Advertisement

Customized Healthcare Infrastructure Using Privacy Weight Level Based on Smart Device

  • Namje Park
Part of the Communications in Computer and Information Science book series (CCIS, volume 206)

Abstract

Personalized radio-frequency identification (RFID) tags can be exploited to infringe on privacy even when not directly carrying private information, as the unique tag data can be read and aggregated to identify individuals, analyze their preferences, and track their location. This is a particularly serious problem because such data collection is not limited to large enterprise and government, but within reach of individuals. In this paper, we describe the security analysis and implementation leveraging globally networked mobile RFID service. We propose a secure mobile RFID service framework leveraging mobile networking. Here we describe the proposed framework and show that it is secure against known attacks. The framework provides a means for safe use of mobile phone-based RFID services by providing security to personalized RFID tags.

Keywords

Mobile RFID Privacy Security Hospital Healthcare 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Mobile RFID Forum of Korea: Mobile RFID Privacy Protection Framework (Framework for Privacy Protection of Mobile RFID Services). MRFS-4-08. Standard Paper (2006)Google Scholar
  2. 2.
    Park, N., Song, Y., Won, D., Kim, H.: Multilateral Approaches to the Mobile RFID Security Problem Using Web Service. In: Zhang, Y., Yu, G., Hwang, J., Xu, G. (eds.) APWeb 2008. LNCS, vol. 4976, pp. 331–341. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  3. 3.
    Park, W., Lee, B.: Proposal for participating in the Correspondence Group on RFID in ITU-T. Information Paper. ASTAP Forum (2004)Google Scholar
  4. 4.
    Park, N., Kwak, J., Kim, S., Won, D., Kim, H.: WIPI Mobile Platform with Secure Service for Mobile RFID Network Environment. In: Shen, H.T., Li, J., Li, M., Ni, J., Wang, W. (eds.) APWeb Workshops 2006. LNCS, vol. 3842, pp. 741–748. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  5. 5.
    Park, N., Kim, H.W., Kim, S., Won, D.H.: Open Location-Based Service Using Secure Middleware Infrastructure in Web Services. In: Gervasi, O., Gavrilova, M.L., Kumar, V., Laganá, A., Lee, H.P., Mun, Y., Taniar, D., Tan, C.J.K. (eds.) ICCSA 2005. LNCS, vol. 3481, pp. 1146–1155. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  6. 6.
    Park, N.: Security scheme for managing a large quantity of individual information in RFID environment. CCIS, vol. 106, pp. 72–79. Springer, Heidelberg (2010)Google Scholar
  7. 7.
    Park, N.: Secure UHF/HF Dual-band RFID: Strategic Framework Approaches and Applica-tion Solutions. In: ICCCI 2011. LNCS, Springer, Heidelberg (2011)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Namje Park
    • 1
  1. 1.Department of Computer Education, Teachers CollegeJeju National UniversityJeju-doKorea

Personalised recommendations