Two RFID-based Solutions to Enhance Inpatient Medication Safety
- 535 Downloads
Owing to the low cost and convenience of identifying an object without physical contact, Radio Frequency Identification (RFID) systems provide innovative, promising and efficient applications in many domains. An RFID grouping protocol is a protocol that allows an off-line verifier to collect and verify the evidence of two or more tags simultaneously present. Recently, Huang and Ku (J. Med. Syst, 2009) proposed an efficient grouping protocol to enhance medication safety for inpatients based on low-cost tags. However, the Huang–Ku scheme is not secure; an attacker can easily make up fake grouping records to cheat the verifier. This weakness would seriously endanger the safety of inpatient medication safety. This paper will show the weaknesses, and then propose two RFID-based solutions to enhance medication safety for two different scenarios. The proposed schemes are practical, secure and efficient for medication applications.
KeywordsSecurity RFID Authentication Grouping Medication Off-line verifier On-line verifier Inpatient safety Grouping-Proof protocol.
- 1.Bolotnyy, L., and Robins, G., Generalized yoking-proofs for a group of RFID tags. Proceedings of the 3rd Annual International Conference on Mobile and Ubiquitous Systems. pp. 1–4, 2006.Google Scholar
- 4.Chassin, M. R., and Becher, E. C., The wrong patient. Ann. Intern. Med. 136:11826–11833, 2002.Google Scholar
- 8.Duc, D. N., Park, J., Lee, H., and Kim, K., Enhancing security of EPCglobal Gen-2 RFID tag against traceability and cloning. Proceedings of the 2006 Symposium on Cryptography and Information Security, pp. 97, 2006.Google Scholar
- 9.EPCglobal, http://www.epcglobalinc.org/
- 11.Janz, B. D., Pitts, M. G., and Otondo, R. F., Information systems and health care II: back to the future with RFID: Lessons learned—some old, some new. Commun. Assoc. Inf. Syst. 15:132–148, 2005.Google Scholar
- 12.Juels, A., Yoking-proofs for RFID tags. Proceedings of the First International Workshop on Pervasive Computing and Communication Security, pp. 138–143, 2004.Google Scholar
- 13.Juels, A., Minimalist cryptography for low-cost RFID tags. Proceedings of the Fourth Conference on Security in Communication Networks, pp. 149–164, 2004.Google Scholar
- 14.Kaelber, D. C., and Bates, D. W., Health information exchange and patient safety. J. Biomed. Inform. 40:(Suppl 6):S40–S45, 2007. doi:10.1016/j.jbi.2007.08.011.Google Scholar
- 16.Liao, P.-C., Liu, L., Kuo, F., and Jin, M.-H., Developing a patient safety based RFID information system—an empirical study in Taiwan. Proceedings of 2006 IEEE International Conference on Management of Innovation and Technology, pp. 585–589, 2006.Google Scholar
- 17.Perrin, R. A., and Simpson, N., RFID and bar codes—critical importance in enhancing safe patient care. J. Healthc. Inf. Manag. 18:433–439, 2004.Google Scholar
- 18.Piramuthu, S., On existence proofs for multiple RFID tags. Proceedings of the 2006 ACS/IEEE International Conference on Pervasive Services, pp. 317–320, 2006.Google Scholar
- 19.Saito, J., and Sakurai, K., Grouping proof for RFID tags. Proceedings of the 19th International Conference on Advanced Information Networking and Applications, pp. 621–624, 2005.Google Scholar
- 22.Wu, F., Kuo, F., and Liu, L.-W., The application of RFID on drug safety of inpatient nursing healthcare. Proceedings of the 7th International Conference on Electronic Commerce, pp. 85–92, 2005.Google Scholar
- 23.Westhues, J., Hacking the prox card. RFID: Applications, Security and Privacy, Addison-Wesley, 2005, pp. 291-300, 2005.Google Scholar
- 24.Hancke, G. P. A practical relay attack on ISO 1443 proximity cards. http://www.cl.cam.ac.uk/~gh275/re;ay.pdf.
- 25.Chien, H.-Y., and Laih, C.-S., ECC-Based Lightweight Authentication Protocol with Un-traceability for Low-Cost RFIDs. Journal of Parallel and Distributed Computing 2009, http://dx.doi.org/ 10.1016/j.jpdc.2009.07.007.