Skip to main content
Erschienen in: Journal of Medical Systems 5/2014

01.05.2014 | Patient Facing Systems

An Efficient RFID Authentication Protocol to Enhance Patient Medication Safety Using Elliptic Curve Cryptography

verfasst von: Zezhong Zhang, Qingqing Qi

Erschienen in: Journal of Medical Systems | Ausgabe 5/2014

Einloggen, um Zugang zu erhalten

Abstract

Medication errors are very dangerous even fatal since it could cause serious even fatal harm to patients. In order to reduce medication errors, automated patient medication systems using the Radio Frequency Identification (RFID) technology have been used in many hospitals. The data transmitted in those medication systems is very important and sensitive. In the past decade, many security protocols have been proposed to ensure its secure transition attracted wide attention. Due to providing mutual authentication between the medication server and the tag, the RFID authentication protocol is considered as the most important security protocols in those systems. In this paper, we propose a RFID authentication protocol to enhance patient medication safety using elliptic curve cryptography (ECC). The analysis shows the proposed protocol could overcome security weaknesses in previous protocols and has better performance. Therefore, the proposed protocol is very suitable for automated patient medication systems.
Literatur
1.
Zurück zum Zitat Annual report. Technical report, London School of Hygiene and Tropical Medicine report, 2012. Annual report. Technical report, London School of Hygiene and Tropical Medicine report, 2012.
2.
Zurück zum Zitat Hung, Y. K., The study of adopting RFID technology in medical institute with the perspectives of cost benefit. International Medical Informatics Symposium in Taiwan, Taiwan, 2007. Hung, Y. K., The study of adopting RFID technology in medical institute with the perspectives of cost benefit. International Medical Informatics Symposium in Taiwan, Taiwan, 2007.
3.
Zurück zum Zitat Katz, J. E., and Rice, R. E., Public views of mobile medical devices and services: a US national survey of consumer sentiments towards RFID healthcare technology. Int. J. Med. Inform. 78(2):104–114, 2009.CrossRef Katz, J. E., and Rice, R. E., Public views of mobile medical devices and services: a US national survey of consumer sentiments towards RFID healthcare technology. Int. J. Med. Inform. 78(2):104–114, 2009.CrossRef
4.
Zurück zum Zitat Yu, C., Chen, C., Liao, P., and Lee, Y., RFID-based operation room and medicare system for patient safety enhancement—a case study of keelung branch. J. Inf. Manag. 15:97–122, 2008. Yu, C., Chen, C., Liao, P., and Lee, Y., RFID-based operation room and medicare system for patient safety enhancement—a case study of keelung branch. J. Inf. Manag. 15:97–122, 2008.
5.
Zurück zum Zitat Leu, J. G., The benefit analysis of RFID use in the health management center—The experience in Shin Kong Wu Ho-Su Memorial Hospital. National Taiwan University, 2010. Leu, J. G., The benefit analysis of RFID use in the health management center—The experience in Shin Kong Wu Ho-Su Memorial Hospital. National Taiwan University, 2010.
6.
Zurück zum Zitat Najera, P., Lopez, J., and Roman, R., Real-time location and inpatient care systems based on passive RFID. J. Netw. Comput. Appl. 34(3):980–989, 2011.CrossRef Najera, P., Lopez, J., and Roman, R., Real-time location and inpatient care systems based on passive RFID. J. Netw. Comput. Appl. 34(3):980–989, 2011.CrossRef
7.
Zurück zum Zitat He, D., Chen, J., and Zhang, R., A more secure authentication scheme for telecare medicine information systems. Journal of Medical Systems 36(3):1989–1995, 2012.CrossRef He, D., Chen, J., and Zhang, R., A more secure authentication scheme for telecare medicine information systems. Journal of Medical Systems 36(3):1989–1995, 2012.CrossRef
8.
