Author
Listed:
- Zornitza Genova Prodanoff
(School of Computing, University of North Florida, Jacksonville, FL, USA)
- Edward L. Jones
(Florida Agricultural and Mechanical University, Tallahassee, FL, USA)
- Hongmei Chi
(Florida Agricultural and Mechanical University, Tallahassee, FL, USA)
- Sherif Elfayoumy
(University of North Florida, Jacksonville, FL, USA)
- Cynthia Cummings
(University of North Florida, Jacksonville, FL, USA)
Abstract
Hospitals worldwide have implemented High Frequency (HF) Radio Frequency Identification (RFID) networks for supplies tracking in ER setting, in-patient identification, surgical instrument management, and other applications. Merging of Web, Near Filed Communication (NFC), and HF RFID technologies for their combined use in e-Health applications is a logical next step due to the wide availability of NFC-enabled smartphones. This article outlines some resulting security challenges. Tags are often compliant with multiple standards that operate in the same frequency range. For example, HF RFID tags have already been adopted for in-patient tracking, yet smartphone NFC reader apps can freely access data on those tags. While tag– or session–centered security protocols exist for some RFID standards (e.g. ISO/IEC 29167), no ISO security standard is currently available for HF RFID tags. In such systems, proper traffic characterization can lead to better understanding of operation under “normal” system state conditions and could potentially help to identify security breaches.
Suggested Citation
Zornitza Genova Prodanoff & Edward L. Jones & Hongmei Chi & Sherif Elfayoumy & Cynthia Cummings, 2016.
"Survey of Security Challenges in NFC and RFID for E-Health Applications,"
International Journal of E-Health and Medical Communications (IJEHMC), IGI Global, vol. 7(2), pages 1-13, April.
Handle:
RePEc:igg:jehmc0:v:7:y:2016:i:2:p:1-13
Download full text from publisher
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:igg:jehmc0:v:7:y:2016:i:2:p:1-13. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
We have no bibliographic references for this item. You can help adding them by using this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Journal Editor (email available below). General contact details of provider: https://www.igi-global.com .
Please note that corrections may take a couple of weeks to filter through
the various RePEc services.