Skip to main content
Top
Published in: Journal of Medical Systems 5/2012

01-10-2012 | ORIGINAL PAPER

A Design of Tamper Resistant Prescription RFID Access Control System

Authors: Yu-Yi Chen, Der-Chen Huang, Meng-Lin Tsai, Jinn-Ke Jan

Published in: Journal of Medical Systems | Issue 5/2012

Login to get access

Abstract

In this paper, we propose a tamper resistant prescription RFID access control protocol for different authorized readers. Not only the authentication mechanism but also the access right authorization mechanism is designed in our scheme. Only the specific doctor, usually the patient’s doctor, can access the tag. Moreover, some related information of patient’s prescription is attached to a RFID tag for tamper resistance. The patients’ rights will be guaranteed.
Literature
1.
go back to reference J. Ericson, RFID for Hospital Care, The E-Business Executive Daily. (2004). J. Ericson, RFID for Hospital Care, The E-Business Executive Daily. (2004).
2.
go back to reference Fisher, J. A., and Monahan, T., Tracking The Social Dimensions of RFID Systems in Hospitals. International Journal of Medical Informatics 77(3):176–183, 2008.CrossRef Fisher, J. A., and Monahan, T., Tracking The Social Dimensions of RFID Systems in Hospitals. International Journal of Medical Informatics 77(3):176–183, 2008.CrossRef
3.
go back to reference Wang, S.-W., Chen, W.-H., Ong, C.-S., Liu, L., Chuang, Y.-W. RFID Applications in Hospitals: A Case Study on A Demonstration RFID Project in A Taiwan Hospital, Proceedings of The 39th Hawaii International Conference on System Sciences. (2006). Wang, S.-W., Chen, W.-H., Ong, C.-S., Liu, L., Chuang, Y.-W. RFID Applications in Hospitals: A Case Study on A Demonstration RFID Project in A Taiwan Hospital, Proceedings of The 39th Hawaii International Conference on System Sciences. (2006).
4.
go back to reference Chowdhury, B., Khosla, R., RFID-Based Hospital Real-Time Patient Management System, 6th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007). (2007). Chowdhury, B., Khosla, R., RFID-Based Hospital Real-Time Patient Management System, 6th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007). (2007).
5.
go back to reference Nahas, H.A., Deogun, J.S., Radio Frequency Identification Applications in Smart Hospitals, The Twentieth IEEE International Symposium on Computer-Based Medical Systems. (2007). Nahas, H.A., Deogun, J.S., Radio Frequency Identification Applications in Smart Hospitals, The Twentieth IEEE International Symposium on Computer-Based Medical Systems. (2007).
6.
go back to reference Xiao, Y., Shen, X., Sun, B., Cai, L. Security and Privacy in RFID and Applications in Telemedicine, IEEE Communications Magazine. (2006) 64–72. Xiao, Y., Shen, X., Sun, B., Cai, L. Security and Privacy in RFID and Applications in Telemedicine, IEEE Communications Magazine. (2006) 64–72.
7.
go back to reference Aguilar, A., van der Putten, W., and Kirrane, F., Positive Patient Identification using RFID and Wireless Networks, In HISI 11th Annual Conference and Scientific Symposium. Dublin, Ireland, 2006. Aguilar, A., van der Putten, W., and Kirrane, F., Positive Patient Identification using RFID and Wireless Networks, In HISI 11th Annual Conference and Scientific Symposium. Dublin, Ireland, 2006.
8.
go back to reference Bardram, J. Hospitals of The Future—Ubiquitous Computing Support for Medical Work in Hospitals, The Second International Workshop on Ubiquitous Computing for Pervasive Healthcare Application. (2003). Bardram, J. Hospitals of The Future—Ubiquitous Computing Support for Medical Work in Hospitals, The Second International Workshop on Ubiquitous Computing for Pervasive Healthcare Application. (2003).
9.
go back to reference Bardram, J. Applications of Context-Aware Computing in Hospital Work: Examples and Design Principles, Proceedings of the 2004 ACM symposium on Applied Computing. (2004) 1574–1579. Bardram, J. Applications of Context-Aware Computing in Hospital Work: Examples and Design Principles, Proceedings of the 2004 ACM symposium on Applied Computing. (2004) 1574–1579.
10.
