Browse > Article
http://dx.doi.org/10.14400/JDC.2014.12.5.249

Verification of a Function-based Security Authentication Protocol for Implantable Medical Devices  

Bae, WooSik (Dept. of AIS Center, Ajou Motor College)
Han, KunHee (Dept. of Information Communication Engineering, Baekseok University)
Publication Information
Journal of Digital Convergence / v.12, no.5, 2014 , pp. 249-254 More about this Journal
Abstract
Recent advancement of USN technology has lent itself to the evolving communication technology for implantable devices in the field of medical service. The wireless transmission section for communication between implantable medical devices and patients is a cause of concern over invasion of privacy, resulting from external attackers' hacking and thus leakage of private medical information. In addition, any attempt to manipulate patients' medical information could end up in serious medical issues. The present study proposes an authentication protocol safe against intruders' attacks when RFID/USN technology is applied to implantable medical devices. Being safe against spoofing, information exposure and eavesdropping attacks, the proposed protocol is based on hash-function operation and adopts session keys and random numbers to prevent re-encryption. This paper verifies the security of the proposed protocol using the formal verification tool, Casper/FDR.
Keywords
Authentication protocol; RFID security; Casper; RFID authentication; Model Checking;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 Wei, J.,Hu, X.,Liu, W., An Improved Authentication Scheme for Telecare Medicine Information Systems., J. Med. Syst. doi: 10.1007/s10916-012-9835-1, 2012.   DOI   ScienceOn
2 B. Alomair, L. Lazos, and R. Poovendran, Securing Low-Cost RFID Systems: An Unconditionally Secure Approach. J. Computer Security, Vol. 19, No. 2, pp. 229-256, 2011.   DOI
3 B. Alomair and R. Poovendran, Privacy Versus Scalability in Radio Frequency Identification Systems. Computer Comm., Vol. 33, No. 18, pp. 2155-2163, 2010.   DOI   ScienceOn
4 G. Lowe. Casper: A compiler for the analysis of security protocols. User Manual and Tutorial. Version 1.12 2009.
5 Oxford University Computing Laboratory. FDR2 User Manual, 19th October 2010.
6 C.A.R Hoare. Communicating Sequential Processes. Prentice-Hall. 1985.
7 B. H. Kim, I. T. Ryoo, RFID Mutual Authentication Protocol Against Reflection Attack, THE JOURNAL OF KOREA INFORMATION AND COMMUNICATIONS SOCIETY, Vol. 32, No 3, pp. 348-354, 2007.   과학기술학회마을
8 H. S. Ahn, K. D. B, E. J. Yoon, I. G. Nam, RFID Mutual Authentication Protocol Providing Stronger Security. The KIPS Transactions : Part C Vol. 16.C, No. 3, pp. 325-334, 2009.   과학기술학회마을   DOI   ScienceOn
9 M. H. Yang, H. Y. Hu, Protocol for ownership transfer across authorities: with the ability to assign transfer targety. Security Comm. Networks Vol. 5, 164-177, 2012.   DOI
10 D. W. Kim, J. W. Han, and K. I. Chung, Trend of Home Device Authentication/ Authorization Technology. Weekly IT BRIEF, No. 1329, pp. 1-11, 2008.
11 Yu-Yi Chen, Jun-Chao Lu, Jinn-Ke Jan, A Secure EHR System Based on Hybrid Clouds. J Med Syst, Vol. 6, pp. 3375-3384, 2012.
12 M. M. Morshed, A. A. H. Yu, An Efficient and Secure Authentication Protocol for RFID Systems. Proceedings of the 17th International Conference on Automation & Computing (ICAC'11), University of Huddersfield, Huddersfield, UK, 10 September, pp. 51-56, 2011.
13 He, D. B., Chen, J. H., and Zhang, R., A more secure authentication scheme for telecare medicine information systems. J. Med. Syst. doi: 10.1007/s10916-011-9658-5, 2011.   DOI   ScienceOn
14 J.E. Song et al., Security Issues and Its Technology Trends in u-Healthcare. ETRI, Electronics and Telecommunications Trends, Vol.22, No.1, 2007.   과학기술학회마을