Skip to main content
Log in

Patient Safety Through RFID: Vulnerabilities in Recently Proposed Grouping Protocols

  • Original Paper
  • Published:
Journal of Medical Systems Aims and scope Submit manuscript

Abstract

As RFID-tagged systems become ubiquitous, acceptance of this technology by the general public necessitates addressing related security/privacy issues. The past eight years have seen an increasing number of publications in this direction, specifically using cryptographic approaches. Recently, the Journal of Medical Systems published two papers addressing security/privacy issues through cryptographic protocols. We consider the proposed protocols and identify some existing vulnerabilities.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  1. Chien, H.-Y., Yang, C.-C., Wu, T.-C., and Lee, C.-F., Two RFID-based solutions to enhance inpatient medication safety. J. Med. Syst., 2009. doi:10.1007/s10916-009-9373-7.

    Google Scholar 

  2. Huang, H.-H., and Ku, C.-Y., A RFID grouping proof protocol for medication safety of inpatient. J. Med. Syst. 33:467–474, 2009.

    Article  Google Scholar 

  3. Meiller, Y., Bureau, S., Zhou, W., and Piramuthu, S., Simulation of a health care knowledge-based system with RFID-generated information. In: Proceedings of the Asian Simulation Technology Conference (ASTEC2010), pp. 110–114. Shanghai, 2010.

  4. Min, D., and Yih, Y., Fuzzy logic-based approach to detecting a passive RFID tag in an outpatient clinic. J. Med. Syst., 2009. doi:10.1007/s10916-009-9377-3.

    Google Scholar 

  5. Piramuthu, S., Protocols for RFID tag/reader authentication. Decis. Support Syst. 43(3):897–914, 2007.

    Article  Google Scholar 

  6. Shim, H., Uh, Y., Lee, S. H., and Yoon, Y. R., A new specimen management system using RFID technology. J. Med. Syst., 2010. doi:10.1007/s10916-009-9417-7z.

    Google Scholar 

  7. Stahl, J. E., Holt, J. K., and Gagliano, N. J., Understanding performance and behavior of tightly coupled outpatient systems using RFID: initial experience. J. Med. Syst., 2009: doi:10.1007/s10916-009-9365-7.

    Google Scholar 

  8. Sun, P. R., Wang, B. H., and Wu, F., A new method to guard inpatient medication safety by the implementation of RFID. J. Med. Syst. 32:327–332, 2008.

    Article  Google Scholar 

  9. Tu, Y.-J., and Piramuthu, S., RFID distance bounding protocols. In: Proceedings of the First International EURASIP Workshop on RFID Technology (RFID2007), pp. 67–68. Vienna, 2007.

Download references

Acknowledgements

The authors would like to thank the reviewers for their suggestions to improve the content and presentation of this paper.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Selwyn Piramuthu.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Wickboldt, AK., Piramuthu, S. Patient Safety Through RFID: Vulnerabilities in Recently Proposed Grouping Protocols. J Med Syst 36, 431–435 (2012). https://doi.org/10.1007/s10916-010-9487-y

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10916-010-9487-y

Keywords

Navigation