A Secure ECC-based RFID Mutual Authentication Protocol to Enhance Patient Medication Safety
详细信息    查看全文
  • 作者:Chunhua Jin ; Chunxiang Xu ; Xiaojun Zhang ; Fagen Li
  • 关键词:Patient medication safety ; Radio frequency identification ; Mutual authentication ; Elliptic curve cryptography
  • 刊名:Journal of Medical Systems
  • 出版年:2016
  • 出版时间:January 2016
  • 年:2016
  • 卷:40
  • 期:1
  • 全文大小:277 KB
  • 参考文献:1.Annual report. Technical report, London School of Hygiene and Tropical Medicine report, 2012
    2.National Coordinating Council for Medication Error Reporting and Prevention, Recommendations to Enhance Accuracy of Administration of Medications. Retrieved from http://鈥媤ww.鈥媙ccmerp.鈥媜rg/鈥媍ouncil/鈥媍ouncil1999-06-29.鈥媓tml
    3.Juels, A., Yoking-proofs for RFID tags. In: First International Workshop on Pervasive Computing and Communication Security, 2004
    4.Sandlin, D., SurgiChip-new technology for prevention of wrong site, wrong procedure, wrong person surgery. J. Perianesth. Nurs. 20:2144鈥?146, 2005.CrossRef
    5.Wu, F., Kuo
    6.Sun, P.R., Wang, B.H., Wu, F., A new method to guard inpatient medication safety by the implementation of RFID. J. Med. Syst. 32:4327鈥?332, 2008.CrossRef
    7.Huang, H.H., and Ku, C.Y., A rfid grouping proof protocol for medication safety of inpatient. J. Med. Syst. 33(6):467鈥?74, 2009.PubMed CrossRef
    8.Lo, N.-W., and Yeh, K.-H., Anonymous coexistence proofs for RFID tags. J. Inf. Sci. Eng. 26(4):1213鈥?230, 2010.
    9.Yen, Y.C., Lo, N.W., Wu, T.C., Two rfid-based solutions for secure inpatient medication administration. J. Med. Syst. 36(5):2769鈥?778, 2012.PubMed CrossRef
    10.Li, N., Mu, Y., Susilo, W., Guo, F., Varadharajan, V., Privacy-Preserving Authorized RFID Authentication Protocols, Radio Frequency Identification: Security and Privacy Issues, pp. 108鈥?22: Springer International Publishing, 2014.
    11.Chen, Y., Chou, J.-S., Sun, H.-M., A novel mutual authentication scheme based on quadratic residues for RFID systems. Computer Networks 52:2373鈥?380, 2008.CrossRef
    12.Cao, T., and Shen, P., Cryptanalysis of some RFID authentication protocols. J. of Commu. 3(7):20鈥?7, 2008.
    13.Yeh, T.-C., Wu, C.-H., Tseng, Y.-M., Improvement of the RFID authentication scheme based on quadratic residues. Computer Communications 34:337鈥?41, 2011.CrossRef
    14.Doss, R., Sundaresan, S., Zhou, W., A practical quadratic residues based scheme for authentication and privacy in mobile RFID systems. Ad Hoc Networks 11(1):383鈥?96, 2013.CrossRef
    15.Tuyls, P., and Batina, L.: RFID-tags for Anti-Counterfeiting. Topics in cryptology-CT-RSA 2006, 115-131 (2006)
    16.Batina, L., Guajardo, J., Kerins, T., Mentens, N., Tuyls, P., Verbauwhede, I.: Public-key cryptography for RFID-tags. Fifth annual IEEE international conference on PerCom workshops鈥?07, pp. 217鈥?22. IEEE (2007)
    17.Lee, Y., Batina, L., Verbauwhede, I.: EC-RAC (ECDLP based randomized access control): provably secure RFID authentication protocol. 2008 I.E. international conference on RFID, pp. 97鈥?04. IEEE (2008)
    18.Bringer, J., Chabanne, H., Icart, T.: Cryptanalysis of EC-RAC, a RFID identification protocol. International Conference on Cryptology and Network Security-CANS鈥?8, Lecture Notes in Computer Science. Springer-Verlag (2008)
    19.Chou, J.-S., A secure RFID authentication protocol to enhance patient medication safety using elliptic curve cryptography. J. Supercomput., 2014. doi:10.鈥?007/鈥媠11227-013-1073-x .
