Handbook of Applied Cryptography
Handbook of Applied Cryptography
Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards
Computer Standards & Interfaces
Public-Key Cryptography for RFID-Tags
PERCOMW '07 Proceedings of the Fifth IEEE International Conference on Pervasive Computing and Communications Workshops
A New Method to Guard Inpatient Medication Safety by the Implementation of RFID
Journal of Medical Systems
PRESENT: An Ultra-Lightweight Block Cipher
CHES '07 Proceedings of the 9th international workshop on Cryptographic Hardware and Embedded Systems
KATAN and KTANTAN -- A Family of Small and Efficient Hardware-Oriented Block Ciphers
CHES '09 Proceedings of the 11th International Workshop on Cryptographic Hardware and Embedded Systems
A RFID Grouping Proof Protocol for Medication Safety of Inpatient
Journal of Medical Systems
Radio frequency identification: a case study of healthcare organisations
International Journal of Security and Networks
An RFID network design methodology for asset tracking in healthcare
Decision Support Systems
RFID mutual authentication protocols
Decision Support Systems
A model for quantifying the value of RFID-enabled equipment tracking in hospitals
Advanced Engineering Informatics
Defending RFID authentication protocols against DoS attacks
Computer Communications
Leveraging complex event processing for smart hospitals using RFID
Journal of Network and Computer Applications
Real-time location and inpatient care systems based on passive RFID
Journal of Network and Computer Applications
Two RFID-based Solutions to Enhance Inpatient Medication Safety
Journal of Medical Systems
A comparative study of hardware architectures for lightweight block ciphers
Computers and Electrical Engineering
A case against currently used hash functions in RFID protocols
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part I
Secure multiple group ownership transfer protocol for mobile RFID
Electronic Commerce Research and Applications
Journal of Biomedical Informatics
Two RFID-Based Solutions for Secure Inpatient Medication Administration
Journal of Medical Systems
A Design of Tamper Resistant Prescription RFID Access Control System
Journal of Medical Systems
ECC-Based Grouping-Proof RFID for Inpatient Medication Safety
Journal of Medical Systems
The Adoption and Implementation of RFID Technologies in Healthcare: A Literature Review
Journal of Medical Systems
On the Designing of a Tamper Resistant Prescription RFID Access Control System
Journal of Medical Systems
RFID versus bar-coding systems: Transactions errors in health care apparel inventory control
Decision Support Systems
Simultaneous multi-level RFID tag ownership & transfer in health care environments
Decision Support Systems
Hi-index | 0.00 |
Radio Frequency Identification (RFID) systems are widely used in access control, transportation, real-time inventory and asset management, automated payment systems, etc. Nevertheless, the use of this technology is almost unexplored in healthcare environments, where potential applications include patient monitoring, asset traceability and drug administration systems, to mention just a few. RFID technology can offer more intelligent systems and applications, but privacy and security issues have to be addressed before its adoption. This is even more dramatical in healthcare applications where very sensitive information is at stake and patient safety is paramount. In Wu et al. (J. Med. Syst. 37:19, 43) recently proposed a new RFID authentication protocol for healthcare environments. In this paper we show that this protocol puts location privacy of tag holders at risk, which is a matter of gravest concern and ruins the security of this proposal. To facilitate theimplementation of secure RFID-based solutions in the medical sector, we suggest two new applications (authentication and secure messaging) and propose solutions that, in contrast to previous proposals in this field, are fully based on ISO Standards and NIST Security Recommendations.