2013
DOI: 10.1007/s10916-013-9962-3
|View full text |Cite
|
Sign up to set email alerts
|

Two RFID Standard-based Security Protocols for Healthcare Environments

Abstract: Radio Frequency Identification (RFID) systems are widely used in access control, transportation, real-time inventory and asset management, automated payment systems, etc. Nevertheless, the use of this technology is almost unexplored in healthcare environments, where potential applications include patient monitoring, asset traceability and drug administration systems, to mention just a few. RFID technology can offer more intelligent systems and applications, but privacy and security issues have to be addressed … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
4
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(4 citation statements)
references
References 33 publications
0
4
0
Order By: Relevance
“…In 2013, Wu et al proposed a novel mutual authentication protocol based on Hill cipher suitable for medical environments. Yet again, Picazo‐Sanchez et al showed that Wu et al may put the location privacy of tag owners on risk. These weaknesses are related to the use of a matrix multiplication based on Hill cipher, which is a known insecure cipher mechanism .…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…In 2013, Wu et al proposed a novel mutual authentication protocol based on Hill cipher suitable for medical environments. Yet again, Picazo‐Sanchez et al showed that Wu et al may put the location privacy of tag owners on risk. These weaknesses are related to the use of a matrix multiplication based on Hill cipher, which is a known insecure cipher mechanism .…”
Section: Introductionmentioning
confidence: 99%
“…These weaknesses are related to the use of a matrix multiplication based on Hill cipher, which is a known insecure cipher mechanism . Thus, with the aim of establishing ISO standard and well‐known NIST security recommendations, Picazo‐Sanchez et al proposed two efficient RFID schemes conforming to ISO/IEC 9798 and 11770. In 2014, Srivastava et al proposed a hash‐based mutual RFID authentication protocol for medical sector that can resist from various active and passive attacks.…”
Section: Introductionmentioning
confidence: 99%
“…This technology has been successfully used in such fields as agriculture, industry, transportation, and health care. 10 Radio-frequency identification technology has been used in the hospital environment in several ways. For example, in 2007, a study measuring the effectiveness of using RFID was carried out by Kannry et al in the Mount Sinai Medical Center.…”
mentioning
confidence: 99%
“…When compared with typical bar coding systems, the principal merit of a RFID system is its ability to capture tags that are in its area of operation without the need to carefully position the tag, as is required by optical scanners. This technology has been successfully used in such fields as agriculture, industry, transportation, and health care 10 …”
mentioning
confidence: 99%