Simultaneous multi-level RFID tag ownership & transfer in health care environments

Authentication of Radio Frequency Identification (RFID) tags takes several forms depending on the dictates of the considered scenario. For example, mutual authentication protocols are used in scenarios where both tag and reader need to authenticate each other. We consider and develop ownership transfer protocols for three scenarios in the health care domain that have not been addressed in extant literature. RFID-tagged items in a health care supply chain experience different levels of ownerships, often simultaneously, throughout their lifetime. We consider a scenario related to ownership of RFID tags in a health care supply chain, specifically the seamless incorporation by a third party logistics provider. Another scenario considered is where tags simultaneously possess a temporary and a permanent key for communicating with a temporary (e.g., rental customer) and a permanent (e.g., owner) user respectively. The third scenario considered is where there are several levels of ownership (e.g., primary owner, rental owner, sub-rental owner). We provide example cases in the health care domain where such scenarios are observed. We then present brief security analyses of the developed protocols.

[1]  Selwyn Piramuthu,et al.  RFID mutual authentication protocols , 2011, Decis. Support Syst..

[2]  Ari Juels,et al.  "Yoking-proofs" for RFID tags , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.

[3]  Selwyn Piramuthu,et al.  Adaptive knowledge-based system for health care applications with RFID-generated information , 2011, Decis. Support Syst..

[4]  Selwyn Piramuthu,et al.  Protocols for RFID tag/reader authentication , 2007, Decis. Support Syst..

[5]  Selwyn Piramuthu,et al.  Single RFID Tag Ownership Transfer Protocols , 2012, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[6]  Selwyn Piramuthu,et al.  Multi-tag and multi-owner RFID ownership transfer in supply chains , 2011, Decis. Support Syst..

[7]  Avishai Wool,et al.  Picking Virtual Pockets using Relay Attacks on Contactless Smartcard , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[8]  Cédric Lauradoux,et al.  Distance Bounding Protocols on TH-UWB Radios , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[9]  Li Gong,et al.  Reasoning about belief in cryptographic protocols , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.