go back to reference V. Boginski, I.K. Mun, Y. Wu, K.P. Mason, C. Zhang, Simulation and Analysis of Hospital Operations and Resource Utilization Using RFID Data, 2007 IEEE International Conference on RFID Gaylord Texan Resort, Grapevine, TX, USA, March 26–28 (2007). V. Boginski, I.K. Mun, Y. Wu, K.P. Mason, C. Zhang, Simulation and Analysis of Hospital Operations and Resource Utilization Using RFID Data, 2007 IEEE International Conference on RFID Gaylord Texan Resort, Grapevine, TX, USA, March 26–28 (2007).
11.
go back to reference Ayoade, J., Security Implications in RFID and Authentication Processing Framework. Computers & Security 25(3):207–212, 2006.CrossRef Ayoade, J., Security Implications in RFID and Authentication Processing Framework. Computers & Security 25(3):207–212, 2006.CrossRef
12.
go back to reference C.-H. Kuo, H.-G. Chen, The Critical Issues about Deploying RFID in Healthcare Industry by Service Perspective, Proceedings of The 41st Hawaii International Conference on System Sciences. (2008). C.-H. Kuo, H.-G. Chen, The Critical Issues about Deploying RFID in Healthcare Industry by Service Perspective, Proceedings of The 41st Hawaii International Conference on System Sciences. (2008).
13.
go back to reference H.-Y. Chien, Secure Access Control Schemes for RFID Systems with Anonymity, International Conference On Mobile Data Management. (2006) 96–99. H.-Y. Chien, Secure Access Control Schemes for RFID Systems with Anonymity, International Conference On Mobile Data Management. (2006) 96–99.
14.
go back to reference X. Gao, Z. Xiang, H. Wang, J. Shen, J. Huang, S.Song, An Approach to Security and Privacy of RFID System for Supply Chain, The E-Commerce Technology for Dynamic E-Business. (2004) 164–168. X. Gao, Z. Xiang, H. Wang, J. Shen, J. Huang, S.Song, An Approach to Security and Privacy of RFID System for Supply Chain, The E-Commerce Technology for Dynamic E-Business. (2004) 164–168.
15.
go back to reference H.-W. Kim, S.-Y. Lim, H.-J. Lee, Symmetric Encryption in RFID Authentication Protocol for Strong Location Privacy and Forward-Security, IEEE International Conference on Hybrid Information Technology (ICHIT′06). (2006) 718–723. H.-W. Kim, S.-Y. Lim, H.-J. Lee, Symmetric Encryption in RFID Authentication Protocol for Strong Location Privacy and Forward-Security, IEEE International Conference on Hybrid Information Technology (ICHIT′06). (2006) 718–723.
16.
go back to reference H.-S. Kim, J.-H. Oh, J.-Y. Choi, Analysis of The RFID Security Protocol for Secure Smart Home Network, International Conference on Hybrid Information Technology(ICHIT′06). 2 (2006) 356–363. H.-S. Kim, J.-H. Oh, J.-Y. Choi, Analysis of The RFID Security Protocol for Secure Smart Home Network, International Conference on Hybrid Information Technology(ICHIT′06). 2 (2006) 356–363.
17.
go back to reference S.A. Weis, Security and Privacy in Radio-Frequency Identification Devices, Master’s Thesis, Massachusetts Institute of Technology. (2003). S.A. Weis, Security and Privacy in Radio-Frequency Identification Devices, Master’s Thesis, Massachusetts Institute of Technology. (2003).
18.
go back to reference S.A. Weis, S.E. Sarma, R.L. Rivest, D.W. Engels, Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems, International Conference on Security in Pervasive Computing, Lecture Notes in Computer Science. (2004) 201–212. S.A. Weis, S.E. Sarma, R.L. Rivest, D.W. Engels, Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems, International Conference on Security in Pervasive Computing, Lecture Notes in Computer Science. (2004) 201–212.
19.
go back to reference Zhang, L., Zhou, H., Kong, R., and Yang, F., An Improved Approach to Security And Privacy of RFID Application System, International Conference on Wireless Communications. Networking and Mobile Computing. 2:1195–1198, 2005. Zhang, L., Zhou, H., Kong, R., and Yang, F., An Improved Approach to Security And Privacy of RFID Application System, International Conference on Wireless Communications. Networking and Mobile Computing. 2:1195–1198, 2005.
Metadata
Title
A Design of Tamper Resistant Prescription RFID Access Control System
Authors
Yu-Yi Chen
Der-Chen Huang
Meng-Lin Tsai
Jinn-Ke Jan
Publication date
01-10-2012
Publisher
Springer US
Published in
Journal of Medical Systems / Issue 5/2012
Print ISSN: 0148-5598
Electronic ISSN: 1573-689X
DOI
https://doi.org/10.1007/s10916-011-9758-2

Other articles of this Issue 5/2012

Journal of Medical Systems 5/2012 Go to the issue