Abstract. The existing protocol defined in the ISO/IEC 18000-3 standard does not include the cryptographic authentication mechanism. To remove security vulnerabilities, this paper proposes a strong authentication protocol for RFID tag using SHA-1 hash algorithm. The protocol is based on a three-way challenge response authentication protocol between the tags and a back-end server. In addition, three types of the protocol packets are extended for realizing a strong authentication mechanism, which modifies the protocol defined in the ISO/IEC standard.In order to verify the proposed scheme, a digital Codec is described in Verilog HDL, and simulated using extended three packets as input vectors. The system operates at a clock frequency of 75 MHz on Xilinx FPGA device. From comparison and implementation results, we will show that our scheme is a welldesigned strong protocol that satisfies various security requirements in RFID system environment.
Purpose:
To develop an efficient way to verify that patient plan and dose information does not change during an Eclipse/Aria database version upgrade.
Methods:
Eclipse Scripting Application Programming Interface (ESAPI) was used to create a script to retrieve plan information from the Eclipse database before and after the database upgrade for each patient on treatment. Using Cryptographic Secure Hash Algorithm (SHA256), fixed length digest hash values are generated from the plan parameters for each patient. The script is run twice to create two hash values, HVbefore and HVafter, before and after the Aria database upgrade. Separately, the delivered dose information for all patients was verified by comparing two hash values based on a crystal report summary for all patients treated within a date range. Lastly, an Excel macro is used to import the generated hash values for comparison.
Results:
If HVbefore is the same as HVafter, then the database is considered unchanged based on the collision resistant property of the cryptographic hash function. Otherwise, we conclude that the patient data may have been altered during the upgrade process. In testing the process, all patients passed the comparison. Without using this method, the time to verify a single patient's information was about five minutes. This would result in five hours of work for sixty patients. With this method, we can verify sixty patients in less than thirty minutes before and after the upgrade. This results in time savings of four hours.
Conclusion:
An automatic database verification method has been developed using ESAPI, SHA‐256 Cryptographic Hash Algorithm and Microsoft Excel. We found that the time to verify the database for sixty patients is less than one hour. The scripts can be integrated into Eclipse or can be run as a stand‐alone executable program for a more automated process and increased time savings.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.