Improve Healthcare Safety Using Hash-Based Authentication Protocol for RFID Systems

被引:0
作者
Baashirah, Rania [1 ]
Abuzneid, Abdelshakour [1 ]
Tammineedi, Akhil [1 ]
Mathew, Maneesha [1 ]
Bandaru, Neelam [1 ]
Delair, Pulkit [1 ]
机构
[1] Univ Bridgeport, Dept Comp Sci & Eng, Bridgeport, CT 06604 USA
来源
2018 9TH IEEE ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON) | 2018年
关键词
Medication errors; RFID; mutual authentication; Elliptic curve cryptography; IoT; MEDICATION SAFETY;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Medication errors are now rapidly increasing that result in a serious impact on patients Safety. A lot of automated techniques have come up using the Radio-Frequency Identification (RFID) Technology that has now been successfully implemented in hospitals and healthcare institutions. The data that is being transmitted is highly sensitive and has to be authenticated between the server and the tag. Such a mutual authentication is highly necessary to enhance the safety protocols. An RFID authentication protocol using Elliptical Curve Cryptography could overcome security weaknesses and eventually lead to better performance. In order to achieve better security and quicker runtime, ECC must have smaller keys compared to non-ECC. In this paper, elliptic curves over a finite field are being structured that belongs to the category of publickey cryptography. This proposed protocol system not only increases the security to a greater extent but also enhances the performance by enabling large-scale implementations. As security is an instrumental aspect of cryptography, such a proposed system is effectual.
引用
收藏
页码:800 / 805
页数:6
相关论文
共 29 条
  • [1] Comparison and Feasibility of Various RFID Authentication Methods Using ECC
    Alexander, Pagan, Jr.
    Baashirah, Rania
    Abuzneid, Abdelshakour
    [J]. SENSORS, 2018, 18 (09)
  • [2] [Anonymous], 2013, IACR CRYPTOLOGY
  • [3] [Anonymous], 2016, Adv. Ceram. Sci. Eng
  • [4] [Anonymous], 2010, 979812010 ISOIEC
  • [5] Public-key cryptography for RFID-tags
    Batina, L.
    Guajardo, J.
    Kerins, T.
    Mentens, N.
    Tuyls, P.
    Verbauwhede, I.
    [J]. FIFTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, 2007, : 217 - +
  • [6] Bolotnyy L, 2006, 2006 3RD ANNUAL INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS - WORKSHOPS, P1
  • [7] Bringer J., 2008, P 7 INT C CRYPT NETW
  • [8] Burmester M., 2008, P 8 IFIP WG 8 8 11 2
  • [9] A Design of Tamper Resistant Prescription RFID Access Control System
    Chen, Yu-Yi
    Huang, Der-Chen
    Tsai, Meng-Lin
    Jan, Jinn-Ke
    [J]. JOURNAL OF MEDICAL SYSTEMS, 2012, 36 (05) : 2795 - 2801
  • [10] Two RFID-based Solutions to Enhance Inpatient Medication Safety
    Chien, Hung-Yu
    Yang, Chia-Chuan
    Wu, Tzong-Chen
    Lee, Chin-Feng
    [J]. JOURNAL OF MEDICAL SYSTEMS, 2011, 35 (03) : 369 - 375