2013
DOI: 10.1155/2013/752412
|View full text |Cite
|
Sign up to set email alerts
|

Secure e-Health System on Passive RFID: Outpatient Clinic and Emergency Care

Abstract: In recent years, many researches have demonstrated several RFID-based solutions to enhance patient medication safety and avoid human errors. Although RFID-based procedure is more efficient than traditional process, patient's information may be attacked (or stolen) during the data transmission period. This will cause inappropriate medication use and medical errors. In this paper, we introduce a robust RFID-based e-Health system which strengthens the system security and protects the patient's privacy as well. In… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 21 publications
0
2
0
Order By: Relevance
“…That's why information and communication technologies like serious games have become an integral part of the provision of health care: a broad range of new electronic-health (e-Health) applications has emerged [...]. All these applications promise patients, nurses, doctors, and administrators to efficiently access relevant health information, enhance patient care quality, reduce healthcare errors, increase collaboration, and encourage the adoption of healthy behaviours [23].…”
Section: A User-centered Designmentioning
confidence: 99%
“…That's why information and communication technologies like serious games have become an integral part of the provision of health care: a broad range of new electronic-health (e-Health) applications has emerged [...]. All these applications promise patients, nurses, doctors, and administrators to efficiently access relevant health information, enhance patient care quality, reduce healthcare errors, increase collaboration, and encourage the adoption of healthy behaviours [23].…”
Section: A User-centered Designmentioning
confidence: 99%
“…For instance, recently, multiple authors have been able to emulate communications protocols and reverse-engineer cryptographic algorithms using, in most cases, low-cost equipment [ 21 , 22 , 23 , 24 , 25 ]. Figure 1 contains references to the latest analysis about possible attacks on RFID in IoT applications for specific fields like healthcare [ 26 , 27 , 28 , 29 ], defense and public safety [ 30 , 31 ], energy [ 32 ], vehicle access [ 33 , 34 ], retail [ 27 ], assisted-living [ 35 , 36 ], smart cities [ 37 ], Industry 4.0 [ 38 , 39 , 40 , 41 ], ticketing [ 42 , 43 , 44 , 45 , 46 ], or smart farming [ 47 ].…”
Section: Introductionmentioning
confidence: 99%