Advanced Science and Technology Letters Vol.40 (Healthcare and Nursing 2013), pp.101-104 Requirement of Authentication.

Slides:



Advertisements
Similar presentations
HIPAA Security Standards Emmanuelle Mirsakov USC School of Pharmacy.
Advertisements

A Cryptographic Key Management Solution for HIPAA Privacy/Security Regulations 針對 HIPAA 隱私 / 安全規則的一種密碼金鑰管理方法 IEEE Transactions on Information Technology.
CAMP Med Building a Health Information Infrastructure to Support HIPAA Rick Konopacki, MSBME HIPAA Security Coordinator University of Wisconsin-Madison.
Health Insurance Portability Accountability Act of 1996 HIPAA for Researchers: IRB Related Issues HSC USC IRB.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
A Simple and Cost-effective RFID Tag-Reader Mutual Authentication Scheme Divyan M. Konidala, Zeen Kim, Kwangjo Kim {divyan, zeenkim, International.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
The Islamic University of Gaza
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 9: Planning and Managing Certificate Services.
FIT3105 Smart card based authentication and identity management Lecture 4.
Wired Equivalent Privacy (WEP)
Adaptive Security for Wireless Sensor Networks Master Thesis – June 2006.
Information Security of Embedded Systems : Communication, wireless remote access Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer.
2008/7/3 NanoMon: An Adaptable Sensor Network Monitoring Software Misun Yu, Haeyong Kim, and Pyeongsoo Mah Embedded S/W Research Division Electronics and.
DATA SECURITY AND PRIVACY IN WIRELESS BODY AREA NETWORKS MING LI AND WENJING LOU, WORCESTER POLYTECHNIC INSTITUTE KUI REN, ILLINOIS INSTITUTE OF TECHNOLOGY.
Cross Strait Quad-Regional Radio Science and Wireless Technology Conference, Vol. 2, p.p. 980 – 984, July 2011 Cross Strait Quad-Regional Radio Science.
Summary For Chapter 8 Student: Zhibo Wang Professor: Yanqing Zhang.
D ATABASE S ECURITY Proposed by Abdulrahman Aldekhelallah University of Scranton – CS521 Spring2015.
RIVERA SÁNCHEZ-1 CSE 5810 User Authentication in Mobile Healthcare Applications Yaira K. Rivera Sánchez Computer Science & Engineering Department University.
WELCOME TO THE SEMINAR ON Money Pad, The Future Wallet
Radio Frequency Identification By Bhagyesh Lodha Vinit Mahedia Vishnu Saran Mitesh Bhawsar.
Introduction to the Mobile Security (MD)  Chaitanya Nettem  Rawad Habib  2015.
Comparative studies on authentication and key exchange methods for wireless LAN Authors: Jun Lei, Xiaoming Fu, Dieter Hogrefe and Jianrong Tan Src:
September 18, 2015 無線射頻識別 論文報告 Reported by: 廖翊婷. September 18, 2015 An RFID-based System for Emergency Health Care Services Cristina TURCU, Cornel TURCU,
多媒體網路安全實驗室 An Efficient RFID Authentication Protocol for Low-cost Tags Date : Reporter : Hong Ji Wei Authors : Yanfei Liu From : 2008 IEEE/IFIP.
Copyright ©2011 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved. Health Information Technology and Management Richard.
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web 1 Component 4/Unit 2Health IT Workforce Curriculum.
Health Insurance Portability and Accountability Act of 1996 (HIPAA) Proposed Rule: Security and Electronic Signature Standards.
Opportunities in M-Commerce Standards & Applications Nour El Kadri University of Ottawa.
UNIVERSITY OF PATRAS Department of Electrical & Computer Engineering Wireless Telecommunications Laboratory M. Tsagkaropoulos “Securing.
Seung-Hoon Lee, Sewook Jung, Alexander Chang, Dea-Ki Cho, and Mario Gerla Network Research Lab Department of Computer Science University of California,
Patient Data Security and Privacy Lecture # 7 PHCL 498 Amar Hijazi, Majed Alameel, Mona AlMehaid.
