Advertisement

Journal of Medical Systems

, Volume 36, Issue 2, pp 431–435 | Cite as

Patient Safety Through RFID: Vulnerabilities in Recently Proposed Grouping Protocols

  • Anne-Katrin Wickboldt
  • Selwyn Piramuthu
Original Paper

Abstract

As RFID-tagged systems become ubiquitous, acceptance of this technology by the general public necessitates addressing related security/privacy issues. The past eight years have seen an increasing number of publications in this direction, specifically using cryptographic approaches. Recently, the Journal of Medical Systems published two papers addressing security/privacy issues through cryptographic protocols. We consider the proposed protocols and identify some existing vulnerabilities.

Keywords

RFID Cryptography Protocol 

Notes

Acknowledgements

The authors would like to thank the reviewers for their suggestions to improve the content and presentation of this paper.

References

  1. 1.
    Chien, H.-Y., Yang, C.-C., Wu, T.-C., and Lee, C.-F., Two RFID-based solutions to enhance inpatient medication safety. J. Med. Syst., 2009. doi: 10.1007/s10916-009-9373-7.Google Scholar
  2. 2.
    Huang, H.-H., and Ku, C.-Y., A RFID grouping proof protocol for medication safety of inpatient. J. Med. Syst. 33:467–474, 2009.CrossRefGoogle Scholar
  3. 3.
    Meiller, Y., Bureau, S., Zhou, W., and Piramuthu, S., Simulation of a health care knowledge-based system with RFID-generated information. In: Proceedings of the Asian Simulation Technology Conference (ASTEC2010), pp. 110–114. Shanghai, 2010.Google Scholar
  4. 4.
    Min, D., and Yih, Y., Fuzzy logic-based approach to detecting a passive RFID tag in an outpatient clinic. J. Med. Syst., 2009. doi: 10.1007/s10916-009-9377-3.Google Scholar
  5. 5.
    Piramuthu, S., Protocols for RFID tag/reader authentication. Decis. Support Syst. 43(3):897–914, 2007.CrossRefGoogle Scholar
  6. 6.
    Shim, H., Uh, Y., Lee, S. H., and Yoon, Y. R., A new specimen management system using RFID technology. J. Med. Syst., 2010. doi: 10.1007/s10916-009-9417-7z.Google Scholar
  7. 7.
    Stahl, J. E., Holt, J. K., and Gagliano, N. J., Understanding performance and behavior of tightly coupled outpatient systems using RFID: initial experience. J. Med. Syst., 2009: doi: 10.1007/s10916-009-9365-7.Google Scholar
  8. 8.
    Sun, P. R., Wang, B. H., and Wu, F., A new method to guard inpatient medication safety by the implementation of RFID. J. Med. Syst. 32:327–332, 2008.CrossRefGoogle Scholar
  9. 9.
    Tu, Y.-J., and Piramuthu, S., RFID distance bounding protocols. In: Proceedings of the First International EURASIP Workshop on RFID Technology (RFID2007), pp. 67–68. Vienna, 2007.Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2010

Authors and Affiliations

  1. 1.Massachusetts Institute of TechnologyCambridgeUSA
  2. 2.Information Systems and Operations ManagementUniversity of FloridaGainesvilleUSA

Personalised recommendations