    20.Zhang, Z. Z., and Qi, Q. Q., An Efficient RFID Authentication Protocol to Enhance Patient Medication Safety Using Elliptic Curve Cryptography. J. Med. Syst. 38(5):1鈥?, 2014.CrossRef
    21.Liao, Y., and Hsiao, C., A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol. Ad Hoc Networks 18:133鈥?46, 2014.CrossRef
    22.Peeters, R., and Hermans, J., Attack on Liao and Hsiao鈥檚 Secure ECC-based RFID Authentication Scheme integrated with ID-Verifier Transfer Protocol. Cryptology ePrint Archive, Report 2013/399, 2013
    23.Zhao, Z.g., A Secure RFID Authentication Protocol for Healthcare Environments Using Elliptic Curve Cryptosystem. J. Med. Syst. 38(5):1鈥?, 2014.CrossRef
    24.He, D., Kumar, N., Chilamkurti, N., Lee, J.-H., Lightweight ECC based RFID authentication integrated with an ID verifier transfer protocol. J. Med. Syst. 38(10):1鈥?, 2014.CrossRef
    25.He, D., Kumar, N., Khan, M.K., Robustanonymous authentication protocol for healthcare applications using wirelessmedical sensor networks. Multimedia Systems 21(1):49鈥?0, 2013.CrossRef
    26.Guo, P., Wang, J., Li, B., Lee, S., A Variable Threshold-value Authentication Architecture for Wireless Mesh Networks. Journal of Internet Technology 15(6):929鈥?36, 2014.
    27.Ren, Y., Shen, J., Wang, J., Han, J., Lee, S., Mutual Verifiable Provable Data Auditing in Public Cloud Storage. Journal of Internet Technology 16(2):317鈥?23, 2015.
    28.Shen, J., Tan, H., Wang, J., Wang, J., Lee, S., A Novel Routing Protocol Providing Good Transmission Reliability in Underwater Sensor Networks. Journal of Internet Technology 16(1):171鈥?78, 2015.
    29.Han, W., and Zhu, Z., An ID-based mutual authentication with key agreement protocol for multiserver environment on elliptic curve cryptosystem. Int. J. Commun. Syst. 27(8):1173鈥?185, 2014.CrossRef
    30.He, D., Kumar, N., Chilamkurti, N., A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks. Information Sciences, 2015. doi:10.鈥?016/鈥媕.鈥媔ns.鈥?015.鈥?2.鈥?10 .
    31.He, D., and Zeadally, S., Authentication protocol for ambient assisted living system. IEEE Communications Magazine 35(1):71鈥?7, 2015.CrossRef
    32.He, D., Kumar, N., Chen, J., et al., Robust anonymous authentication protocol for healthcare applications using wireless medical sensor networks. Multimedia Systems 21(1):49鈥?0, 2015.CrossRef
    33.Hao, X., Wang, J., Yang, Q., Yan, X., and Li, P., A chaotic map-based authentication scheme for telecare medicine information systems. doi:10.鈥?007/鈥媠10916-012-9919-y , 2013
    34.He, D., and Wang, D., Robust biometrics-based authentication scheme for multi-server environment. IEEE Systems Journal,1鈥?, 2014.
    35.He, D., Zhang, Y., Chen, J., Cryptanalysis and improvement of an anonymous authentication protocol for wireless access networks. Wireless Personal Communications 74(2):229鈥?43, 2014.CrossRef
  • 作者单位:Chunhua Jin (1)
    Chunxiang Xu (1)
    Xiaojun Zhang (1)
    Fagen Li (1)

    1. School of Computer Science and Engineering, UESTC, Chengdu, 611731, China
  • 刊物类别:Mathematics and Statistics
  • 刊物主题:Statistics
    Statistics for Life Sciences, Medicine and Health Sciences
    Health Informatics and Administration
  • 出版者:Springer Netherlands
  • ISSN:1573-689X
文摘
Patient medication safety is an important issue in patient medication systems. In order to prevent medication errors, integrating Radio Frequency Identification (RFID) technology into automated patient medication systems is required in hospitals. Based on RFID technology, such systems can provide medical evidence for patients鈥?prescriptions and medicine doses, etc. Due to the mutual authentication between the medication server and the tag, RFID authentication scheme is the best choice for automated patient medication systems. In this paper, we present a RFID mutual authentication scheme based on elliptic curve cryptography (ECC) to enhance patient medication safety. Our scheme can achieve security requirements and overcome various attacks existing in other schemes. In addition, our scheme has better performance in terms of computational cost and communication overhead. Therefore, the proposed scheme is well suitable for patient medication systems. Keywords Patient medication safety Radio frequency identification Mutual authentication Elliptic curve cryptography

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700