Copyright © 2008 Delmar Learning. All rights reserved. Unit 8 Observation, Reporting, and Documentation.
Medical Law and Ethics, Third Edition Bonnie F. Fremgen Copyright ©2009 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved.
1 授課教授:黃秋煌 學生:賴志勇 學號: M Source: This work was published as an abstract in the proceedings of 2007 Symposium on Cryptography and Information.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
Eliza de Guzman HTM 520 Health Information Exchange.
Wireless Hotspots: Current Challenges and Future Directions CNLAB at KAIST Presented by An Dong-hyeok Mobile Networks and Applications 2005.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Identity Management: A Technical Perspective Richard Cissée DAI-Labor; Technische Universität Berlin
Cloud Networked Robotics Speaker: Kai-Wei Ping Advisor: Prof Dr. Ho-Ting Wu 2013/04/08 1.
Information Technology Needs and Trends in the Electric Power Business Mladen Kezunovic Texas A&M University PS ERC Industrial Advisory Board Meeting December.
Qinghan Xiao, Cam Boulet and Thomas Gibbons Second International Conference on Availability, Reliability and Security, 2007 Speaker : 黃韋綸 RFID Security.
Lecture 24 Wireless Network Security
National Institute of Science & Technology WIRELESS LAN SECURITY Swagat Sourav [1] Wireless LAN Security Presented By SWAGAT SOURAV Roll # EE
A Study on Smart Gateway Based on Android 4.x Bluetooth HDP(Health Device Profile) Jae-Hwan Jeon l, Sung-In Kang 2, Gwan-Hyung Kim 3, Oh-Hyun Kwon 3, Sung-Wook.
Azam Supervisor : Prof. Raj Jain
A Method for Providing Personalized Home Media Service Using Cloud Computing Technology Cui Yunl, Myoungjin Kim l and Hanku Lee l 'z * ' Department of.
A Study of Secure Communications in WiFi Networks Bumjo Park 1 and Namgi Kim 11 1 Dept. Of Computer Science, Kyonggi Univ. San 94-1, Iui, Yeongtong, Suwon,
Hoda Jannati School of Computer Science
Advanced Science and Technology Letters Vol.106 (Information Technology and Computer Science 2015), pp.17-21
RFID SECURITY.
A Framework with Behavior-Based Identification and PnP Supporting Architecture for Task Cooperation of Networked Mobile Robots Joo-Hyung Kiml, Yong-Guk.
Low-power Hibernation Technique for WUSB over IEEE Hierarchical MAC Kyeong Hur 1, Won-Sung Sohn 1, Jae-Kyung Kim 1, YangSun Lee 2 1 Dept. of Computer.
Advanced Science and Technology Letters Vol.46 (Mobile and Wireless 2014), pp University Dedicated Next.
Interleaving and Collusion Attacks on a Dynamic Group Key Agreement Scheme for Low-Power Mobile Devices * Junghyun Nam 1, Juryon Paik 2, Jeeyeon Kim 2,
A Design of Electronic Payment Authentication Method based on NFC Smartphone Seolhwa Han, Okkyung Choi*, Kangseok Kim, Hongjin Yeh, Taesik Shon Dept. of.
EDGE™ Final Project Plan Presentation P09001 – RFID Reader & Active Tag Philip Davenport (Industrial and Systems Engineering)
Security of the Internet of Things: perspectives and challenges
WEB BASED MONITORING AND CONTROLING OF INDUSTRIAL PROCESSES PRESENTED BY: Bhagyawant (3AE07EC018) Kushal (3AE07EC032) Mahantesh (3AE07EC034) Mallinath.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 3 This material was developed by Oregon Health & Science University,
1 HIPAA’s Impact on Depository Financial Institutions 2 nd National Medical Banking Institute Rick Morrison, CEO Remettra, Inc.
Audit Trail LIS 4776 Advanced Health Informatics Week 14
Sensors Journal, IEEE, Issue Date: May 2013,
Advanced Science and Technology Letters
Aziz Nasridinov and Young-Ho Park*
Yunsik Son1, Seman Oh1, Yangsun Lee2
PLANNING A SECURE BASELINE INSTALLATION
Presentation transcript:

