Abstract
Several papers were proposed in which symmetric cryptography was used to design RFID grouping-proof for medication safety in the Journal of Medical Systems. However, if we want to ensure privacy, authentication and protection against the tracking of RFID-tags without losing system scalability, we must design an asymmetric cryptography-based RFID. This paper will propose a new ECC-based grouping-proof for RFID. Our ECC-based grouping-proof reduces the computation of tags and prevents timeout problems from occurring in n-party grouping-proof protocol. Based on asymmetric cryptography, the proposed scheme is practical, secure and efficient for medication applications.
Similar content being viewed by others
References
Batina, L., Lee, Y.-K., and Seys, S., Privacy-preserving ECC-based grouping proofs for RFID. In: M. Burmester et al. (Eds.): ISC 2010, LNCS 6531, pp. 159–165, 2011.
Chien, H.-Y., Yang, C.-C., Wu, T.-C., and Lee, C.-F., Two RFID-based solutions to enhance inpatient medication safety. J. Med. Syst. 35:369–375, 2011. doi:10.1007/s10916-009-9373-7.
Fan, J., Batina, L., and Verbauwhede, I., Light-weight implementation options for curve-based cryptography: HECC is also ready for RFID. In: International workshop on RFID Security and Cryptography—RISC, 2009.
Hein, D., Wolkerstorfer, J., and Felber, N., ECC is ready for RFID—a proof in silicon. In: R. Avanzi, L. Keliher, F. Sica (Eds.): SAC 2008, LNCS 5381, pp. 401–413, Springer, 2009.
Huang, H.-H., and Ku, C.-Y., A RFID grouping proof protocol for medication safety of inpatient. J. Med. Syst. 33:467–474, 2009.
Juels, A., “Yoking-proofs” for RFID tags. In: PERCOMW 2004, pp. 138–143, IEEE Computer Society, Los Alamitos, 2004.
Lee, Y.-K., Sakiyama, K., Batina, L., and Verbauwhede, I., Elliptic-curve-based security processor for RFID. IEEE Trans. Comput. 57(11):1514–1527, 2008.
Min, D., and Yih, Y., Fuzzy logic-based approach to detecting a passive RFID tag in an outpatient clinic. J. Med. Syst. 35:423–432, 2011. doi:10.1007/s10916-009-9377-3.
Saito, J., Sakurai, K., Grouping Proof for RFID Tags. AINA’05, pp. 621–624, 2005.
Schnorr C.-P., Efficient signature generation for smart cards, J. Cryptol. 4(3):161–174, 1991.
Shim, H., Uh, Y., Lee, S. H., and Yoon, Y. R., A new specimen management system using RFID technology. J. Med. Syst., 2010. doi:10.1007/s10916-009-9417-7z.
Stahl, J. E., Holt, J. K., and Gagliano, N. J., Understanding performance and behavior of tightly coupled outpatient systems using RFID: initial experience. J. Med. Syst., 2009. doi:10.1007/s10916-009-9365-7.
Sun, P. R., Wang, B. H., and Wu, F., A new method to guard inpatient medication safety by the implementation of RFID. J. Med. Syst. 32:4327–4332, 2008. doi:10.1007/s10916-008-9137-9.
Wickboldt, A.-K., and Piramuthu, S., Patient safety through RFID: Vulnerabilities in recently proposed grouping protocols. J. Med. Syst., 2010. doi:10.1007/s10916-010-9487-y.
Yu, Y.-C., Hou, T.-W., and Chiang, T.-C., Low cost RFID real lightweight binding proof protocol for medication errors and patient safety. J. Med. Syst., 2010. doi:10.1007/s10916-010-9546-4.
Acknowledgement
This work is supported by the National Natural Science Foundation of China (No. 61070168).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Lin, Q., Zhang, F. ECC-Based Grouping-Proof RFID for Inpatient Medication Safety. J Med Syst 36, 3527–3531 (2012). https://doi.org/10.1007/s10916-011-9757-3
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10916-011-9757-3