Zurück zum Zitat Zhu, Z., An efficient authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3833–3838, 2012.CrossRef Zhu, Z., An efficient authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3833–3838, 2012.CrossRef
9.
Zurück zum Zitat Wei, J. G., Hu, X., and Liu, W., An improved authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3597–3604, 2012.CrossRef Wei, J. G., Hu, X., and Liu, W., An improved authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3597–3604, 2012.CrossRef
10.
Zurück zum Zitat Pu, Q., Wang, J., and Zhao, R., Strong authentication scheme for telecare medicine information systems. J. Med. Syst. 36(4):2609–2619, 2012.CrossRef Pu, Q., Wang, J., and Zhao, R., Strong authentication scheme for telecare medicine information systems. J. Med. Syst. 36(4):2609–2619, 2012.CrossRef
11.
Zurück zum Zitat Chen, H.-M., Lo, J.-W., and Yeh, C.-K., An efficient and secure dynamic ID-based authentication scheme for telecare medical information systems. J. Med. Syst. 36(6):3907–3915, 2012.CrossRef Chen, H.-M., Lo, J.-W., and Yeh, C.-K., An efficient and secure dynamic ID-based authentication scheme for telecare medical information systems. J. Med. Syst. 36(6):3907–3915, 2012.CrossRef
12.
Zurück zum Zitat Zhao, Z., An efficient anonymous authentication scheme for wireless body area networks using elliptic curve cryptosystem. J. Med. Syst. 38:13, 2014.CrossRef Zhao, Z., An efficient anonymous authentication scheme for wireless body area networks using elliptic curve cryptosystem. J. Med. Syst. 38:13, 2014.CrossRef
13.
Zurück zum Zitat Huang, H. H., and Ku, C. Y., A rfid grouping proof protocol for medication safety of inpatient. J. Med. Syst. 33(6):467–474, 2009.CrossRef Huang, H. H., and Ku, C. Y., A rfid grouping proof protocol for medication safety of inpatient. J. Med. Syst. 33(6):467–474, 2009.CrossRef
14.
Zurück zum Zitat Chien, H. Y., Yang, C. C., Wu, T. C., and Lee, C. F., Two rfid based solutions to enhance inpatient medication safety. J. Med. Syst. 35(3):369–375, 2011.CrossRef Chien, H. Y., Yang, C. C., Wu, T. C., and Lee, C. F., Two rfid based solutions to enhance inpatient medication safety. J. Med. Syst. 35(3):369–375, 2011.CrossRef
15.
Zurück zum Zitat Peris-Lopez, P., Orfila, A., Mitrokotsa, A., and van der Lubbe, J. C., A comprehensive rfid solution to enhance inpatient medication safety. Int. J. Med. Inform. 80(1):13–24, 2011.CrossRef Peris-Lopez, P., Orfila, A., Mitrokotsa, A., and van der Lubbe, J. C., A comprehensive rfid solution to enhance inpatient medication safety. Int. J. Med. Inform. 80(1):13–24, 2011.CrossRef
16.
Zurück zum Zitat Chen, Y. Y., Wang, Y. J., and Jan, J. K., A secure 2G-RFID-Sys mechanism for applying to the medical emergency system. J. Med. Syst. 37(3):1–10, 2013.CrossRef Chen, Y. Y., Wang, Y. J., and Jan, J. K., A secure 2G-RFID-Sys mechanism for applying to the medical emergency system. J. Med. Syst. 37(3):1–10, 2013.CrossRef
17.
Zurück zum Zitat Safkhani, M., Bagheri, N., and Naderi, M., On the designing of a tamper resistant prescription rfid access control system. J. Med. Syst. 36(6):3995–4004, 2012.CrossRef Safkhani, M., Bagheri, N., and Naderi, M., On the designing of a tamper resistant prescription rfid access control system. J. Med. Syst. 36(6):3995–4004, 2012.CrossRef
18.
Zurück zum Zitat Wu, Z., Chen, L., and Wu, J., A Reliable RFID Mutual Authentication Scheme for Healthcare Environments. Journal of Medical Systems 37, 9917, 2013.CrossRef Wu, Z., Chen, L., and Wu, J., A Reliable RFID Mutual Authentication Scheme for Healthcare Environments. Journal of Medical Systems 37, 9917, 2013.CrossRef
19.
Zurück zum Zitat Picazo-Sanchez, P., Bagheri, N., and Peris-Lopez, P., Two RFID Standard-based Security Protocols for Healthcare Environments. Journal of Medical Systems 37, 9962, 2013.CrossRef Picazo-Sanchez, P., Bagheri, N., and Peris-Lopez, P., Two RFID Standard-based Security Protocols for Healthcare Environments. Journal of Medical Systems 37, 9962, 2013.CrossRef
