Two RFID Standard-based Security Protocols for Healthcare Environments

被引:0
|
作者
Pablo Picazo-Sanchez
Nasour Bagheri
Pedro Peris-Lopez
Juan E. Tapiador
机构
[1] University School of Computer Science (UPM) of Madrid,Department of Applied Mathematics
[2] Shahid Rajaee Teachers Training University,Department of Electrical Engineering
[3] Universidad Carlos III de Madrid,Department of Computer Science
来源
关键词
RFID; Healthcare; Privacy; Standards;
D O I
暂无
中图分类号
学科分类号
摘要
Radio Frequency Identification (RFID) systems are widely used in access control, transportation, real-time inventory and asset management, automated payment systems, etc. Nevertheless, the use of this technology is almost unexplored in healthcare environments, where potential applications include patient monitoring, asset traceability and drug administration systems, to mention just a few. RFID technology can offer more intelligent systems and applications, but privacy and security issues have to be addressed before its adoption. This is even more dramatical in healthcare applications where very sensitive information is at stake and patient safety is paramount. In Wu et al. (J. Med. Syst. 37:19, 43) recently proposed a new RFID authentication protocol for healthcare environments. In this paper we show that this protocol puts location privacy of tag holders at risk, which is a matter of gravest concern and ruins the security of this proposal. To facilitate theimplementation of secure RFID-based solutions in the medical sector, we suggest two new applications (authentication and secure messaging) and propose solutions that, in contrast to previous proposals in this field, are fully based on ISO Standards and NIST Security Recommendations.
引用
收藏
相关论文
共 50 条
  • [31] Desynchronization attacks on RFID security protocols
    [J]. Deng, M. (dmlei2003@163.com), 1600, Universitas Ahmad Dahlan (11):
  • [32] On the Security of RFID Group Scanning Protocols
    Dang, Duc Nguyen
    Kim, Kwangjo
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2010, E93D (03): : 528 - 530
  • [33] Standard-Based Teaching Quality Assessment
    Zhang, Shuang
    Hu, Qinghe
    [J]. Proceedings of the 2016 International Conference on Education, E-learning and Management Technology, 2016, 44 : 152 - 155
  • [34] Building standard-based survey software
    Cameron, M
    Weisberg, J
    [J]. ASC 2003: THE IMPACT OF TECHNOLOGY ON THE SURVEY PROCESS, 2003, : 217 - 224
  • [35] Symmetric Key-Based Lightweight Authentication Protocols for RFID Security
    Rajaguru, K.
    Hansdah, R. C.
    [J]. 2018 32ND INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA), 2018, : 488 - 495
  • [36] SAREF4health: IoT Standard-Based Ontology-Driven Healthcare Systems
    Moreira, Joao
    Ferreira Pires, Luis
    van Sinderen, Marten
    Daniele, Laura
    [J]. FORMAL ONTOLOGY IN INFORMATION SYSTEMS (FOIS 2018), 2018, 306 : 239 - 252
  • [37] Untraceable Analysis of Scalable RFID Security Protocols
    Chen, Xiuqing
    Ma, Kai
    Geng, Deqin
    Zhai, Jingxuan
    Liu, Wei
    Zhang, Hongwei
    Zhu, Tingting
    Piao, Xue
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2019, 109 (03) : 1747 - 1767
  • [38] A Salient Missing Link in RFID Security Protocols
    Imran Erguler
    Emin Anarim
    Gokay Saldamli
    [J]. EURASIP Journal on Wireless Communications and Networking, 2011
  • [39] Scalability and Security Conflict for RFID Authentication Protocols
    Imran Erguler
    Emin Anarim
    [J]. Wireless Personal Communications, 2011, 59 : 43 - 56
  • [40] Security Issues in Ultralightweight RFID Authentication Protocols
    Xu Zhuang
    Yan Zhu
    Chin-Chen Chang
    Qiang Peng
    [J]. Wireless Personal Communications, 2018, 98 : 779 - 814