Cryptographically Supported NFC Tags in Medication for Better Inpatient Safety
- 432 Downloads
Reliable sources report that errors in drug administration are increasing the number of harmed or killed inpatients, during healthcare. This development is in contradiction to patient safety norms. A correctly designed hospital-wide ubiquitous system, using advanced inpatient identification and matching techniques, should provide correct medicine and dosage at the right time. Researchers are still making grouping proof protocol proposals based on the EPC Global Class 1 Generation 2 ver. 1.2 standard tags, for drug administration. Analyses show that such protocols make medication unsecure and hence fail to guarantee inpatient safety. Thus, the original goal of patient safety still remains. In this paper, a very recent proposal (EKATE) upgraded by a cryptographic function is shown to fall short of expectations. Then, an alternative proposal IMS-NFC which uses a more suitable and newer technology; namely Near Field Communication (NFC), is described. The proposed protocol has the additional support of stronger security primitives and it is compliant to ISO communication and security standards. Unlike previous works, the proposal is a complete ubiquitous system that guarantees full patient safety; and it is based on off-the-shelf, new technology products available in every corner of the world. To prove the claims the performance, cost, security and scope of IMS-NFC are compared with previous proposals. Evaluation shows that the proposed system has stronger security, increased patient safety and equal efficiency, at little extra cost.
KeywordsInpatient medication Ubiquitous systems RFID NFC Authentication
- 1.Bootman JL et al. (2006) Preventing medication errors: quality chasm series. http://www.iom.edu/~/media/Files/Report%20Files/2006/Preventing-Medication-Errors-Quality-Chasm-Series/medicationerrorsnew.pdf. Accessed 03 Apr 2014.
- 3.(2006) Eurobarometer 2006 survey on medical errors, http://ec.europa.eu/public_opinion/archives/ebs/ebs_241_en.pdf. Accessed 03 Apr 2014.
- 5.(2014) National Patient Safety Goals (NPSGs), http://www.jointcommission.org/assets/1/6/HAP_NPSG_Chapter_2014.pdf. Accessed 03 Apr 2014.
- 8.Lathela A, Hassinen M, Jylha V (2008) RFID and NFC in healthcare: safety of hospitals medication care. 2nd international conference on pervasive computing technologies for healthcare, PervasiveHealth 2008, IEEE, pp 241–244.Google Scholar
- 9.Songini ML (2006) Wal-Mart Details its RFID journey http://www.computerworld.com/s/article/109132/Wal_Mart_details_its_RFID_journey. Accessed 03 Apr 2014.
- 11.EPC Global Inc. (2008) EPC Global Class1 Gen2 RFID Specifications http://www.gs1.org/gsmp/kc/epcglobal/uhfc1g2/uhfc1g2_1_2_0-standard-20080511.pdf. Accessed 03 Apr 2014.
- 12.(2010) Inf technology -- Radio frequency identification for item management -- Part 6: Parameters for air interface communications at 860 MHz to 960 MHz, http://www.iso.org/iso/iso_catalogue/catalogue_tc/catalogue_detail.htm?csnumber=46149. Accessed 03 Apr 2014.
- 15.Juels A (2004) Yoking-proofs for RFID tags. Second IEEE annual conference on pervasive computing and communications workshops, pp. 14–17, 138–143.Google Scholar
- 16.Wu F, Kuo F, Liu LW (2005) The application of RFID on drug safety of inpatient nursing healthcare. 7th international conference on electronic commerce, pp. 85–92.Google Scholar
- 24.Van Deursen T, Radomirovic S (2009) Algebraic attacks on RFID Protocols. Information security theory and practices. Smart devices, pervasive systems, and ubiquitous networks (WISTP'09). LNCS, 5746:38–51.Google Scholar
- 25.Khovratovich D, Nikolic I (2010) Rotational Cryptanalysis of ARX. 17th International Conference on Fast Software Encryption, FSE '10, pp. 333–346, 2010.Google Scholar
- 30.Özcanhan MH, Dalkılıç G, Utku S (2013) Analysis of two protocols using EPC Gen-2 tags for safe inpatient medication. Int Sym. on Innovations in Intell Syst and Appl., IEEE, pp 1–6.Google Scholar
- 32.Kasper T, von Maurich I, Oswald D, Paar C (2011) Chameleon: A Versatile Emulator for Contactless Smartcards. Inf Security and Cryptology - ICISC 2010. LNCS, 6829:189–206.Google Scholar
- 35.Bogdanov A, et al. (2007) PRESENT: An ultra-lightweight block cipher. Cryptographic Hardware and Embedded Systems, pp. 450–466, 2007.Google Scholar
- 36.NXP Mifare DesFire EV1 Leaflet (2010) http://www.nxp.com/products/identification_and_ security/smart_card_ics/mifare_smart_card_ics/mifare_desfire/. Accessed 03 Apr 2014.