Patient Safety Through RFID: Vulnerabilities in Recently Proposed Grouping Protocols
- 392 Downloads
As RFID-tagged systems become ubiquitous, acceptance of this technology by the general public necessitates addressing related security/privacy issues. The past eight years have seen an increasing number of publications in this direction, specifically using cryptographic approaches. Recently, the Journal of Medical Systems published two papers addressing security/privacy issues through cryptographic protocols. We consider the proposed protocols and identify some existing vulnerabilities.
KeywordsRFID Cryptography Protocol
The authors would like to thank the reviewers for their suggestions to improve the content and presentation of this paper.
- 3.Meiller, Y., Bureau, S., Zhou, W., and Piramuthu, S., Simulation of a health care knowledge-based system with RFID-generated information. In: Proceedings of the Asian Simulation Technology Conference (ASTEC2010), pp. 110–114. Shanghai, 2010.Google Scholar
- 9.Tu, Y.-J., and Piramuthu, S., RFID distance bounding protocols. In: Proceedings of the First International EURASIP Workshop on RFID Technology (RFID2007), pp. 67–68. Vienna, 2007.Google Scholar