Advanced Science and Technology Letters Vol.40 (Healthcare and Nursing 2013), pp Requirement of Authentication between RFID tag and Agent for Applying U-healthcare System Jung Tae Kim Dept. Of Electronic Engineering, Mokwon University, 800, Doan-dong, Seo-Ku, Daejeon, , Korea Abstract. A variety of security and privacy threats to RFID authentication protocols have been widely studied, including eavesdropping, replay attacks, denial of service (DoS) attacks, tracking, and traceability. Considering this RFID security issues, we surveyed the security threats and open problems related to issues by means of information security and privacy. In ubiquitous sensor node, it is possible to collect the data from end node and track patient's location without awareness. Even though, concerns about the invasion of personal medical privacy have already appeared in e-health care system and medical industry rules. In this paper, we have analyzed and compared practical threat on U-healthcare system. Keywords: Attacks, Privacy, Tracking, Security, RFID Protocol. 1 Introduction Radio Frequency Identification (RFID) system is one of the promising technology that plays an important role for object identification as ubiquitous infrastructure and wireless sensor networks. RFID system can be applied to many applications in the field of access control, manufacturing automation, maintenance, supply chain management, parking garage management, automatic payment, tracking, and inventory control. To integrate several open wireless networks into single networks, a lot of consideration should be taken into account to solve challenges for supporting for mobility management, quality of service provision and security interoperability. An integrated security mechanism is one of the key challenges in open wireless network architecture. There are a lot of diversities of the networks in open wireless network architecture. The unique security mechanism used in each of the networks is impossible to utilize secure network because wireless network security is not sufficient to implement required security level. We analyzed attacks on embedded RFID application under U-healthcare system. Integration of RFID system management within the existing enterprise network management framework can be used for re-use of remote monitoring, distributed and collaborative network management concepts. There are many applications to employ RFID utilization. The usages are to migrate from RFID device management towards RFID services management. It can be adaptive self-reconfiguration and self-healing mechanisms of ISSN: ASTL Copyright 2013 SERSC

Advanced Science and Technology Letters Vol.40 (Healthcare and Nursing 2013) RFID readers. The major application are classified such as real-time data analysis and visualization of RFID operations, RFID policy-based management, RFID asset management, readers’ behavior modeling and prediction, efficient and lightweight cryptographic algorithms, new security mechanisms, tailored to RFID applications, and unified and interoperable RFID reader management platforms. Until now, RFID system is widely used to identify objects, sensor module. But many security problems are reported and not solved until now. We analyzed the attacks and threats in RFID system. To illustrate example, we gave a U-healthcare system. The use of smart phone and sensor devices in the hospital environment can give an opportunity to deliver better services for patients and staffs. Healthcare managers can manage daily’s work with easy using blended techniques such as wireless and sensor devices. Applications with embedded RFID system will be widely extended to support medical service and sensor node in wireless networks [1, 2]. The remainder of this paper organized as follows. Section I is the introduction. Section II provides related works of application of RFID for fusion technologies. Section III presents the attacks analysis of protocol and discusses the various security and privacy issues including the associated attack. Section IV provides the attacks model in RFID application under U-healthcare system. Finally, section V gave a conclusion. 2 Model of Attacks in U-healthcare System There are a variety of vulnerable attacks in RFID system. Security threats to RFID protocols can be classified into weak and strong attacks. Weak attacks are threats feasible just by observing and manipulating communications between a server and tags. Replay attacks and interleaving attacks are examples of weak attacks. Strong attacks are threats possible for an attacker which has compromised a target tag. An RFID tag’s memory is vulnerable to compromise by side channel attacks, because the memory of a low cost tag is unlikely to be tamper-proof. The current research fields of RFID systems are considerable under five functional elements, namely configuration, fault, performance, accounting and security management [3]. We have to take into consideration privacy, security and performance. To illustrate attach model, they proposed attack tree for the threat of compromising data through the RF-link and listing of threats against availability and risk assessment [4]. When discussing information security of an RFID application, this generalized threat model can be taken as a starting point to build attack trees for each threat relating to this application. The main objective of U-healthcare system with embedded RFID system is to design an e-health system with wireless communication in order to provide customers with convenient and comfortable service. To improve efficiency of tasks for staffs in a hospital, wireless network will be employed so that it could allow mobile and wireless services. The protocol separates the authority of hospital doctor, nurse, pharmacy to access to patient's information by level of access authority of hospital which is registered to management server and makes the hospital do the minimum task. We introduced the u-healthcare service network architecture. Particularly we consider u- hospital healthcare network environment in here. The u-hospital network 102 Copyright 2013 SERSC

