Skip to main content
Top
Published in: Journal of Medical Systems 1/2016

01-01-2016 | Systems-Level Quality Improvement

A Secure ECC-based RFID Mutual Authentication Protocol to Enhance Patient Medication Safety

Authors: Chunhua Jin, Chunxiang Xu, Xiaojun Zhang, Fagen Li

Published in: Journal of Medical Systems | Issue 1/2016

Login to get access

Abstract

Patient medication safety is an important issue in patient medication systems. In order to prevent medication errors, integrating Radio Frequency Identification (RFID) technology into automated patient medication systems is required in hospitals. Based on RFID technology, such systems can provide medical evidence for patients’ prescriptions and medicine doses, etc. Due to the mutual authentication between the medication server and the tag, RFID authentication scheme is the best choice for automated patient medication systems. In this paper, we present a RFID mutual authentication scheme based on elliptic curve cryptography (ECC) to enhance patient medication safety. Our scheme can achieve security requirements and overcome various attacks existing in other schemes. In addition, our scheme has better performance in terms of computational cost and communication overhead. Therefore, the proposed scheme is well suitable for patient medication systems.
Literature
1.
go back to reference Annual report. Technical report, London School of Hygiene and Tropical Medicine report, 2012 Annual report. Technical report, London School of Hygiene and Tropical Medicine report, 2012
3.
go back to reference Juels, A., Yoking-proofs for RFID tags. In: First International Workshop on Pervasive Computing and Communication Security, 2004 Juels, A., Yoking-proofs for RFID tags. In: First International Workshop on Pervasive Computing and Communication Security, 2004
4.
go back to reference Sandlin, D., SurgiChip-new technology for prevention of wrong site, wrong procedure, wrong person surgery. J. Perianesth. Nurs. 20:2144–2146, 2005.CrossRef Sandlin, D., SurgiChip-new technology for prevention of wrong site, wrong procedure, wrong person surgery. J. Perianesth. Nurs. 20:2144–2146, 2005.CrossRef
6.
go back to reference Sun, P.R., Wang, B.H., Wu, F., A new method to guard inpatient medication safety by the implementation of RFID. J. Med. Syst. 32:4327–4332, 2008.CrossRef Sun, P.R., Wang, B.H., Wu, F., A new method to guard inpatient medication safety by the implementation of RFID. J. Med. Syst. 32:4327–4332, 2008.CrossRef
7.
go back to reference Huang, H.H., and Ku, C.Y., A rfid grouping proof protocol for medication safety of inpatient. J. Med. Syst. 33(6):467–474, 2009.PubMedCrossRef Huang, H.H., and Ku, C.Y., A rfid grouping proof protocol for medication safety of inpatient. J. Med. Syst. 33(6):467–474, 2009.PubMedCrossRef
8.
go back to reference Lo, N.-W., and Yeh, K.-H., Anonymous coexistence proofs for RFID tags. J. Inf. Sci. Eng. 26(4):1213–1230, 2010. Lo, N.-W., and Yeh, K.-H., Anonymous coexistence proofs for RFID tags. J. Inf. Sci. Eng. 26(4):1213–1230, 2010.
9.
go back to reference Yen, Y.C., Lo, N.W., Wu, T.C., Two rfid-based solutions for secure inpatient medication administration. J. Med. Syst. 36(5):2769–2778, 2012.PubMedCrossRef Yen, Y.C., Lo, N.W., Wu, T.C., Two rfid-based solutions for secure inpatient medication administration. J. Med. Syst. 36(5):2769–2778, 2012.PubMedCrossRef
10.
go back to reference Li, N., Mu, Y., Susilo, W., Guo, F., Varadharajan, V., Privacy-Preserving Authorized RFID Authentication Protocols, Radio Frequency Identification: Security and Privacy Issues, pp. 108–122: Springer International Publishing, 2014. Li, N., Mu, Y., Susilo, W., Guo, F., Varadharajan, V., Privacy-Preserving Authorized RFID Authentication Protocols, Radio Frequency Identification: Security and Privacy Issues, pp. 108–122: Springer International Publishing, 2014.
11.
go back to reference Chen, Y., Chou, J.-S., Sun, H.-M., A novel mutual authentication scheme based on quadratic residues for RFID systems. Computer Networks 52:2373–2380, 2008.CrossRef Chen, Y., Chou, J.-S., Sun, H.-M., A novel mutual authentication scheme based on quadratic residues for RFID systems. Computer Networks 52:2373–2380, 2008.CrossRef
12.
