Abstract
As RFID-tagged systems become ubiquitous, acceptance of this technology by the general public necessitates addressing related security/privacy issues. The past eight years have seen an increasing number of publications in this direction, specifically using cryptographic approaches. Recently, the Journal of Medical Systems published two papers addressing security/privacy issues through cryptographic protocols. We consider the proposed protocols and identify some existing vulnerabilities.
Similar content being viewed by others
References
Chien, H.-Y., Yang, C.-C., Wu, T.-C., and Lee, C.-F., Two RFID-based solutions to enhance inpatient medication safety. J. Med. Syst., 2009. doi:10.1007/s10916-009-9373-7.
Huang, H.-H., and Ku, C.-Y., A RFID grouping proof protocol for medication safety of inpatient. J. Med. Syst. 33:467–474, 2009.
Meiller, Y., Bureau, S., Zhou, W., and Piramuthu, S., Simulation of a health care knowledge-based system with RFID-generated information. In: Proceedings of the Asian Simulation Technology Conference (ASTEC2010), pp. 110–114. Shanghai, 2010.
Min, D., and Yih, Y., Fuzzy logic-based approach to detecting a passive RFID tag in an outpatient clinic. J. Med. Syst., 2009. doi:10.1007/s10916-009-9377-3.
Piramuthu, S., Protocols for RFID tag/reader authentication. Decis. Support Syst. 43(3):897–914, 2007.
Shim, H., Uh, Y., Lee, S. H., and Yoon, Y. R., A new specimen management system using RFID technology. J. Med. Syst., 2010. doi:10.1007/s10916-009-9417-7z.
Stahl, J. E., Holt, J. K., and Gagliano, N. J., Understanding performance and behavior of tightly coupled outpatient systems using RFID: initial experience. J. Med. Syst., 2009: doi:10.1007/s10916-009-9365-7.
Sun, P. R., Wang, B. H., and Wu, F., A new method to guard inpatient medication safety by the implementation of RFID. J. Med. Syst. 32:327–332, 2008.
Tu, Y.-J., and Piramuthu, S., RFID distance bounding protocols. In: Proceedings of the First International EURASIP Workshop on RFID Technology (RFID2007), pp. 67–68. Vienna, 2007.
Acknowledgements
The authors would like to thank the reviewers for their suggestions to improve the content and presentation of this paper.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Wickboldt, AK., Piramuthu, S. Patient Safety Through RFID: Vulnerabilities in Recently Proposed Grouping Protocols. J Med Syst 36, 431–435 (2012). https://doi.org/10.1007/s10916-010-9487-y
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10916-010-9487-y