Abstract
In the context of an aging population, drug intake can be a potential source of errors leading to death in some cases. Almost all of these errors are unintentional and come from incorrect prescriptions, unsuitable dosages for the patient or incompatibility with other treatments. To limit these risks which are especially important in the elderly or pre-dependency, we propose a secure system for drug treatment through the NFC (Near Field Communication) contact-less communication technology. The proposed system provides security mechanisms such as integrity, authentication, encryption and non-repudiation. To ensure this security, an extension of the international standard ISO/IED 13157 (NFC-SEC) is proposed to handle electronic signature based on a public key infrastructure.
Keywords
- NFC
- e-prescription
- Security
- e-signature
- ISO/IEC 13157
- healthcare application
This is a preview of subscription content, access via your institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
IEEE 1363:2000, Standard Specifications for Public-Key Cryptography
ISO/IEC 13157-1:2010 Information technology – Telecommunications and information exchange between systems – NFC Security – Part 1: NFC-SEC NFCIP-1 security services and protocol
ISO/IEC 13157-2:2010 Information technology – Telecommunications and information exchange between systems – NFC Security – Part 2: NFC-SEC cryptography standard using ECDH and AES
ISO/IEC 1443-1:2008, Identification cards – Contactless integrated circuit(s) cards – Proximity cards – Part 1: Physical characteristics
ISO/IEC 1443-2:2001, Identification cards – Contactless integrated circuit(s) cards – Proximity cards – Part 2: Radio Frequency power and signal interface
ISO/IEC 18092:2004, Information technology – Telecommunications and information exchange between systems – Near Field Communication – Interface and Protocol (NFCIP-1)
ISO/IEC 21481:2004, Information technology – Telecommunications and information exchange between systems – Near Field Communication – Interface and Protocol (NFCIP-2)
Alemdar, H., Ersoy, C.: Wireless sensor networks for healthcare: A survey. Computer Networks 54(15), 2688–2710 (2010)
Alshehri, A., Briffa, J., Schneider, S., Wesemeyer, S.: Formal security analysis of NFC m-coupon protocols using casper/fdr. In: 5th International Workshop on Near Field Communication, Zurich, Switzerland (2013)
Bravo, J., Hervas, R., Fuentes, C., Chavira, G., Nava, S.: Tagging for nursing care. In: Second International Conference on Pervasive Computing Technologies for Healthcare, PervasiveHealth 2008, January 30-February 1, pp. 305–307 (2008)
Bravo, J., Hervás, R., Gallego, R., Casero, G., Vergara, M., Carmona, T., Fuentes, C., Nava, S.W., Chavira, G., Villarreal, V.: Enabling NFC technology to support activities in an alzheimer’s day center. In: Proceedings of the 1st International Conference on PErvasive Technologies Related to Assistive Environments, PETRA 2008, pp. 81:1–81:5. ACM, New York (2008)
Courtois, N.: The dark side of security by obscurity - and cloning mifare classic rail and building passes, anywhere, anytime. In: Fernandez-Medina, E., Malek, M., Hernando, J. (eds.) Proceedings of the International Conference on Security and Cryptography (SECRYPT 2009), pp. 331–338. INSTICC Press, Milan (2009)
Francis, L., Hancke, G., Mayes, K., Markantonakis, K.: Practical NFC peer-to-peer relay attack using mobile phones. In: Ors Yalcin, S.B. (ed.) RFIDSec 2010. LNCS, vol. 6370, pp. 35–49. Springer, Heidelberg (2010)
Francis, L., Hancke, G., Mayes, K., Markantonakis, K.: A security framework model with communication protocol translator interface for enhancing NFC transactions. In: Proceedings of the 2010 Sixth Advanced International Conference on Telecommunications, AICT 2010, pp. 452–461. IEEE Computer Society, Washington, DC (2010)
