Corpus ID: 5998375

Do No Harm: The Use of RFID Tags in a Medical Environment

@inproceedings{Bolan2006DoNH,
  title={Do No Harm: The Use of RFID Tags in a Medical Environment},
  author={Christopher Bolan},
  booktitle={Security and Management},
  year={2006}
}
  • C. Bolan
  • Published in Security and Management 2006
  • Computer Science
With the increasing usage of RFID systems and their potential in a range of common applications especially medical related fields, it is important to investigate the weaknesses of the technology and the potential risks that accompany them. The discussion outlines possible attacks against confidentiality, integrity and availability and speculates how such attacks would effect medical installations. 
RFID communications - Who is listening?
TLDR
An eavesdropping attack against an EPC RFID system is investigated and it is shown how a simple device may be used to record interactions between both Tag and Readers. Expand

References

SHOWING 1-10 OF 22 REFERENCES
Radio Frequency Identification: a review of low cost tag security proposals
  • C. Bolan
  • Computer Science
  • Int. J. Inf. Comput. Secur.
  • 2007
TLDR
This paper investigates some of the low-cost proposals for securing RFID tags from potential misuse through authentication and encryption. Expand
RFID Systems and Security and Privacy Implications
TLDR
The Auto-ID Center is developing low-cost radio frequency identification (RFID) based systems with the initial application as next generation bar-codes with research opportunities for experts in cryptography and information security. Expand
The underestimation of threats to patient data in clinical practice
TLDR
The security threats to medical data in terms of confidentiality, privacy, integrity, misuse and availability are discussed, the issue of responsibility with reference to clinical governance is reviewed, and the underlying reasons for the underestimation are uncovered. Expand
Security and Privacy Issues in E-passports
  • A. Juels, D. Molnar, David A. Wagner
  • Computer Science
  • First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05)
  • 2005
TLDR
Privacy and security issues that apply to e-passports are described and analyzed, and these issues are analyzed in the context of the International Civil Aviation Organization (ICAO) standard for e- Passports. Expand
Need to Know: Security or Liability?
  • C. Bolan
  • Business, Computer Science
  • AISM
  • 2004
TLDR
The ‘Need to Know’ concept is often quoted but rarely defined in the literature and the principle is investigated with respect to its use in the protection of personal medical information and liabilities that may result from such usage. Expand
Becoming an information master: using POEMs to change practice with confidence. Patient-Oriented Evidence that Matters.
TLDR
The final step in the process, changing practice habits after finding new information that necessitates it is discussed, managing change, consider barriers, and present ideas to help with the process. Expand
Methods of Livestock Identification
TLDR
Purdue University Department of Animal Sciences Animal identification is the basis for keeping accurate production records of the herd/flock, and selection should be based on the method that best fits an operation's needs. Expand
3D Asset Location for Mobile Devices
  • Using Passive RFID Tags",
  • 2005
3D Asset Location for Mobile Devices Using Passive RFID Tags
  • 3D Asset Location for Mobile Devices Using Passive RFID Tags
  • 2005
...
1
2
3
...