20.
Zurück zum Zitat Tuyls, P., and Batina, L., RFID-tags for Anti-Counterfeiting. In: Topics in cryptology-CT-RSA 2006, 115–131, 2006. Tuyls, P., and Batina, L., RFID-tags for Anti-Counterfeiting. In: Topics in cryptology-CT-RSA 2006, 115–131, 2006.
21.
Zurück zum Zitat Batina, L., Guajardo, J., Kerins, T., Mentens, N., Tuyls, P., and Verbauwhede, I., Public-key cryptography for RFID-tags. Fifth annual IEEE international conference on PerCom workshops’ 07. IEEE, pp 217–222, 2007. Batina, L., Guajardo, J., Kerins, T., Mentens, N., Tuyls, P., and Verbauwhede, I., Public-key cryptography for RFID-tags. Fifth annual IEEE international conference on PerCom workshops’ 07. IEEE, pp 217–222, 2007.
22.
Zurück zum Zitat Lee, Y., Batina, L., and Verbauwhede, I., EC-RAC (ECDLP based randomized access control): provably secure RFID authentication protocol. In: 2008 I.E. international conference on RFID. IEEE, pp 97–104, 2008. Lee, Y., Batina, L., and Verbauwhede, I., EC-RAC (ECDLP based randomized access control): provably secure RFID authentication protocol. In: 2008 I.E. international conference on RFID. IEEE, pp 97–104, 2008.
25.
Zurück zum Zitat Chou, J.-S., A secure RFID authentication protocol to enhance patient medication safety using elliptic curve cryptography. J. Supercomput. 2014. doi:10.1007/s11227-013-1073-x. Chou, J.-S., A secure RFID authentication protocol to enhance patient medication safety using elliptic curve cryptography. J. Supercomput. 2014. doi:10.​1007/​s11227-013-1073-x.
26.
Zurück zum Zitat Han, W., and Zhu, Z., An ID-based mutual authentication with key agreement protocol for multiserver environment on elliptic curve cryptosystem. Int. J. Commun. Syst. 2012. doi:10.1002/dac.2405. Han, W., and Zhu, Z., An ID-based mutual authentication with key agreement protocol for multiserver environment on elliptic curve cryptosystem. Int. J. Commun. Syst. 2012. doi:10.​1002/​dac.​2405.
27.
Zurück zum Zitat He, D., Chen, J., and Hu, J., An ID-based client authentication with key agreement protocol for mobile client–server environment on ECC with provable security. Inf Fusion 13(3):223–230, 2012.CrossRef He, D., Chen, J., and Hu, J., An ID-based client authentication with key agreement protocol for mobile client–server environment on ECC with provable security. Inf Fusion 13(3):223–230, 2012.CrossRef
29.
Zurück zum Zitat He, D., Kumar, N., Khan, M. K., and Lee, J.-H., Anonymous two-factor authentication for consumer roaming service in Global Mobility Networks. IEEE Trans. Consum. Electron. 59(4):811–817, 2013.CrossRef He, D., Kumar, N., Khan, M. K., and Lee, J.-H., Anonymous two-factor authentication for consumer roaming service in Global Mobility Networks. IEEE Trans. Consum. Electron. 59(4):811–817, 2013.CrossRef
30.
Zurück zum Zitat Godor G, Giczi N, Imre S (2010) Elliptic curve cryptography based mutual authentication protocol for lowcomputational capacity RFID systems-performance analysis by simulations. In: IEEE international conference on wireless communications, networking and information security (WCNIS), 2010. IEEE, pp 650–657 Godor G, Giczi N, Imre S (2010) Elliptic curve cryptography based mutual authentication protocol for lowcomputational capacity RFID systems-performance analysis by simulations. In: IEEE international conference on wireless communications, networking and information security (WCNIS), 2010. IEEE, pp 650–657
Metadaten
Titel
An Efficient RFID Authentication Protocol to Enhance Patient Medication Safety Using Elliptic Curve Cryptography
verfasst von
Zezhong Zhang
Qingqing Qi
Publikationsdatum
01.05.2014
Verlag
Springer US
Erschienen in
Journal of Medical Systems / Ausgabe 5/2014
Print ISSN: 0148-5598
Elektronische ISSN: 1573-689X
DOI
https://doi.org/10.1007/s10916-014-0047-8

Weitere Artikel der Ausgabe 5/2014

Journal of Medical Systems 5/2014 Zur Ausgabe