Skip to main content
Top
Published in: Journal of Medical Systems 2/2013

01-04-2013 | Original Paper

A Reliable RFID Mutual Authentication Scheme for Healthcare Environments

Authors: Zhen-Yu Wu, Lichin Chen, Ju-Chuan Wu

Published in: Journal of Medical Systems | Issue 2/2013

Login to get access

Abstract

Radio frequency identification (RFID) applications have the potential to increase the reliability of healthcare environments. However, there are obvious security and privacy concerns with regard to storing personal and medical data in RFID tags, and the lack of secure authentication systems in healthcare environments remains as a challenge the further use of this technology, one that touches on issues of confidentiality, unforgeability, location privacy, and scalability. This study proposes a novel mutual authentication protocol that considers all of these issues and solves the tradeoff between location privacy and scalability in healthcare environments. A formal proof and analysis is demonstrated to prove the effectiveness of the proposed scheme, and that high reliability has and can be easily deployed and managed. This study also provides a scenario example that applied proposed protocol in the newborn care and management. The result shows that the proposed scheme solves the related tradeoff problem, and is capable of providing both location privacy and scalability. To apply the authentication scheme proposed in this work would be able to increase confidence in future implementations of RFID systems in healthcare environments.
Literature
1.
go back to reference Wang, S. W., Chen, W. H., Ong, C. S., Liu, L., and Chuang, Y. W., RFID application in hospitals: a case study on a demonstration RFID project in a Taiwan hospital. In: Hawaii International Conference on System Sciences. IEEE, pp. 184a–194a, 2006. Wang, S. W., Chen, W. H., Ong, C. S., Liu, L., and Chuang, Y. W., RFID application in hospitals: a case study on a demonstration RFID project in a Taiwan hospital. In: Hawaii International Conference on System Sciences. IEEE, pp. 184a–194a, 2006.
2.
go back to reference Hwang, M. S., Wei, C. H., and Lee, C. Y., Privacy and security requirements for RFID applications. J. Comput. 20(3):55–60, 2009. Hwang, M. S., Wei, C. H., and Lee, C. Y., Privacy and security requirements for RFID applications. J. Comput. 20(3):55–60, 2009.
3.
go back to reference Najera, P., Lopez, J., and Roman, R., Real-time location and inpatient care systems based on passive RFID. J. Netw. Comput. Appl. 34(3):980–989, 2011.CrossRef Najera, P., Lopez, J., and Roman, R., Real-time location and inpatient care systems based on passive RFID. J. Netw. Comput. Appl. 34(3):980–989, 2011.CrossRef
5.
go back to reference Collins, J., Hospital gets ultra-wideband RFID. RFID J, 2004. Collins, J., Hospital gets ultra-wideband RFID. RFID J, 2004.
6.
go back to reference Jeong, B., Cheng, C., Prabhu, V., and Yu, B., An RFID application model for surgery patient identification. IEEE, pp. 1–3, 2008. Jeong, B., Cheng, C., Prabhu, V., and Yu, B., An RFID application model for surgery patient identification. IEEE, pp. 1–3, 2008.
7.
go back to reference Glabman, M., Room for tracking. RFID technology finds the way. Mater. Manag. Health Care 13(5):26, 2004. Glabman, M., Room for tracking. RFID technology finds the way. Mater. Manag. Health Care 13(5):26, 2004.
8.
go back to reference Brewin, B., RFID gets FDA push. Fed. Comput. Week. 2004. Brewin, B., RFID gets FDA push. Fed. Comput. Week. 2004.
9.
go back to reference Thompson, C. A., Radio frequency tags for identifying legitimate drug products discussed by tech industry. Am. J. Health Syst. Pharm. 61(14):1430–1432, 2004. Thompson, C. A., Radio frequency tags for identifying legitimate drug products discussed by tech industry. Am. J. Health Syst. Pharm. 61(14):1430–1432, 2004.
10.
