Skip to main content
Top
Published in: Journal of Medical Systems 6/2013

01-12-2013 | Original Paper

RFID Authentication Protocol to Enhance Patient Medication Safety

Authors: Sonam Devgan Kaul, Amit K. Awasthi

Published in: Journal of Medical Systems | Issue 6/2013

Login to get access

Abstract

Medication errors can cause substantial harm to patients. Automated patient medication system with RFID technology is purposely used to reduce the medication error, to improve the patient safety, to provide personalized patient medication and identification and also to provide counterfeit protection to the patients. In order to enhance medication safety for patients we propose a new dynamic ID based lightweight RFID authentication protocol. Due to low storage capacity and limited computational and communicational capacity of tags, only pseudo random number generator function, one way hash function and bitwise Xor operation are used in our authentication protocol. The proposed protocol is practical, secure and efficient for health care domain.
Literature
1.
go back to reference Annual report. Technical report, London School of Hygiene and Tropical Medicine report, 2012. Annual report. Technical report, London School of Hygiene and Tropical Medicine report, 2012.
2.
go back to reference Chen, C. L., and Deng, Y. L., Conformation of epc class-1 generation-2 standards rfid system with mutual authentication and privacy protection. Eng. Appl. Artif. Intell. 22(8):1284–1291, 2009. Chen, C. L., and Deng, Y. L., Conformation of epc class-1 generation-2 standards rfid system with mutual authentication and privacy protection. Eng. Appl. Artif. Intell. 22(8):1284–1291, 2009.
3.
go back to reference Chien, H., Yang, C., Wu, T., and Lee, C., Two rfid-based solutions to enhance inpatient medication safety. J. Med. Syst. 35(3):369–375, 2011. Chien, H., Yang, C., Wu, T., and Lee, C., Two rfid-based solutions to enhance inpatient medication safety. J. Med. Syst. 35(3):369–375, 2011.
4.
go back to reference Chien, H. Y., \(SAS1\): A new ultralightweight rfid authentication protocol providing strong authentication and strong integrity. IEEE Trans. Dependable Secure Comput. 4(4):337–340, 2007. Chien, H. Y., \(SAS1\): A new ultralightweight rfid authentication protocol providing strong authentication and strong integrity. IEEE Trans. Dependable Secure Comput. 4(4):337–340, 2007.
5.
go back to reference Chien, H., and Chen, C., Mutual authentication protocol for rfid confirming to epc class 1 generation 2 standard. Comput. Stand. Interface 29(2):254–259, 2007. Chien, H., and Chen, C., Mutual authentication protocol for rfid confirming to epc class 1 generation 2 standard. Comput. Stand. Interface 29(2):254–259, 2007.
6.
go back to reference Henrici, D., and Muller, P., Hash based enhancement of location privacy for radio frequency identification devices using varying identifiers. International Workshop on Pervasive Computing and Communication Security - PerSec 2004, IEEE Computer Society, 149–153, 2004. Henrici, D., and Muller, P., Hash based enhancement of location privacy for radio frequency identification devices using varying identifiers. International Workshop on Pervasive Computing and Communication Security - PerSec 2004, IEEE Computer Society, 149–153, 2004.
7.
go back to reference Huang, H. H., and Ku, C. Y., A rfid grouping proof protocol for medication safety of inpatient. J. Med. Syst. 33(6):467–474, 2009. Huang, H. H., and Ku, C. Y., A rfid grouping proof protocol for medication safety of inpatient. J. Med. Syst. 33(6):467–474, 2009.
8.
go back to reference Juels, A., “yoking proofs” for rfid tags. First International Workshop on Pervasive Computing and Communication Security, IEEE Computer Society, 138–143, 2004. Juels, A., “yoking proofs” for rfid tags. First International Workshop on Pervasive Computing and Communication Security, IEEE Computer Society, 138–143, 2004.
9.
go back to reference Juels, A., Rivest, R. L., and Szudlo, M., The blocker tag: selective blocking of rfid tags for consumer privacy. The 8th ACM Conference on Computer and Communications Security, 103–111, 2003. Juels, A., Rivest, R. L., and Szudlo, M., The blocker tag: selective blocking of rfid tags for consumer privacy. The 8th ACM Conference on Computer and Communications Security, 103–111, 2003.
