Literature DB >> 26084587

A Secure RFID Tag Authentication Protocol with Privacy Preserving in Telecare Medicine Information System.

Chun-Ta Li1, Chi-Yao Weng, Cheng-Chi Lee.   

Abstract

Radio Frequency Identification (RFID) based solutions are widely used for providing many healthcare applications include patient monitoring, object traceability, drug administration system and telecare medicine information system (TMIS) etc. In order to reduce malpractices and ensure patient privacy, in 2015, Srivastava et al. proposed a hash based RFID tag authentication protocol in TMIS. Their protocol uses lightweight hash operation and synchronized secret value shared between back-end server and tag, which is more secure and efficient than other related RFID authentication protocols. Unfortunately, in this paper, we demonstrate that Srivastava et al.'s tag authentication protocol has a serious security problem in that an adversary may use the stolen/lost reader to connect to the medical back-end server that store information associated with tagged objects and this privacy damage causing the adversary could reveal medical data obtained from stolen/lost readers in a malicious way. Therefore, we propose a secure and efficient RFID tag authentication protocol to overcome security flaws and improve the system efficiency. Compared with Srivastava et al.'s protocol, the proposed protocol not only inherits the advantages of Srivastava et al.'s authentication protocol for TMIS but also provides better security with high system efficiency.

Entities:  

Mesh:

Year:  2015        PMID: 26084587     DOI: 10.1007/s10916-015-0260-0

Source DB:  PubMed          Journal:  J Med Syst        ISSN: 0148-5598            Impact factor:   4.460


  15 in total

1.  Two RFID-based solutions to enhance inpatient medication safety.

Authors:  Hung-Yu Chien; Chia-Chuan Yang; Tzong-Chen Wu; Chin-Feng Lee
Journal:  J Med Syst       Date:  2009-09-25       Impact factor: 4.460

2.  A comprehensive RFID solution to enhance inpatient medication safety.

Authors:  Pedro Peris-Lopez; Agustin Orfila; Aikaterini Mitrokotsa; Jan C A van der Lubbe
Journal:  Int J Med Inform       Date:  2010-11-26       Impact factor: 4.046

3.  A design of tamper resistant prescription RFID access control system.

Authors:  Yu-Yi Chen; Der-Chen Huang; Meng-Lin Tsai; Jinn-Ke Jan
Journal:  J Med Syst       Date:  2011-07-13       Impact factor: 4.460

4.  RFID authentication protocol to enhance patient medication safety.

Authors:  Sonam Devgan Kaul; Amit K Awasthi
Journal:  J Med Syst       Date:  2013-10-13       Impact factor: 4.460

5.  Two RFID-based solutions for secure inpatient medication administration.

Authors:  Yi-Chung Yen; Nai-Wei Lo; Tzong-Chen Wu
Journal:  J Med Syst       Date:  2011-07-06       Impact factor: 4.460

6.  A secure lightweight RFID binding proof protocol for medication errors and patient safety.

Authors:  Shuhua Wu; Kefei Chen; Yuefei Zhu
Journal:  J Med Syst       Date:  2011-08-27       Impact factor: 4.460

7.  A hash based mutual RFID tag authentication protocol in telecare medicine information system.

Authors:  Keerti Srivastava; Amit K Awasthi; Sonam D Kaul; R C Mittal
Journal:  J Med Syst       Date:  2014-12-10       Impact factor: 4.460

8.  A secure and efficient chaotic map-based authenticated key agreement scheme for telecare medicine information systems.

Authors:  Dheerendra Mishra; Jangirala Srinivas; Sourav Mukhopadhyay
Journal:  J Med Syst       Date:  2014-08-16       Impact factor: 4.460

9.  A uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care.

Authors:  Ya-Fen Chang; Shih-Hui Yu; Ding-Rui Shiao
Journal:  J Med Syst       Date:  2013-01-15       Impact factor: 4.460

10.  A secure chaotic maps and smart cards based password authentication and key agreement scheme with user anonymity for telecare medicine information systems.

Authors:  Chun-Ta Li; Cheng-Chi Lee; Chi-Yao Weng
Journal:  J Med Syst       Date:  2014-07-06       Impact factor: 4.460

View more
  5 in total

1.  A Hash Based Remote User Authentication and Authenticated Key Agreement Scheme for the Integrated EPR Information System.

Authors:  Chun-Ta Li; Chi-Yao Weng; Cheng-Chi Lee; Chun-Cheng Wang
Journal:  J Med Syst       Date:  2015-09-09       Impact factor: 4.460

2.  A Provably Secure RFID Authentication Protocol Based on Elliptic Curve for Healthcare Environments.

Authors:  Mohammad Sabzinejad Farash; Omer Nawaz; Khalid Mahmood; Shehzad Ashraf Chaudhry; Muhammad Khurram Khan
Journal:  J Med Syst       Date:  2016-05-24       Impact factor: 4.460

3.  IoT in medical & pharmaceutical: Designing lightweight RFID security protocols for ensuring supply chain integrity.

Authors:  Masoumeh Safkhani; Samad Rostampour; Ygal Bendavid; Nasour Bagheri
Journal:  Comput Netw       Date:  2020-09-17       Impact factor: 4.474

4.  A Secure Cloud-Assisted Wireless Body Area Network in Mobile Emergency Medical Care System.

Authors:  Chun-Ta Li; Cheng-Chi Lee; Chi-Yao Weng
Journal:  J Med Syst       Date:  2016-03-21       Impact factor: 4.460

5.  A Novel Lightweight Authentication Scheme for RFID-Based Healthcare Systems.

Authors:  Feng Zhu; Peng Li; He Xu; Ruchuan Wang
Journal:  Sensors (Basel)       Date:  2020-08-27       Impact factor: 3.576

  5 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.