Skip to main content

An Improvement of NFC-SEC with Signed Exchanges for an e-Prescription-Based Application

  • Conference paper
  • 1605 Accesses

Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST,volume 130)

Abstract

In the context of an aging population, drug intake can be a potential source of errors leading to death in some cases. Almost all of these errors are unintentional and come from incorrect prescriptions, unsuitable dosages for the patient or incompatibility with other treatments. To limit these risks which are especially important in the elderly or pre-dependency, we propose a secure system for drug treatment through the NFC (Near Field Communication) contact-less communication technology. The proposed system provides security mechanisms such as integrity, authentication, encryption and non-repudiation. To ensure this security, an extension of the international standard ISO/IED 13157 (NFC-SEC) is proposed to handle electronic signature based on a public key infrastructure.

Keywords

  • NFC
  • e-prescription
  • Security
  • e-signature
  • ISO/IEC 13157
  • healthcare application

This is a preview of subscription content, access via your institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • DOI: 10.1007/978-3-319-05452-0_13
  • Chapter length: 18 pages
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
eBook
USD   64.99
Price excludes VAT (USA)
  • ISBN: 978-3-319-05452-0
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book
USD   84.00
Price excludes VAT (USA)

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. IEEE 1363:2000, Standard Specifications for Public-Key Cryptography

    Google Scholar 

  2. ISO/IEC 13157-1:2010 Information technology – Telecommunications and information exchange between systems – NFC Security – Part 1: NFC-SEC NFCIP-1 security services and protocol

    Google Scholar 

  3. ISO/IEC 13157-2:2010 Information technology – Telecommunications and information exchange between systems – NFC Security – Part 2: NFC-SEC cryptography standard using ECDH and AES

    Google Scholar 

  4. ISO/IEC 1443-1:2008, Identification cards – Contactless integrated circuit(s) cards – Proximity cards – Part 1: Physical characteristics

    Google Scholar 

  5. ISO/IEC 1443-2:2001, Identification cards – Contactless integrated circuit(s) cards – Proximity cards – Part 2: Radio Frequency power and signal interface

    Google Scholar 

  6. ISO/IEC 18092:2004, Information technology – Telecommunications and information exchange between systems – Near Field Communication – Interface and Protocol (NFCIP-1)

    Google Scholar 

  7. ISO/IEC 21481:2004, Information technology – Telecommunications and information exchange between systems – Near Field Communication – Interface and Protocol (NFCIP-2)

    Google Scholar 

  8. Alemdar, H., Ersoy, C.: Wireless sensor networks for healthcare: A survey. Computer Networks 54(15), 2688–2710 (2010)

    CrossRef  Google Scholar 

  9. Alshehri, A., Briffa, J., Schneider, S., Wesemeyer, S.: Formal security analysis of NFC m-coupon protocols using casper/fdr. In: 5th International Workshop on Near Field Communication, Zurich, Switzerland (2013)

    Google Scholar 

  10. Bravo, J., Hervas, R., Fuentes, C., Chavira, G., Nava, S.: Tagging for nursing care. In: Second International Conference on Pervasive Computing Technologies for Healthcare, PervasiveHealth 2008, January 30-February 1, pp. 305–307 (2008)

    Google Scholar 

  11. Bravo, J., Hervás, R., Gallego, R., Casero, G., Vergara, M., Carmona, T., Fuentes, C., Nava, S.W., Chavira, G., Villarreal, V.: Enabling NFC technology to support activities in an alzheimer’s day center. In: Proceedings of the 1st International Conference on PErvasive Technologies Related to Assistive Environments, PETRA 2008, pp. 81:1–81:5. ACM, New York (2008)

    Google Scholar 

  12. Courtois, N.: The dark side of security by obscurity - and cloning mifare classic rail and building passes, anywhere, anytime. In: Fernandez-Medina, E., Malek, M., Hernando, J. (eds.) Proceedings of the International Conference on Security and Cryptography (SECRYPT 2009), pp. 331–338. INSTICC Press, Milan (2009)

    Google Scholar 

  13. Francis, L., Hancke, G., Mayes, K., Markantonakis, K.: Practical NFC peer-to-peer relay attack using mobile phones. In: Ors Yalcin, S.B. (ed.) RFIDSec 2010. LNCS, vol. 6370, pp. 35–49. Springer, Heidelberg (2010)

    CrossRef  Google Scholar 

  14. Francis, L., Hancke, G., Mayes, K., Markantonakis, K.: A security framework model with communication protocol translator interface for enhancing NFC transactions. In: Proceedings of the 2010 Sixth Advanced International Conference on Telecommunications, AICT 2010, pp. 452–461. IEEE Computer Society, Washington, DC (2010)