Advanced Science and Technology Letters Vol.40(Healthcare and Nursing 2013) allows the medical steps to use mobile medical devices, to measure and record medical data users, and to get information related to their patient or treatment from HIS. Wei-Bin Lee proposed a cryptographic key management scheme. The proposed process is to facilitate interoperations of multiple cryptographic mechanisms in order to comply with the HIPAA (Health Insurance Portability and Accountability Act) privacy/security regulations. The proposed scheme can be divided into three phases: registration, encryption, and decryption. The decryption phase is subdivided into two cases because of the consent exceptions [4-7]. We described attack model, vulnerable element and security problem under U- healthcare system in figure 1. Fig. 1. Model of Attacks of RFID System under U-healthcare System The authentication between and tag are as follows. We have to consider the attack issues in each protocol level. A.Registration Phase After reading the “Notice of Privacy Practices,” each patient has to register at SG. The patient signs and dates the permitting consent to verify acceptance of the PHI access rules, and further sends the signed consent with his/her fundamental data to SG. When receiving the request, SG first checks the validity of the received consent and then creates contract. The contract consists of the signed consent, the data received from the patient, and a summary of the duties of SG as well as its fundamental data, such as identification or name of the organization. A.Encryption Phase For simplicity, assume that M is the PHI (Protected Health Information) part of the health information and R represents the remaining parts. To ensure confidentiality and privacy, M must be encrypted. To encrypt PHI, the patient must enable the health data card by entering his/her PIN or verifying the biometric information. The enabled card will do the following to encrypt M. A.Decryption Phase The purpose of the decryption phase is to reveal the encrypted PHI. Without a legal authorization, disclosure of PHI would damage a patient’s privacy, and is, therefore, forbidden. Hence, construction of the appropriate operations in the decryption phase is a means to protect privacy and rights of a patient. Due to the consideration of whether the patient is directly involved, two cases have to be discussed in this phase. Copyright 2013 SERSC 103

Advanced Science and Technology Letters Vol.40 (Healthcare and Nursing 2013) Finally, the applications in this system will provide efficient, accurate and real-time health care services. The application development process will follow the developer’s project plan. Main features of the applications are described below. 3 Conclusion Remarks RFID system is widely used to identify objects, sensor module. But there are occurred many security problem. We analyzed the attacks and threats in RFID system, especially. Also, we have surveyed security, and user’s privacy in RFID protocol. Many schemes are published to secure against replay attacks, tracking attacks, tag spoofing, denial of service attacks, attacks against users’ privacy so far. But there are many open issues in RFID system. Acknowledgments This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education, Science and Technology (grant number: ) References 1.George Poulopoulos, Konstantinos Markantonakis and Keith Mayes.: A Secure and Efficient Mutual Authentication Protocol for Low-Cost RFID Systems. In: 2009 International Conference on Availability, Reliability and Security, pp (2009) 2.Boyeon Song.: Server Impersonation Attacks on RFID Protocols. In: The Second International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies, pp (2009) 3.Imran Erguler and Emin Anarim.: Practical attacks and improvements to an efficient radio frequency identification authentication protocol. In: Concurrency and Computation: Practice and Experience, pp , (2011) 4.Thomas Schaberreiter, et al.: An Enumeration of RFID Related Threats. In: The Second International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies, pp (2008) 5.Cheng Hsu, David M. Levermore, Christopher Carothers, and Gilbert Babin, Enterprise collaboration.: On-demand information exchange using enterprise databases, wireless sensor networks, and RFID Systems. In: IEEE Transaction on Systems, Man, and Cybernetics-Part A: Systems and Humans, vol.37, no.4, pp (2007) 6.Young-Jae Park, et al.: On the accuracy of RFID tag estimation functions. In: Journal of Information and Communication Convergence Engineering (JICCE), vol.10, no.1, pp (2012) 7.Eslam Gamal Ahmed, Eman Shaaban and Mohamed Hashem.: Lightweight Mutual Authentication Protocol for Low Cost RFID Tags. In: International Journal of Network Security & Its Applications (IJNSA), Volume 2, Number 2, April 2010, pp (2010) 104 Copyright 2013 SERSC