go back to reference Katz, J. E., and Rice, R. E., Public views of mobile medical devices and services: A US national survey of consumer sentiments towards RFID healthcare technology. Int. J. Med. Inform. 78(2):104–114, 2009.CrossRef Katz, J. E., and Rice, R. E., Public views of mobile medical devices and services: A US national survey of consumer sentiments towards RFID healthcare technology. Int. J. Med. Inform. 78(2):104–114, 2009.CrossRef
11.
go back to reference Hung, Y. K., The study of adopting RFID technology in medical institute with the perspectives of cost benefit. International Medical Informatics Symposium in Taiwan, Taiwan, 2007. Hung, Y. K., The study of adopting RFID technology in medical institute with the perspectives of cost benefit. International Medical Informatics Symposium in Taiwan, Taiwan, 2007.
12.
go back to reference Leu, J. G., The benefit analysis of RFID use in the health management center—The experience in Shin Kong Wu Ho-Su Memorial Hospital. National Taiwan University, 2010. Leu, J. G., The benefit analysis of RFID use in the health management center—The experience in Shin Kong Wu Ho-Su Memorial Hospital. National Taiwan University, 2010.
13.
go back to reference Yu, C., Chen, C., Liao, P., and Lee, Y., RFID-based operation room and medicare system for patient safety enhancement—a case study of keelung branch. J. Inf. Manag. 15:97–122, 2008. Yu, C., Chen, C., Liao, P., and Lee, Y., RFID-based operation room and medicare system for patient safety enhancement—a case study of keelung branch. J. Inf. Manag. 15:97–122, 2008.
14.
go back to reference Barrows, R. C., Jr., and Clayton, P. D., Privacy, confidentiality, and electronic medical records. J. Am. Med. Inform. Assoc. 3(2):139–148, 1996.CrossRef Barrows, R. C., Jr., and Clayton, P. D., Privacy, confidentiality, and electronic medical records. J. Am. Med. Inform. Assoc. 3(2):139–148, 1996.CrossRef
15.
go back to reference Loomis, G. A., Ries, J. S., Saywell, R. M., and Thakker, N. R., If electronic medical records are so great, why aren’t family physicians using them? J. Fam. Pract. 51(7):636–641, 2002. Loomis, G. A., Ries, J. S., Saywell, R. M., and Thakker, N. R., If electronic medical records are so great, why aren’t family physicians using them? J. Fam. Pract. 51(7):636–641, 2002.
16.
go back to reference Chatmon, C., van Le, T., and Burmester, M., Secure anonymous RFID authentication protocols. Florida State University, Department of Computer Science, Tech Rep, pp. 1–10, 2006. Chatmon, C., van Le, T., and Burmester, M., Secure anonymous RFID authentication protocols. Florida State University, Department of Computer Science, Tech Rep, pp. 1–10, 2006.
17.
go back to reference Chien, H. Y., Secure access control schemes for RFID systems with anonymity. FMUIT′06, Japan, IEEE, pp. 96–96, 2006. Chien, H. Y., Secure access control schemes for RFID systems with anonymity. FMUIT′06, Japan, IEEE, pp. 96–96, 2006.
18.
go back to reference Luo, Z., Chan, T., and Li, J. S., A lightweight RFID protocol to protect against traceability and cloning attacks. IEEE International Conference on Security and Privacy for Emerging Areas in Communications Networks (ICEBE′05), IEEE, pp. 59–66, 2005. Luo, Z., Chan, T., and Li, J. S., A lightweight RFID protocol to protect against traceability and cloning attacks. IEEE International Conference on Security and Privacy for Emerging Areas in Communications Networks (ICEBE′05), IEEE, pp. 59–66, 2005.
19.
go back to reference Duc, D. N., Lee, H., and Kim, K., Enhancing security of EPCglobal Gen-2 RFID against traceability and cloning. Symposium on Cryptography and Information Security, 2006. Duc, D. N., Lee, H., and Kim, K., Enhancing security of EPCglobal Gen-2 RFID against traceability and cloning. Symposium on Cryptography and Information Security, 2006.
20.
go back to reference Henrici, D., and Muller, P., Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers. PerSec′04. IEEE, pp. 149–153, 2004. Henrici, D., and Muller, P., Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers. PerSec′04. IEEE, pp. 149–153, 2004.
21.