    Google Scholar 

  15. Garcia, F.D., van Rossum, P., Verdult, R., Schreur, R.W.: Wirelessly pickpocketing a mifare classic card. In: Proceedings of the 30th IEEE Symposium on Security and Privacy, SP 2009, pp. 3–15. IEEE Computer Society, Washington, DC (2009)

    CrossRef  Google Scholar 

  16. García-Vázquez, J.P., Rodríguez, M.D., Andrade, A.G., Bravo, J.: Supporting the strategies to improve elders’ medication compliance by providing ambient aids. Personal Ubiquitous Computing 15(4), 389–397 (2011)

    CrossRef  Google Scholar 

  17. Hancke, G.: Practical attacks on proximity identification systems. In: IEEE Symposium on Security and Privacy, pp. 328–333 (May 2006)

    Google Scholar 

  18. Haselsteiner, E., Breitfuß, K.: Security in near field communication (NFC). In: Workshop on RFID and Lightweight Crypto, RFIDSec 2006 (2006)

    Google Scholar 

  19. Ho, L., Moh, M., Walker, Z., Hamada, T., Su, C.F.: A prototype on rfid and sensor networks for elder healthcare: progress report. In: Proceedings of the 2005 ACM SIGCOMM Workshop on Experimental Approaches to Wireless Network Design and Analysis, E-WIND 2005, pp. 70–75. ACM, New York (2005)

    CrossRef  Google Scholar 

  20. Ilie-Zudor, E., Kemény, Z., van Blommestein, F., Monostori, L., van der Meulen, A.: A survey of applications and requirements of unique identification systems and rfid techniques. Computers in Industry 62(3), 227–252 (2011)

    CrossRef  Google Scholar 

  21. Jara, A., Alcolea, A., Zamora, M., Skarmeta, A., Alsaedy, M.: Drugs interaction checker based on iot. In: Internet of Things (IOT 2010), pp. 1–8 (December 2010)

    Google Scholar 

  22. Jara, A., Zamora, M., Skarmeta, A.: An architecture based on internet of things to support mobility and security in medical environments. In: 7th IEEE Consumer Communications and Networking Conference (CCNC 2010), pp. 1–5 (January 2010)

    Google Scholar 

  23. Jara, A.J., Zamora, M.A., Skarmeta, A.F.: An internet of things—based personal device for diabetes therapy management in ambient assisted living (aal). Personal Ubiquitous Computing 15(4), 431–440 (2011)

    CrossRef  Google Scholar 

  24. Jovanovic, M., Organero, M.: Analysis of the latest trends in mobile commerce using the NFC technology. Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT) May Edition, 1–12 (2011)

    Google Scholar 

  25. Lahtela, A., Hassinen, M., Jylha, V.: RFID and NFC in healthcare: Safety of hospitals medication care. In: Second International Conference on Pervasive Computing Technologies for Healthcare (PervasiveHealth 2008), pp. 241–244 (February 2008)

    Google Scholar 

  26. Madlmayr, G., Langer, J., Kantner, C., Scharinger, J.: NFC devices: Security and privacy. In: Third International Conference on Availability, Reliability and Security (ARES 2008), pp. 642 –647 (March 2008)

    Google Scholar 

  27. Mulliner, C.: Vulnerability analysis and attacks on NFC-enabled mobile phones. In: 1st International Workshop on Sensor Security, pp. 695–700 (2009)

    Google Scholar 

  28. Pang, Z., Chen, Q., Zheng, L.: A pervasive and preventive healthcare solution for medication noncompliance and daily monitoring. In: 2nd International Symposium on Applied Sciences in Biomedical and Communication Technologies (ISABEL 2009), pp. 1–6 (November 2009)

    Google Scholar 

  29. Roland, M., Langer, J.: Digital signature records for the NFC data exchange format. In: Second International Workshop on Near Field Communication, pp. 71–76 (April 2010)

    Google Scholar 

  30. Coskun, V., Ok, K., Ozdenizci, B.: Near Field Communication: from theory to practice. Wiley (2012)

    Google Scholar 

  31. Vergara, M., Diaz-Hellin, P., Fontecha, J., Hervas, R., Sanchez-Barba, C., Fuentes, C., Bravo, J.: Mobile prescription: An NFC-based proposal for AAL. In: 2010 Second International Workshop on Near Field Communication (NFC), pp. 27–32 (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 2014 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Hamze, M., Peyrard, F., Conchon, E. (2014). An Improvement of NFC-SEC with Signed Exchanges for an e-Prescription-Based Application. In: Memmi, G., Blanke, U. (eds) Mobile Computing, Applications, and Services. MobiCASE 2013. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 130. Springer, Cham. https://doi.org/10.1007/978-3-319-05452-0_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-05452-0_13

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-05451-3

  • Online ISBN: 978-3-319-05452-0

  • eBook Packages: Computer ScienceComputer Science (R0)