A Secure RFID Authentication Scheme for Medicine Applications

Innovative Mobile and Internet Services in Ubiquitous Computing(2013)

引用 6|浏览0
暂无评分
摘要
RFID could be applied to merely about every section in hospitals, including blood bag management, medical record management, precious medical equipment tracking, discarded object management, emergency medical care tracking, resident healthcare monitoring, patient identification, operating room management, nursery management, drug logistics management, and entry access control. All of them could be well handled with RFID technology. Within such RFID applications, enhancing patients' privacy is considered as the primary task. Nevertheless, the limited computational power of RFID tags indicates that they cannot execute complex cryptographic functions. Consequently, the design of an efficient and secure protocol for RFID systems not employing complex cryptographic techniques is an important issue. Although many authentication protocols have recently been developed for RFID, they either cannot protect the location privacy of tags nor have high overhead on identifying tags for the back-end server. None of them provide satisfactory solutions for both problems at the same time. This study proposes an efficiently mutual authentication scheme for RFID that not only guarantees the location privacy of tags, but also efficiently identifies tags for the back-end server.
更多
查看译文
关键词
location privacy,patient identification,medical equipment tracking,patients privacy,secure protocol,back-end server,cryptographic functions,drug logistics management,authentication protocols,operating room management,emergency medical care tracking,rfid technology,rfid application,resident healthcare monitoring,backend server,biomedical communication,medicine applications,nursery management,secure rfid authentication scheme,medical,discarded object management,complex cryptographic techniques,radiofrequency identification,rfid systems,rfid system,blood bag management,medical record management,cryptographic protocols,high overhead,rfid,rfid tag,mutual authentication scheme,access control,privacy,servers,radio frequency,security,protocols,games
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要