10.
go back to reference Lee, S. M., Hwang, Y. J., Lee, D. H., and Lim, J. I., Efficient authentication for low-cost rfid systems. International Conference on Computational Science and its Applications - ICCSA 2005, Springer Verlag, 3480:619–629, 2005. Lee, S. M., Hwang, Y. J., Lee, D. H., and Lim, J. I., Efficient authentication for low-cost rfid systems. International Conference on Computational Science and its Applications - ICCSA 2005, Springer Verlag, 3480:619–629, 2005.
11.
go back to reference Lee, Y. C., Hsieh, Y. C., You, P., and Chen, T. C., A new ultralightweight rfid protocol with mutual authentication. In: Proc. of WASE’09, 2:58–61, 2009. Lee, Y. C., Hsieh, Y. C., You, P., and Chen, T. C., A new ultralightweight rfid protocol with mutual authentication. In: Proc. of WASE’09, 2:58–61, 2009.
12.
go back to reference Li, Y. Z., Cho, Y. B., Um, N. K., and Lee, S. H., Security and privacy on authentication protocol for low-cost rfid. IEEE Int. Conf. Comput. Intell. Secur. 2:1101–1104, 2006. Li, Y. Z., Cho, Y. B., Um, N. K., and Lee, S. H., Security and privacy on authentication protocol for low-cost rfid. IEEE Int. Conf. Comput. Intell. Secur. 2:1101–1104, 2006.
13.
go back to reference Lim, C., and Kwon, T., Strong and robust rfid authentication enabling perfect ownership transfer. Information and Communications Security, Lecture Notes in Computer Science, Springer, 4307:1–20, 2006. Lim, C., and Kwon, T., Strong and robust rfid authentication enabling perfect ownership transfer. Information and Communications Security, Lecture Notes in Computer Science, Springer, 4307:1–20, 2006.
14.
go back to reference Lo, N. W., and Yeh, K. H., Anonymous coexistence proofs for rfid tags. J. Inf. Sci. Eng. 26(4):1213–1230, 2010. Lo, N. W., and Yeh, K. H., Anonymous coexistence proofs for rfid tags. J. Inf. Sci. Eng. 26(4):1213–1230, 2010.
15.
go back to reference Molnar, D., Soppera, A., and Wagner, D., A scalable, delegatable pseudonym protocol enabling ownership transfer of rfid tags. Proc. Workshop on Selected Areas in Cyptography, LNCS Springer, SAC2005, 3897, 2006. Molnar, D., Soppera, A., and Wagner, D., A scalable, delegatable pseudonym protocol enabling ownership transfer of rfid tags. Proc. Workshop on Selected Areas in Cyptography, LNCS Springer, SAC2005, 3897, 2006.
16.
go back to reference Morshed, M. M., Atkins, A., and Yu, H., Secure ubiquitous authentication protocols for rfid systems. EURASIP Journal on Wireless Communications and Networking, (doi:10.1186/1687-1499-2012-93): 1–35, 2012. Morshed, M. M., Atkins, A., and Yu, H., Secure ubiquitous authentication protocols for rfid systems. EURASIP Journal on Wireless Communications and Networking, (doi:10.1186/1687-1499-2012-93): 1–35, 2012.
17.
go back to reference Okhubo, M., Suzuki, K., and Kinoshita, S., Cryptographic approach to privacy friendly tags. RFID Privacy Workshop, 2003. Okhubo, M., Suzuki, K., and Kinoshita, S., Cryptographic approach to privacy friendly tags. RFID Privacy Workshop, 2003.
18.
go back to reference Peris-Lopez, Orfila, A., Mitrokotsa, A., and der Lubbe, J. V., A comprehensive rfid solution to enhance inpatient medication safety. Int. J. Med. Inform. 80(1):13–24, 2011. Peris-Lopez, Orfila, A., Mitrokotsa, A., and der Lubbe, J. V., A comprehensive rfid solution to enhance inpatient medication safety. Int. J. Med. Inform. 80(1):13–24, 2011.
19.
go back to reference Peris-Lopez, P., Hernandez-Castro, J. C., Estevez-Tapiador, J. M., and Ribagorda, A., EMAP, An efficient mutual authentication protocol for low cost rfid tags. In: Proc. of IS’06, Springer Verlag, 4277:352–361, 2006. Peris-Lopez, P., Hernandez-Castro, J. C., Estevez-Tapiador, J. M., and Ribagorda, A., EMAP, An efficient mutual authentication protocol for low cost rfid tags. In: Proc. of IS’06, Springer Verlag, 4277:352–361, 2006.
20.
