]. Wireless Personal Communications, 2011, 59 : 43 - 56