go back to reference Karthikeyan, S., and Nesterenko, M. RFID security without extensive cryptography. SASN, 2005. ACM, pp. 63–67, 2005. Karthikeyan, S., and Nesterenko, M. RFID security without extensive cryptography. SASN, 2005. ACM, pp. 63–67, 2005.
22.
go back to reference Lee, S., Asano, T., and Kim, K., RFID Mutual Authentication Scheme based on Synchronized Secret Information. Symposium on Cryptography and Information Security, Hiroshima, p. 98, 2006. Lee, S., Asano, T., and Kim, K., RFID Mutual Authentication Scheme based on Synchronized Secret Information. Symposium on Cryptography and Information Security, Hiroshima, p. 98, 2006.
23.
go back to reference Lee, Y. K., and Verbauwhede, I., Secure and low-cost RFID authentication protocols. In: Adaptive Wireless Networks (AWiN). Florida State University, Department of Computer Science, Tallahassee, Florida, USA, pp. 1–5, 2005. Lee, Y. K., and Verbauwhede, I., Secure and low-cost RFID authentication protocols. In: Adaptive Wireless Networks (AWiN). Florida State University, Department of Computer Science, Tallahassee, Florida, USA, pp. 1–5, 2005.
24.
go back to reference Luo, Z., Chan, T., and Li, J. S., A lightweight mutual authentication protocol for RFID networks. IEEE, pp. 620–625, 2005. Luo, Z., Chan, T., and Li, J. S., A lightweight mutual authentication protocol for RFID networks. IEEE, pp. 620–625, 2005.
25.
go back to reference Lee, S., Hwang, Y., Lee, D., and Lim, J., Efficient authentication for low-cost RFID systems. Computational Science and Its Applications (ICCSA):619–627, 2005. Lee, S., Hwang, Y., Lee, D., and Lim, J., Efficient authentication for low-cost RFID systems. Computational Science and Its Applications (ICCSA):619–627, 2005.
26.
go back to reference Molnar, D., and Wagner, D., Privacy and security in library RFID: Issues, practices, and architectures. ACM, pp. 210–219, 2004. Molnar, D., and Wagner, D., Privacy and security in library RFID: Issues, practices, and architectures. ACM, pp. 210–219, 2004.
27.
go back to reference Ohkubo, M., Suzuki, K., and Kinoshita, S., Cryptographic approach to “privacy-friendly” tags. MIT, Cambridge, 2003. Ohkubo, M., Suzuki, K., and Kinoshita, S., Cryptographic approach to “privacy-friendly” tags. MIT, Cambridge, 2003.
28.
go back to reference Weis, S., Sarma, S., Rivest, R., and Engels, D., Security and privacy aspects of low-cost radio frequency identification systems. Security in pervasive computing. pp. 50–59, 2004. Weis, S., Sarma, S., Rivest, R., and Engels, D., Security and privacy aspects of low-cost radio frequency identification systems. Security in pervasive computing. pp. 50–59, 2004.
29.
go back to reference Overbey, J., Traves, W., and Wojdylo, J., On the keyspace of the Hill cipher. Cryptologia 29(1):59–72, 2005.CrossRef Overbey, J., Traves, W., and Wojdylo, J., On the keyspace of the Hill cipher. Cryptologia 29(1):59–72, 2005.CrossRef
30.
go back to reference Shoup, V. Sequences of games: a tool for taming complexity in security proofs. cryptology eprint archive, report 2004/332, 2004. Shoup, V. Sequences of games: a tool for taming complexity in security proofs. cryptology eprint archive, report 2004/332, 2004.
31.
go back to reference Dimitriou, T., A lightweight RFID protocol to protect against traceability and cloning attacks. First International Conference on Security and Privacy for Emerging Areas in Communications Networks (Secure Comm 2005), IEEE, pp. 59–66, 2005. Dimitriou, T., A lightweight RFID protocol to protect against traceability and cloning attacks. First International Conference on Security and Privacy for Emerging Areas in Communications Networks (Secure Comm 2005), IEEE, pp. 59–66, 2005.
Metadata
Title
A Reliable RFID Mutual Authentication Scheme for Healthcare Environments
Authors
Zhen-Yu Wu
Lichin Chen
Ju-Chuan Wu
Publication date
01-04-2013
Publisher
Springer US
Published in
Journal of Medical Systems / Issue 2/2013
Print ISSN: 0148-5598
Electronic ISSN: 1573-689X
DOI
https://doi.org/10.1007/s10916-012-9917-0

Other articles of this Issue 2/2013

Journal of Medical Systems 2/2013 Go to the issue