Skip to main content
Log in

A Reliable RFID Mutual Authentication Scheme for Healthcare Environments

  • Original Paper
  • Published:
Journal of Medical Systems Aims and scope Submit manuscript

Abstract

Radio frequency identification (RFID) applications have the potential to increase the reliability of healthcare environments. However, there are obvious security and privacy concerns with regard to storing personal and medical data in RFID tags, and the lack of secure authentication systems in healthcare environments remains as a challenge the further use of this technology, one that touches on issues of confidentiality, unforgeability, location privacy, and scalability. This study proposes a novel mutual authentication protocol that considers all of these issues and solves the tradeoff between location privacy and scalability in healthcare environments. A formal proof and analysis is demonstrated to prove the effectiveness of the proposed scheme, and that high reliability has and can be easily deployed and managed. This study also provides a scenario example that applied proposed protocol in the newborn care and management. The result shows that the proposed scheme solves the related tradeoff problem, and is capable of providing both location privacy and scalability. To apply the authentication scheme proposed in this work would be able to increase confidence in future implementations of RFID systems in healthcare environments.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2

Similar content being viewed by others

References

  1. Wang, S. W., Chen, W. H., Ong, C. S., Liu, L., and Chuang, Y. W., RFID application in hospitals: a case study on a demonstration RFID project in a Taiwan hospital. In: Hawaii International Conference on System Sciences. IEEE, pp. 184a–194a, 2006.

  2. Hwang, M. S., Wei, C. H., and Lee, C. Y., Privacy and security requirements for RFID applications. J. Comput. 20(3):55–60, 2009.

    Google Scholar 

  3. Najera, P., Lopez, J., and Roman, R., Real-time location and inpatient care systems based on passive RFID. J. Netw. Comput. Appl. 34(3):980–989, 2011.

    Article  Google Scholar 

  4. Singapore Fights SARS with RFID (2003) Available: http://www.rfidjournal.com/article/view/446

  5. Collins, J., Hospital gets ultra-wideband RFID. RFID J, 2004.

  6. Jeong, B., Cheng, C., Prabhu, V., and Yu, B., An RFID application model for surgery patient identification. IEEE, pp. 1–3, 2008.

  7. Glabman, M., Room for tracking. RFID technology finds the way. Mater. Manag. Health Care 13(5):26, 2004.

    Google Scholar 

  8. Brewin, B., RFID gets FDA push. Fed. Comput. Week. 2004.

  9. Thompson, C. A., Radio frequency tags for identifying legitimate drug products discussed by tech industry. Am. J. Health Syst. Pharm. 61(14):1430–1432, 2004.

    Google Scholar 

  10. Katz, J. E., and Rice, R. E., Public views of mobile medical devices and services: A US national survey of consumer sentiments towards RFID healthcare technology. Int. J. Med. Inform. 78(2):104–114, 2009.

    Article  Google Scholar 

  11. Hung, Y. K., The study of adopting RFID technology in medical institute with the perspectives of cost benefit. International Medical Informatics Symposium in Taiwan, Taiwan, 2007.

    Google Scholar 

  12. Leu, J. G., The benefit analysis of RFID use in the health management center—The experience in Shin Kong Wu Ho-Su Memorial Hospital. National Taiwan University, 2010.

  13. Yu, C., Chen, C., Liao, P., and Lee, Y., RFID-based operation room and medicare system for patient safety enhancement—a case study of keelung branch. J. Inf. Manag. 15:97–122, 2008.

    Google Scholar 

  14. Barrows, R. C., Jr., and Clayton, P. D., Privacy, confidentiality, and electronic medical records. J. Am. Med. Inform. Assoc. 3(2):139–148, 1996.

    Article  Google Scholar 

  15. Loomis, G. A., Ries, J. S., Saywell, R. M., and Thakker, N. R., If electronic medical records are so great, why aren’t family physicians using them? J. Fam. Pract. 51(7):636–641, 2002.

    Google Scholar 

  16. Chatmon, C., van Le, T., and Burmester, M., Secure anonymous RFID authentication protocols. Florida State University, Department of Computer Science, Tech Rep, pp. 1–10, 2006.

  17. Chien, H. Y., Secure access control schemes for RFID systems with anonymity. FMUIT′06, Japan, IEEE, pp. 96–96, 2006.

  18. Luo, Z., Chan, T., and Li, J. S., A lightweight RFID protocol to protect against traceability and cloning attacks. IEEE International Conference on Security and Privacy for Emerging Areas in Communications Networks (ICEBE′05), IEEE, pp. 59–66, 2005.

  19. Duc, D. N., Lee, H., and Kim, K., Enhancing security of EPCglobal Gen-2 RFID against traceability and cloning. Symposium on Cryptography and Information Security, 2006.

  20. Henrici, D., and Muller, P., Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers. PerSec′04. IEEE, pp. 149–153, 2004.

  21. Karthikeyan, S., and Nesterenko, M. RFID security without extensive cryptography. SASN, 2005. ACM, pp. 63–67, 2005.

  22. Lee, S., Asano, T., and Kim, K., RFID Mutual Authentication Scheme based on Synchronized Secret Information. Symposium on Cryptography and Information Security, Hiroshima, p. 98, 2006.

    Google Scholar 

  23. Lee, Y. K., and Verbauwhede, I., Secure and low-cost RFID authentication protocols. In: Adaptive Wireless Networks (AWiN). Florida State University, Department of Computer Science, Tallahassee, Florida, USA, pp. 1–5, 2005.

  24. Luo, Z., Chan, T., and Li, J. S., A lightweight mutual authentication protocol for RFID networks. IEEE, pp. 620–625, 2005.

  25. Lee, S., Hwang, Y., Lee, D., and Lim, J., Efficient authentication for low-cost RFID systems. Computational Science and Its Applications (ICCSA):619–627, 2005.

  26. Molnar, D., and Wagner, D., Privacy and security in library RFID: Issues, practices, and architectures. ACM, pp. 210–219, 2004.

  27. Ohkubo, M., Suzuki, K., and Kinoshita, S., Cryptographic approach to “privacy-friendly” tags. MIT, Cambridge, 2003.

    Google Scholar 

  28. Weis, S., Sarma, S., Rivest, R., and Engels, D., Security and privacy aspects of low-cost radio frequency identification systems. Security in pervasive computing. pp. 50–59, 2004.

  29. Overbey, J., Traves, W., and Wojdylo, J., On the keyspace of the Hill cipher. Cryptologia 29(1):59–72, 2005.

    Article  Google Scholar 

  30. Shoup, V. Sequences of games: a tool for taming complexity in security proofs. cryptology eprint archive, report 2004/332, 2004.

  31. Dimitriou, T., A lightweight RFID protocol to protect against traceability and cloning attacks. First International Conference on Security and Privacy for Emerging Areas in Communications Networks (Secure Comm 2005), IEEE, pp. 59–66, 2005.

Download references

Acknowledgements

This work was supported partially by National Science Council, Taiwan under Grants NSC 101-2218-E-346-001.

Conflict of Interest

The authors declare that they have no conflict of interests.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lichin Chen.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Wu, ZY., Chen, L. & Wu, JC. A Reliable RFID Mutual Authentication Scheme for Healthcare Environments. J Med Syst 37, 9917 (2013). https://doi.org/10.1007/s10916-012-9917-0

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s10916-012-9917-0

Keywords

Navigation