The blocker tag: selective blocking of RFID tags for consumer privacy
Proceedings of the 10th ACM conference on Computer and communications security
Soft blocking: flexible blocker tags on the cheap
Proceedings of the 2004 ACM workshop on Privacy in the electronic society
Privacy and security in library RFID: issues, practices, and architectures
Proceedings of the 11th ACM conference on Computer and communications security
RFID Privacy: An Overview of Problems and Proposed Solutions
IEEE Security and Privacy
RFID Application in Hospitals: A Case Study on a Demonstration RFID Project in a Taiwan Hospital
HICSS '06 Proceedings of the 39th Annual Hawaii International Conference on System Sciences - Volume 08
Is Your Cat Infected with a Computer Virus?
PERCOM '06 Proceedings of the Fourth Annual IEEE International Conference on Pervasive Computing and Communications
IEEE Internet Computing
Public-Key Cryptography for RFID-Tags
PERCOMW '07 Proceedings of the Fifth IEEE International Conference on Pervasive Computing and Communications Workshops
Attacks on time-of-flight distance bounding channels
WiSec '08 Proceedings of the first ACM conference on Wireless network security
ICSENG '08 Proceedings of the 2008 19th International Conference on Systems Engineering
Proceedings of the 15th ACM conference on Computer and communications security
Reverse-engineering a cryptographic RFID tag
SS'08 Proceedings of the 17th conference on Security symposium
Supporting recovery, privacy and security in RFID systems using a robust authentication protocol
Proceedings of the 2009 ACM symposium on Applied Computing
SmartDrawer: RFID-based smart medicine drawer for assistive environments
Proceedings of the 2nd International Conference on PErvasive Technologies Related to Assistive Environments
Wirelessly Pickpocketing a Mifare Classic Card
SP '09 Proceedings of the 2009 30th IEEE Symposium on Security and Privacy
Location Privacy in RFID Applications
Privacy in Location-Based Applications
An RFID Attacker Behavior Taxonomy
IEEE Pervasive Computing
EPC RFID tag security weaknesses and defenses: passport cards, enhanced drivers licenses, and beyond
Proceedings of the 16th ACM conference on Computer and communications security
Web based medicine intake tracking application
Proceedings of the 3rd International Conference on PErvasive Technologies Related to Assistive Environments
Classifying RFID attacks and defenses
Information Systems Frontiers
Integrated security framework for low cost RFID tags
SAICSIT '10 Proceedings of the 2010 Annual Research Conference of the South African Institute of Computer Scientists and Information Technologists
Design of a secure distance-bounding channel for RFID
Journal of Network and Computer Applications
Security and privacy in RFID and applications in telemedicine
IEEE Communications Magazine
RFID security and privacy: a research survey
IEEE Journal on Selected Areas in Communications
RFID-Enabled Healthcare Applications, Issues and Benefits: An Archival Analysis (1997---2011)
Journal of Medical Systems
Adding Intelligence to Mobile Asset Management in Hospitals: The True Value of RFID
Journal of Medical Systems
A Cloud System for Mobile Medical Services of Traditional Chinese Medicine
Journal of Medical Systems
Hi-index | 0.00 |
Radio frequency identification (RFID) is a form of wireless communication that is used to identify assets and people. RFID has significant benefits to the medical environment. However, serious security threats are present in RFID systems that must be addressed in a medical environment. Of particular interest are threats to patient privacy and safety based on interception of messages, interruption of communication, modification of data, and fabrication of messages and devices. This paper presents an overview of these security threats present in RFID systems in a medical environment and provides guidance on potential solutions to these threats. This paper provides a roadmap for researchers and implementers to address the security issues facing RFID in the medical space.