Skip to main content
Erschienen in: Journal of Medical Systems 6/2009

01.12.2009 | Original Paper

A RFID Grouping Proof Protocol for Medication Safety of Inpatient

verfasst von: Hsieh-Hong Huang, Cheng-Yuan Ku

Erschienen in: Journal of Medical Systems | Ausgabe 6/2009

Einloggen, um Zugang zu erhalten

Abstract

In order to provide enhanced medication safety for inpatients, the medical mechanism which adopts the modified grouping proof protocol is proposed in this paper. By using the grouping proof protocol, the medical staffs could confirm the authentication and integrity of a group of Radio-Frequency Identification (RFID) tags which are embedded on inpatient bracelets and the containers of drugs. This mechanism is designed to be compatible with EPCglobal Class-1 Generation-2 standard which is the most popular specification of RFID tags. Due to the light-weight computational capacity of passive tags, only the pseudo-random number generator (PRNG) and cyclic redundancy code (CRC) are allowed to be used in the communication protocol. Furthermore, a practical scenario of using this proposed mechanism in hospital to examine the medication safety is also presented.
Literatur
2.
Zurück zum Zitat Bolotnyy, L., Robins, G. (2006). Generalized yoking-proofs for a group of RFID tags. Proceedings of the 3rd Annual International Conference on Mobile and Ubiquitous Systems. pp. 1–4. Bolotnyy, L., Robins, G. (2006). Generalized yoking-proofs for a group of RFID tags. Proceedings of the 3rd Annual International Conference on Mobile and Ubiquitous Systems. pp. 1–4.
3.
Zurück zum Zitat Van de Castle, B., Kim, J., Pedreira, M. L. G., Paiva, A., Goossen, W., and Bates, D. W., Information technology and patient safety in nursing practice: an international perspective. Int. J. Med. Inform. 73:607–614, 2004 doi:10.1016/j.ijmedinf.2004.04.007.CrossRef Van de Castle, B., Kim, J., Pedreira, M. L. G., Paiva, A., Goossen, W., and Bates, D. W., Information technology and patient safety in nursing practice: an international perspective. Int. J. Med. Inform. 73:607–614, 2004 doi:10.​1016/​j.​ijmedinf.​2004.​04.​007.CrossRef
5.
Zurück zum Zitat Chassin, M. R., and Becher, E. C., The wrong patient. Ann. Intern. Med. 136:11826–833, 2002. Chassin, M. R., and Becher, E. C., The wrong patient. Ann. Intern. Med. 136:11826–833, 2002.
9.
Zurück zum Zitat Duc, D. N., Park, J., Lee, H., Kim, K. (2006). Enhancing security of EPCglobal Gen-2 RFID tag against traceability and cloning. Proceedings of the 2006 Symposium on Cryptography and Information Security, pp. 97. Duc, D. N., Park, J., Lee, H., Kim, K. (2006). Enhancing security of EPCglobal Gen-2 RFID tag against traceability and cloning. Proceedings of the 2006 Symposium on Cryptography and Information Security, pp. 97.
11.
Zurück zum Zitat Huang, H.-H., Ku, C.-Y. (2005). A secure method for RFID with key tag in supply chain management. Proceedings of the 34th Annual Meeting of Western Decision Sciences Institute, pp. 460–462. Huang, H.-H., Ku, C.-Y. (2005). A secure method for RFID with key tag in supply chain management. Proceedings of the 34th Annual Meeting of Western Decision Sciences Institute, pp. 460–462.
12.
Zurück zum Zitat Janz, B. D., Pitts, M. G., and Otondo, R. F., Information systems and health care II: back to the future with RFID: lessons learned—some old, some new. Commun. Assoc. Inf. Syst. 15:132–148, 2005. Janz, B. D., Pitts, M. G., and Otondo, R. F., Information systems and health care II: back to the future with RFID: lessons learned—some old, some new. Commun. Assoc. Inf. Syst. 15:132–148, 2005.
13.
Zurück zum Zitat Juels, A. (2004a). Yoking-proofs for RFID tags. Proceedings of the First International Workshop on Pervasive Computing and Communication Security, pp. 138–143. Juels, A. (2004a). Yoking-proofs for RFID tags. Proceedings of the First International Workshop on Pervasive Computing and Communication Security, pp. 138–143.
14.
Zurück zum Zitat Juels, A. (2004b). Minimalist cryptography for low-cost RFID tags. Proceedings of the Fourth Conference on Security in Communication Networks, pp. 149–164. Juels, A. (2004b). Minimalist cryptography for low-cost RFID tags. Proceedings of the Fourth Conference on Security in Communication Networks, pp. 149–164.
17.
Zurück zum Zitat Liao, P.-C., Liu, L., Kuo, F., Jin, M.-H. (2006). Developing a patient safety based RFID information system—an empirical study in Taiwan. Proceedings of 2006 IEEE International Conference on Management of Innovation and Technology, pp. 585–589. Liao, P.-C., Liu, L., Kuo, F., Jin, M.-H. (2006). Developing a patient safety based RFID information system—an empirical study in Taiwan. Proceedings of 2006 IEEE International Conference on Management of Innovation and Technology, pp. 585–589.
18.
Zurück zum Zitat Perrin, R. A., and Simpson, N., RFID and bar codes—critical importance in enhancing safe patient care. J. Healthc. Inf. Manag. 18:433–39, 2004. Perrin, R. A., and Simpson, N., RFID and bar codes—critical importance in enhancing safe patient care. J. Healthc. Inf. Manag. 18:433–39, 2004.
19.
Zurück zum Zitat Piramuthu, S. (2006). On existence proofs for multiple RFID tags. Proceedings of the 2006 ACS/IEEE International Conference on Pervasive Services, pp. 317–320. Piramuthu, S. (2006). On existence proofs for multiple RFID tags. Proceedings of the 2006 ACS/IEEE International Conference on Pervasive Services, pp. 317–320.
21.
Zurück zum Zitat Saito, J., Sakurai, K. (2005). Grouping proof for RFID tags. Proceedings of the 19th International Conference on Advanced Information Networking and Applications, pp. 621–624. Saito, J., Sakurai, K. (2005). Grouping proof for RFID tags. Proceedings of the 19th International Conference on Advanced Information Networking and Applications, pp. 621–624.
24.
Zurück zum Zitat Weis, S. A. (2006). New foundations for efficient authentication, commutative cryptography, and private disjointness testing. Ph.D. Thesis of Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology. Weis, S. A. (2006). New foundations for efficient authentication, commutative cryptography, and private disjointness testing. Ph.D. Thesis of Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology.
25.
Zurück zum Zitat Wu, F., Kuo, F., Liu, L.-W. (2005). The application of RFID on drug safety of inpatient nursing healthcare. Proceedings of the 7th International Conference on Electronic Commerce, pp. 85–92 Wu, F., Kuo, F., Liu, L.-W. (2005). The application of RFID on drug safety of inpatient nursing healthcare. Proceedings of the 7th International Conference on Electronic Commerce, pp. 85–92
Metadaten
Titel
A RFID Grouping Proof Protocol for Medication Safety of Inpatient
verfasst von
Hsieh-Hong Huang
Cheng-Yuan Ku
Publikationsdatum
01.12.2009
Verlag
Springer US
Erschienen in
Journal of Medical Systems / Ausgabe 6/2009
Print ISSN: 0148-5598
Elektronische ISSN: 1573-689X
DOI
https://doi.org/10.1007/s10916-008-9207-z

Weitere Artikel der Ausgabe 6/2009

Journal of Medical Systems 6/2009 Zur Ausgabe