Customized Healthcare Infrastructure Using Privacy Weight Level Based on Smart Device
Abstract
Personalized radio-frequency identification (RFID) tags can be exploited to infringe on privacy even when not directly carrying private information, as the unique tag data can be read and aggregated to identify individuals, analyze their preferences, and track their location. This is a particularly serious problem because such data collection is not limited to large enterprise and government, but within reach of individuals. In this paper, we describe the security analysis and implementation leveraging globally networked mobile RFID service. We propose a secure mobile RFID service framework leveraging mobile networking. Here we describe the proposed framework and show that it is secure against known attacks. The framework provides a means for safe use of mobile phone-based RFID services by providing security to personalized RFID tags.
Keywords
Mobile RFID Privacy Security Hospital HealthcarePreview
Unable to display preview. Download preview PDF.
References
- 1.Mobile RFID Forum of Korea: Mobile RFID Privacy Protection Framework (Framework for Privacy Protection of Mobile RFID Services). MRFS-4-08. Standard Paper (2006)Google Scholar
- 2.Park, N., Song, Y., Won, D., Kim, H.: Multilateral Approaches to the Mobile RFID Security Problem Using Web Service. In: Zhang, Y., Yu, G., Hwang, J., Xu, G. (eds.) APWeb 2008. LNCS, vol. 4976, pp. 331–341. Springer, Heidelberg (2008)CrossRefGoogle Scholar
- 3.Park, W., Lee, B.: Proposal for participating in the Correspondence Group on RFID in ITU-T. Information Paper. ASTAP Forum (2004)Google Scholar
- 4.Park, N., Kwak, J., Kim, S., Won, D., Kim, H.: WIPI Mobile Platform with Secure Service for Mobile RFID Network Environment. In: Shen, H.T., Li, J., Li, M., Ni, J., Wang, W. (eds.) APWeb Workshops 2006. LNCS, vol. 3842, pp. 741–748. Springer, Heidelberg (2006)CrossRefGoogle Scholar
- 5.Park, N., Kim, H.W., Kim, S., Won, D.H.: Open Location-Based Service Using Secure Middleware Infrastructure in Web Services. In: Gervasi, O., Gavrilova, M.L., Kumar, V., Laganá, A., Lee, H.P., Mun, Y., Taniar, D., Tan, C.J.K. (eds.) ICCSA 2005. LNCS, vol. 3481, pp. 1146–1155. Springer, Heidelberg (2005)CrossRefGoogle Scholar
- 6.Park, N.: Security scheme for managing a large quantity of individual information in RFID environment. CCIS, vol. 106, pp. 72–79. Springer, Heidelberg (2010)Google Scholar
- 7.Park, N.: Secure UHF/HF Dual-band RFID: Strategic Framework Approaches and Applica-tion Solutions. In: ICCCI 2011. LNCS, Springer, Heidelberg (2011)Google Scholar