Z. Wu, Tzer-Long Chen, Sung-Chiang Lin, Charlotte Wang
{"title":"A Secure RFID Authentication Scheme for Medicine Applications","authors":"Z. Wu, Tzer-Long Chen, Sung-Chiang Lin, Charlotte Wang","doi":"10.1109/IMIS.2013.37","DOIUrl":null,"url":null,"abstract":"RFID could be applied to merely about every section in hospitals, including blood bag management, medical record management, precious medical equipment tracking, discarded object management, emergency medical care tracking, resident healthcare monitoring, patient identification, operating room management, nursery management, drug logistics management, and entry access control. All of them could be well handled with RFID technology. Within such RFID applications, enhancing patients' privacy is considered as the primary task. Nevertheless, the limited computational power of RFID tags indicates that they cannot execute complex cryptographic functions. Consequently, the design of an efficient and secure protocol for RFID systems not employing complex cryptographic techniques is an important issue. Although many authentication protocols have recently been developed for RFID, they either cannot protect the location privacy of tags nor have high overhead on identifying tags for the back-end server. None of them provide satisfactory solutions for both problems at the same time. This study proposes an efficiently mutual authentication scheme for RFID that not only guarantees the location privacy of tags, but also efficiently identifies tags for the back-end server.","PeriodicalId":425979,"journal":{"name":"2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"6 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IMIS.2013.37","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 9
Abstract
RFID could be applied to merely about every section in hospitals, including blood bag management, medical record management, precious medical equipment tracking, discarded object management, emergency medical care tracking, resident healthcare monitoring, patient identification, operating room management, nursery management, drug logistics management, and entry access control. All of them could be well handled with RFID technology. Within such RFID applications, enhancing patients' privacy is considered as the primary task. Nevertheless, the limited computational power of RFID tags indicates that they cannot execute complex cryptographic functions. Consequently, the design of an efficient and secure protocol for RFID systems not employing complex cryptographic techniques is an important issue. Although many authentication protocols have recently been developed for RFID, they either cannot protect the location privacy of tags nor have high overhead on identifying tags for the back-end server. None of them provide satisfactory solutions for both problems at the same time. This study proposes an efficiently mutual authentication scheme for RFID that not only guarantees the location privacy of tags, but also efficiently identifies tags for the back-end server.