go back to reference Cao, T., and Shen, P., Cryptanalysis of some RFID authentication protocols. J. of Commu. 3(7):20–27, 2008. Cao, T., and Shen, P., Cryptanalysis of some RFID authentication protocols. J. of Commu. 3(7):20–27, 2008.
13.
go back to reference Yeh, T.-C., Wu, C.-H., Tseng, Y.-M., Improvement of the RFID authentication scheme based on quadratic residues. Computer Communications 34:337–341, 2011.CrossRef Yeh, T.-C., Wu, C.-H., Tseng, Y.-M., Improvement of the RFID authentication scheme based on quadratic residues. Computer Communications 34:337–341, 2011.CrossRef
14.
go back to reference Doss, R., Sundaresan, S., Zhou, W., A practical quadratic residues based scheme for authentication and privacy in mobile RFID systems. Ad Hoc Networks 11(1):383–396, 2013.CrossRef Doss, R., Sundaresan, S., Zhou, W., A practical quadratic residues based scheme for authentication and privacy in mobile RFID systems. Ad Hoc Networks 11(1):383–396, 2013.CrossRef
15.
go back to reference Tuyls, P., and Batina, L.: RFID-tags for Anti-Counterfeiting. Topics in cryptology-CT-RSA 2006, 115-131 (2006) Tuyls, P., and Batina, L.: RFID-tags for Anti-Counterfeiting. Topics in cryptology-CT-RSA 2006, 115-131 (2006)
16.
go back to reference Batina, L., Guajardo, J., Kerins, T., Mentens, N., Tuyls, P., Verbauwhede, I.: Public-key cryptography for RFID-tags. Fifth annual IEEE international conference on PerCom workshops’ 07, pp. 217–222. IEEE (2007) Batina, L., Guajardo, J., Kerins, T., Mentens, N., Tuyls, P., Verbauwhede, I.: Public-key cryptography for RFID-tags. Fifth annual IEEE international conference on PerCom workshops’ 07, pp. 217–222. IEEE (2007)
17.
go back to reference Lee, Y., Batina, L., Verbauwhede, I.: EC-RAC (ECDLP based randomized access control): provably secure RFID authentication protocol. 2008 I.E. international conference on RFID, pp. 97–104. IEEE (2008) Lee, Y., Batina, L., Verbauwhede, I.: EC-RAC (ECDLP based randomized access control): provably secure RFID authentication protocol. 2008 I.E. international conference on RFID, pp. 97–104. IEEE (2008)
18.
go back to reference Bringer, J., Chabanne, H., Icart, T.: Cryptanalysis of EC-RAC, a RFID identification protocol. International Conference on Cryptology and Network Security-CANS’08, Lecture Notes in Computer Science. Springer-Verlag (2008) Bringer, J., Chabanne, H., Icart, T.: Cryptanalysis of EC-RAC, a RFID identification protocol. International Conference on Cryptology and Network Security-CANS’08, Lecture Notes in Computer Science. Springer-Verlag (2008)
19.
20.
go back to reference Zhang, Z. Z., and Qi, Q. Q., An Efficient RFID Authentication Protocol to Enhance Patient Medication Safety Using Elliptic Curve Cryptography. J. Med. Syst. 38(5):1–7, 2014.CrossRef Zhang, Z. Z., and Qi, Q. Q., An Efficient RFID Authentication Protocol to Enhance Patient Medication Safety Using Elliptic Curve Cryptography. J. Med. Syst. 38(5):1–7, 2014.CrossRef
21.
go back to reference Liao, Y., and Hsiao, C., A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol. Ad Hoc Networks 18:133–146, 2014.CrossRef Liao, Y., and Hsiao, C., A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol. Ad Hoc Networks 18:133–146, 2014.CrossRef
22.
go back to reference Peeters, R., and Hermans, J., Attack on Liao and Hsiao’s Secure ECC-based RFID Authentication Scheme integrated with ID-Verifier Transfer Protocol. Cryptology ePrint Archive, Report 2013/399, 2013 Peeters, R., and Hermans, J., Attack on Liao and Hsiao’s Secure ECC-based RFID Authentication Scheme integrated with ID-Verifier Transfer Protocol. Cryptology ePrint Archive, Report 2013/399, 2013
23.
go back to reference Zhao, Z.g., A Secure RFID Authentication Protocol for Healthcare Environments Using Elliptic Curve Cryptosystem. J. Med. Syst. 38(5):1–7, 2014.CrossRef Zhao, Z.g., A Secure RFID Authentication Protocol for Healthcare Environments Using Elliptic Curve Cryptosystem. J. Med. Syst. 38(5):1–7, 2014.CrossRef
24.
go back to reference He, D., Kumar, N., Chilamkurti, N., Lee, J.-H., Lightweight ECC based RFID authentication integrated with an ID verifier transfer protocol. J. Med. Syst. 38(10):1–6, 2014.CrossRef He, D., Kumar, N., Chilamkurti, N., Lee, J.-H., Lightweight ECC based RFID authentication integrated with an ID verifier transfer protocol. J. Med. Syst. 38(10):1–6, 2014.CrossRef
