An Efficient RFID Authentication Protocol to Enhance Patient Medication Safety Using Elliptic Curve Cryptography

Medication errors are very dangerous even fatal since it could cause serious even fatal harm to patients. In order to reduce medication errors, automated patient medication systems using the Radio Frequency Identification (RFID) technology have been used in many hospitals. The data transmitted in those medication systems is very important and sensitive. In the past decade, many security protocols have been proposed to ensure its secure transition attracted wide attention. Due to providing mutual authentication between the medication server and the tag, the RFID authentication protocol is considered as the most important security protocols in those systems. In this paper, we propose a RFID authentication protocol to enhance patient medication safety using elliptic curve cryptography (ECC). The analysis shows the proposed protocol could overcome security weaknesses in previous protocols and has better performance. Therefore, the proposed protocol is very suitable for automated patient medication systems.

[1]  Jian Wang,et al.  Strong Authentication Scheme for Telecare Medicine Information Systems , 2011, Journal of Medical Systems.

[2]  Zhenguo Zhao,et al.  An Efficient Anonymous Authentication Scheme for Wireless Body Area Networks Using Elliptic Curve Cryptosystem , 2014, Journal of Medical Systems.

[3]  Rodrigo Roman,et al.  Real-time location and inpatient care systems based on passive RFID , 2010, Journal of Network and Computer Applications.

[4]  Jianhua Chen,et al.  An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security , 2012, Inf. Fusion.

[5]  Hung-Ming Chen,et al.  An Efficient and Secure Dynamic ID-based Authentication Scheme for Telecare Medical Information Systems , 2012, Journal of Medical Systems.

[6]  Cheng-Yuan Ku,et al.  A RFID Grouping Proof Protocol for Medication Safety of Inpatient , 2009, Journal of Medical Systems.

[7]  Aikaterini Mitrokotsa,et al.  A comprehensive RFID solution to enhance inpatient medication safety , 2011, Int. J. Medical Informatics.

[8]  Zhian Zhu,et al.  An Efficient Authentication Scheme for Telecare Medicine Information Systems , 2012, Journal of Medical Systems.

[9]  Lejla Batina,et al.  RFID-Tags for Anti-counterfeiting , 2006, CT-RSA.

[10]  Masoumeh Safkhani,et al.  On the Designing of a Tamper Resistant Prescription RFID Access Control System , 2012, Journal of Medical Systems.

[11]  Zhian Zhu,et al.  An ID‐based mutual authentication with key agreement protocol for multiserver environment on elliptic curve cryptosystem , 2014, Int. J. Commun. Syst..

[12]  Norbert Giczi,et al.  Elliptic curve cryptography based mutual authentication protocol for low computational complexity environment , 2010, IEEE 5th International Symposium on Wireless Pervasive Computing 2010.

[13]  Roel Peeters,et al.  Attack on Liao and Hsiao's Secure ECC-based RFID Authentication Scheme integrated with ID-Verifier Transfer Protocol , 2013, IACR Cryptol. ePrint Arch..

[14]  Ronald E. Rice,et al.  Public views of mobile medical devices and services: A US national survey of consumer sentiments towards RFID healthcare technology , 2009, Int. J. Medical Informatics.

[15]  Hung-Yu Chien,et al.  Two RFID-based Solutions to Enhance Inpatient Medication Safety , 2011, Journal of Medical Systems.

[16]  Nasour Bagheri,et al.  Two RFID Standard-based Security Protocols for Healthcare Environments , 2013, Journal of Medical Systems.

[17]  Sándor Imre,et al.  Elliptic curve cryptography based mutual authentication protocol for low computational capacity RFID systems - performance analysis by simulations , 2010, 2010 IEEE International Conference on Wireless Communications, Networking and Information Security.

[18]  Chih-Ming Hsiao,et al.  A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol , 2014, Ad Hoc Networks.

[19]  Yu-Fang Chung,et al.  A Secure Authentication Scheme for Telecare Medicine Information Systems , 2012, Journal of Medical Systems.

[20]  Yu-Yi Chen,et al.  A Secure 2G-RFID-Sys Mechanism for Applying to the Medical Emergency System , 2013, Journal of Medical Systems.

[21]  Jue-Sam Chou An efficient mutual authentication RFID scheme based on elliptic curve cryptography , 2013, The Journal of Supercomputing.

[22]  David C. Yen,et al.  Understanding the Mediating Effects of Relationship Quality on Technology Acceptance: An Empirical Study of E-Appointment System , 2013, Journal of Medical Systems.

[23]  Hu Jin,et al.  An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security , 2012 .

[24]  L. Batina,et al.  EC-RAC (ECDLP Based Randomized Access Control): Provably Secure RFID authentication protocol , 2008, 2008 IEEE International Conference on RFID.

[25]  Yixian Yang,et al.  Robust Biometrics Based Authentication and Key Agreement Scheme for Multi-Server Environments Using Smart Cards , 2015, PloS one.

[26]  Debiao He,et al.  Anonymous two-factor authentication for consumer roaming service in global mobility networks , 2013, IEEE Transactions on Consumer Electronics.

[27]  Ju-Chuan Wu,et al.  A Reliable RFID Mutual Authentication Scheme for Healthcare Environments , 2013, Journal of Medical Systems.

[28]  Zhang Rui,et al.  A More Secure Authentication Scheme for Telecare Medicine Information Systems , 2012, Journal of medical systems.

[29]  Tim Kerins,et al.  Public-Key Cryptography for RFID-Tags , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07).

[30]  Wenfen Liu,et al.  An Improved Authentication Scheme for Telecare Medicine Information Systems , 2012, Journal of Medical Systems.