go back to reference P. Peris-Lopez, J. C. Hernandez-Castro, J. M. Estevez-Tapiador, and A. Ribagorda. LMAP: A real lightweight authentication protocol for low cost rfid tags. In Hand of Workshop on RFID and Lightweight Crypto, 2006. P. Peris-Lopez, J. C. Hernandez-Castro, J. M. Estevez-Tapiador, and A. Ribagorda. LMAP: A real lightweight authentication protocol for low cost rfid tags. In Hand of Workshop on RFID and Lightweight Crypto, 2006.
21.
go back to reference Peris-Lopez, P., Hernandez-Castro, J. C., Estevez-Tapiador, J. M., and Ribagorda, A., \(M^{2}AP\), A minimalist mutual authentication protocol for low cost rfid tags. In: Proc. of UIC’06, Springer Verlag, 4159:912–923, 2006. Peris-Lopez, P., Hernandez-Castro, J. C., Estevez-Tapiador, J. M., and Ribagorda, A., \(M^{2}AP\), A minimalist mutual authentication protocol for low cost rfid tags. In: Proc. of UIC’06, Springer Verlag, 4159:912–923, 2006.
22.
go back to reference Peris-Lopez, P., Hernandez-Castro, J. C., Estevez-Tapiador, J. M., and Ribagorda, A., Advances in ultralightweight cryptography for low cost rfid tags: Gossamer protocol. In: Proc. of WISA’08, Springer Verlag, 5379:56–68, 2008. Peris-Lopez, P., Hernandez-Castro, J. C., Estevez-Tapiador, J. M., and Ribagorda, A., Advances in ultralightweight cryptography for low cost rfid tags: Gossamer protocol. In: Proc. of WISA’08, Springer Verlag, 5379:56–68, 2008.
23.
go back to reference Sandlin, D., Surgichip - new technology for prevensions of wrong site, wrong procedure, wrong person surgery. J. Perianesth Nurs. 20(2):144–146, 2005. Sandlin, D., Surgichip - new technology for prevensions of wrong site, wrong procedure, wrong person surgery. J. Perianesth Nurs. 20(2):144–146, 2005.
24.
go back to reference Song, B., and Mitchell, C. J., Rfid authentication protocol for low cost tags. WISEC’08, 140–147, 2008. Song, B., and Mitchell, C. J., Rfid authentication protocol for low cost tags. WISEC’08, 140–147, 2008.
25.
go back to reference Sun, P. R., Wang, B. H., and Wu, F., A new method to guard inpatient medication safety by the implementation of rfid. J. Med. Syst. 32(4):327–332, 2008. Sun, P. R., Wang, B. H., and Wu, F., A new method to guard inpatient medication safety by the implementation of rfid. J. Med. Syst. 32(4):327–332, 2008.
26.
go back to reference Weis, S. A., Sarma, S. E., Rivest, R. L., and Engles, D. W., Security and privacy aspects of low-cost radio frequency identification systems. Security in Pervasive Computing - SPC 2003, Springer-Verlag, 2802:201–212, 2003. Weis, S. A., Sarma, S. E., Rivest, R. L., and Engles, D. W., Security and privacy aspects of low-cost radio frequency identification systems. Security in Pervasive Computing - SPC 2003, Springer-Verlag, 2802:201–212, 2003.
27.
go back to reference Wu, F., Kuo, F., and Liu, L. W., The application of rfid on drug safety of inpatient nursing healthcare. ICEC ’05 Proceedings of the 7th international conference on Electronic commerce, 85–92, 2005. Wu, F., Kuo, F., and Liu, L. W., The application of rfid on drug safety of inpatient nursing healthcare. ICEC ’05 Proceedings of the 7th international conference on Electronic commerce, 85–92, 2005.
28.
go back to reference Yeh, K., Lo, N., and Winata, E., An efficient ultralightweight authentication protocol for rfid systems. Workshop on RFID Security, 49–60, 2010. Yeh, K., Lo, N., and Winata, E., An efficient ultralightweight authentication protocol for rfid systems. Workshop on RFID Security, 49–60, 2010.
29.
go back to reference Yu, Y., Hou, T., and Chiang, T., Low cost rfid real lightweight binding proof protocol for medication errors and patient safety. J. Med. Syst. 36(2):823–828, 2012. Yu, Y., Hou, T., and Chiang, T., Low cost rfid real lightweight binding proof protocol for medication errors and patient safety. J. Med. Syst. 36(2):823–828, 2012.
Metadata
Title
RFID Authentication Protocol to Enhance Patient Medication Safety
Authors
Sonam Devgan Kaul
Amit K. Awasthi
Publication date
01-12-2013
Publisher
Springer US
Published in
Journal of Medical Systems / Issue 6/2013
Print ISSN: 0148-5598
Electronic ISSN: 1573-689X
DOI
https://doi.org/10.1007/s10916-013-9979-7

Other articles of this Issue 6/2013

Journal of Medical Systems 6/2013 Go to the issue