25.
go back to reference He, D., Kumar, N., Khan, M.K., Robustanonymous authentication protocol for healthcare applications using wirelessmedical sensor networks. Multimedia Systems 21(1):49–60, 2013.CrossRef He, D., Kumar, N., Khan, M.K., Robustanonymous authentication protocol for healthcare applications using wirelessmedical sensor networks. Multimedia Systems 21(1):49–60, 2013.CrossRef
26.
go back to reference Guo, P., Wang, J., Li, B., Lee, S., A Variable Threshold-value Authentication Architecture for Wireless Mesh Networks. Journal of Internet Technology 15(6):929–936, 2014. Guo, P., Wang, J., Li, B., Lee, S., A Variable Threshold-value Authentication Architecture for Wireless Mesh Networks. Journal of Internet Technology 15(6):929–936, 2014.
27.
go back to reference Ren, Y., Shen, J., Wang, J., Han, J., Lee, S., Mutual Verifiable Provable Data Auditing in Public Cloud Storage. Journal of Internet Technology 16(2):317–323, 2015. Ren, Y., Shen, J., Wang, J., Han, J., Lee, S., Mutual Verifiable Provable Data Auditing in Public Cloud Storage. Journal of Internet Technology 16(2):317–323, 2015.
28.
go back to reference Shen, J., Tan, H., Wang, J., Wang, J., Lee, S., A Novel Routing Protocol Providing Good Transmission Reliability in Underwater Sensor Networks. Journal of Internet Technology 16(1):171–178, 2015. Shen, J., Tan, H., Wang, J., Wang, J., Lee, S., A Novel Routing Protocol Providing Good Transmission Reliability in Underwater Sensor Networks. Journal of Internet Technology 16(1):171–178, 2015.
29.
go back to reference Han, W., and Zhu, Z., An ID-based mutual authentication with key agreement protocol for multiserver environment on elliptic curve cryptosystem. Int. J. Commun. Syst. 27(8):1173–1185, 2014.CrossRef Han, W., and Zhu, Z., An ID-based mutual authentication with key agreement protocol for multiserver environment on elliptic curve cryptosystem. Int. J. Commun. Syst. 27(8):1173–1185, 2014.CrossRef
30.
go back to reference He, D., Kumar, N., Chilamkurti, N., A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks. Information Sciences, 2015. doi:10.1016/j.ins.2015.02.010. He, D., Kumar, N., Chilamkurti, N., A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks. Information Sciences, 2015. doi:10.​1016/​j.​ins.​2015.​02.​010.
31.
go back to reference He, D., and Zeadally, S., Authentication protocol for ambient assisted living system. IEEE Communications Magazine 35(1):71–77, 2015.CrossRef He, D., and Zeadally, S., Authentication protocol for ambient assisted living system. IEEE Communications Magazine 35(1):71–77, 2015.CrossRef
32.
go back to reference He, D., Kumar, N., Chen, J., et al., Robust anonymous authentication protocol for healthcare applications using wireless medical sensor networks. Multimedia Systems 21(1):49–60, 2015.CrossRef He, D., Kumar, N., Chen, J., et al., Robust anonymous authentication protocol for healthcare applications using wireless medical sensor networks. Multimedia Systems 21(1):49–60, 2015.CrossRef
33.
34.
go back to reference He, D., and Wang, D., Robust biometrics-based authentication scheme for multi-server environment. IEEE Systems Journal,1–8, 2014. He, D., and Wang, D., Robust biometrics-based authentication scheme for multi-server environment. IEEE Systems Journal,1–8, 2014.
35.
go back to reference He, D., Zhang, Y., Chen, J., Cryptanalysis and improvement of an anonymous authentication protocol for wireless access networks. Wireless Personal Communications 74(2):229–243, 2014.CrossRef He, D., Zhang, Y., Chen, J., Cryptanalysis and improvement of an anonymous authentication protocol for wireless access networks. Wireless Personal Communications 74(2):229–243, 2014.CrossRef
Metadata
Title
A Secure ECC-based RFID Mutual Authentication Protocol to Enhance Patient Medication Safety
Authors
Chunhua Jin
Chunxiang Xu
Xiaojun Zhang
Fagen Li
Publication date
01-01-2016
Publisher
Springer US
Published in
Journal of Medical Systems / Issue 1/2016
Print ISSN: 0148-5598
Electronic ISSN: 1573-689X
DOI
https://doi.org/10.1007/s10916-015-0362-8

Other articles of this Issue 1/2016

Journal of Medical Systems 1/2016 Go to the issue