Garcia, F.D., van Rossum, P., Verdult, R., Schreur, R.W.: Wirelessly pickpocketing a mifare classic card. In: Proceedings of the 30th IEEE Symposium on Security and Privacy, SP 2009, pp. 3–15. IEEE Computer Society, Washington, DC (2009)
García-Vázquez, J.P., Rodríguez, M.D., Andrade, A.G., Bravo, J.: Supporting the strategies to improve elders’ medication compliance by providing ambient aids. Personal Ubiquitous Computing 15(4), 389–397 (2011)
Hancke, G.: Practical attacks on proximity identification systems. In: IEEE Symposium on Security and Privacy, pp. 328–333 (May 2006)
Haselsteiner, E., Breitfuß, K.: Security in near field communication (NFC). In: Workshop on RFID and Lightweight Crypto, RFIDSec 2006 (2006)
Ho, L., Moh, M., Walker, Z., Hamada, T., Su, C.F.: A prototype on rfid and sensor networks for elder healthcare: progress report. In: Proceedings of the 2005 ACM SIGCOMM Workshop on Experimental Approaches to Wireless Network Design and Analysis, E-WIND 2005, pp. 70–75. ACM, New York (2005)
Ilie-Zudor, E., Kemény, Z., van Blommestein, F., Monostori, L., van der Meulen, A.: A survey of applications and requirements of unique identification systems and rfid techniques. Computers in Industry 62(3), 227–252 (2011)
Jara, A., Alcolea, A., Zamora, M., Skarmeta, A., Alsaedy, M.: Drugs interaction checker based on iot. In: Internet of Things (IOT 2010), pp. 1–8 (December 2010)
Jara, A., Zamora, M., Skarmeta, A.: An architecture based on internet of things to support mobility and security in medical environments. In: 7th IEEE Consumer Communications and Networking Conference (CCNC 2010), pp. 1–5 (January 2010)
Jara, A.J., Zamora, M.A., Skarmeta, A.F.: An internet of things—based personal device for diabetes therapy management in ambient assisted living (aal). Personal Ubiquitous Computing 15(4), 431–440 (2011)
Jovanovic, M., Organero, M.: Analysis of the latest trends in mobile commerce using the NFC technology. Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT) May Edition, 1–12 (2011)
Lahtela, A., Hassinen, M., Jylha, V.: RFID and NFC in healthcare: Safety of hospitals medication care. In: Second International Conference on Pervasive Computing Technologies for Healthcare (PervasiveHealth 2008), pp. 241–244 (February 2008)
Madlmayr, G., Langer, J., Kantner, C., Scharinger, J.: NFC devices: Security and privacy. In: Third International Conference on Availability, Reliability and Security (ARES 2008), pp. 642 –647 (March 2008)
Mulliner, C.: Vulnerability analysis and attacks on NFC-enabled mobile phones. In: 1st International Workshop on Sensor Security, pp. 695–700 (2009)
Pang, Z., Chen, Q., Zheng, L.: A pervasive and preventive healthcare solution for medication noncompliance and daily monitoring. In: 2nd International Symposium on Applied Sciences in Biomedical and Communication Technologies (ISABEL 2009), pp. 1–6 (November 2009)
Roland, M., Langer, J.: Digital signature records for the NFC data exchange format. In: Second International Workshop on Near Field Communication, pp. 71–76 (April 2010)
Coskun, V., Ok, K., Ozdenizci, B.: Near Field Communication: from theory to practice. Wiley (2012)
Vergara, M., Diaz-Hellin, P., Fontecha, J., Hervas, R., Sanchez-Barba, C., Fuentes, C., Bravo, J.: Mobile prescription: An NFC-based proposal for AAL. In: 2010 Second International Workshop on Near Field Communication (NFC), pp. 27–32 (2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Hamze, M., Peyrard, F., Conchon, E. (2014). An Improvement of NFC-SEC with Signed Exchanges for an e-Prescription-Based Application. In: Memmi, G., Blanke, U. (eds) Mobile Computing, Applications, and Services. MobiCASE 2013. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 130. Springer, Cham. https://doi.org/10.1007/978-3-319-05452-0_13
Download citation
DOI: https://doi.org/10.1007/978-3-319-05452-0_13
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-05451-3
Online ISBN: 978-3-319-05452-0
eBook Packages: Computer ScienceComputer Science (R0)