Intelligent Agent Framework for Secure Patient-Doctor Profiling and Profile Matching

Author(s):  
Masoud Mohammadian ◽  
Ric Jentzsch

Radio frequency identification (RFID) is a promising technology for improving services and reduction of cost in health care. Accurate almost real time data acquisition and analysis of patient data and the ability to update such a data is a way to improve patients care and reduce cost in health care systems. This article employs wireless radio frequency identification technology to acquire patient data and integrates wireless technology for fast data acquisition and transmission, while maintaining the security and privacy issues. An intelligent agent framework is proposed to assist in managing patients health care data in a hospital environment. A data classification method based on fuzzy logic is proposed and developed to improve the data security and privacy of data collected and propagated.

Author(s):  
Masoud Mohammadian ◽  
Ric Jentzsch

Radio frequency identification (RFID) is a promising technology for improving services and reduction of cost in health care. Accurate almost real time data acquisition and analysis of patient data and the ability to update such a data is a way to improve patient’s care and reduce cost in health care systems. This article employs wireless radio frequency identification technology to acquire patient data and integrates wireless technology for fast data acquisition and transmission, while maintaining the security and privacy issues. An intelligent agent framework is proposed to assist in managing patients’ health care data in a hospital environment. A data classification method based on fuzzy logic is proposed and developed to improve the data security and privacy of data collected and propagated.


Author(s):  
Masoud Mohammadian ◽  
Dimitrios Hatzinakos ◽  
Petros Spachos ◽  
Ric Jentzsh

Real time data acquisition and evaluation are required to save lives. Such data with utilization and application of the latest technologies in hospitals around the world can improve patient treatments and well beings. The delivery of patient's medical data needs to be secure. Secure and accurate real time data acquisition and analysis of patient data and the ability to update such data will assist in reducing cost while improving patient's care. A wireless framework based on radio frequency identification (RFID) can integrate wireless networks for fast data acquisition and transmission, while maintaining the privacy issue. This chapter discusses the development of a framework that can be considered for secure patient data collection and communications in a hospital environment. A new method for data classification and access authorization has also been developed, which will assist in preserving privacy and security of data. Several Case studies are offered to show the effectiveness of this framework.


Author(s):  
Masoud Mohammadian ◽  
Dimitrios Hatzinakos ◽  
Petros Spachos ◽  
Ric Jentzsh

Real time data acquisition and evaluation are required to save lives. Such data with utilization and application of the latest technologies in hospitals around the world can improve patient treatments and well beings. The delivery of patient's medical data needs to be secure. Secure and accurate real time data acquisition and analysis of patient data and the ability to update such data will assist in reducing cost while improving patient's care. A wireless framework based on radio frequency identification (RFID) can integrate wireless networks for fast data acquisition and transmission, while maintaining the privacy issue. This chapter discusses the development of a framework that can be considered for secure patient data collection and communications in a hospital environment. A new method for data classification and access authorization has also been developed, which will assist in preserving privacy and security of data. Several Case studies are offered to show the effectiveness of this framework.


2012 ◽  
Vol 430-432 ◽  
pp. 1755-1758
Author(s):  
Chun Chang Fu ◽  
Wei Lin He

Radio frequency identification technology is an automatic identification technology started in the 1990s. With the RFID technology in a wide range of applications in different areas, it offers the security and privacy threats and caused a great deal of attention. At present, system security and privacy issues have become one of the main factors restricted the wide application of radio frequency identification technology. Aimed at the problem, this article discussed the safety of the privacy issues.


Sensors ◽  
2019 ◽  
Vol 19 (13) ◽  
pp. 2957 ◽  
Author(s):  
Feng Zhu ◽  
Peng Li ◽  
He Xu ◽  
Ruchuan Wang

Radio frequency identification is one of the key techniques for Internet of Things, which has been widely adopted in many applications for identification. However, there exist various security and privacy issues in radio frequency identification (RFID) systems. Particularly, one of the most serious threats is to clone tags for the goal of counterfeiting goods, which causes great loss and danger to customers. To solve these issues, lots of authentication protocols are proposed based on physical unclonable functions that can ensure an anti-counterfeiting feature. However, most of the existing schemes require secret parameters to be stored in tags, which are vulnerable to physical attacks that can further lead to the breach of forward secrecy. Furthermore, as far as we know, none of the existing schemes are able to solve the security and privacy problems with good scalability. Since many existing schemes rely on exhaustive searches of the backend server to validate a tag and they are not scalable for applications with a large scale database. Hence, in this paper, we propose a lightweight RFID mutual authentication protocol with physically unclonable functions (PUFs). The performance analysis shows that our proposed scheme can ensure security and privacy efficiently in a scalable way.


Author(s):  
Yasir Amer Abbas ◽  
Saad Albawi ◽  
Abdullah Thaier Abd ◽  
Ahmed K. Jameil

Background: Radio frequency identification (RFID) technology can be applied in identification, security and tracking system platforms due to its flexible and low-cost implementation. The sensing ability of this technology can also be used to monitor real-life environmental changes and physical phenomena. RFID is designed to work in open wireless communication. Therefore, this system can be attacked by different malware. Enhancing RFID with new security and privacy features is important at present. Objective: The current work is a systematic mapping study on RFID security. The types, contributions, facets and activities of research on RFID security were plotted. Method: The systematic mapping for a specific search area. For this purpose, we must identify the number of RQs. These RQs help researchers obtain comprehensive related studies. Researchers are responsible for determining the number and type of RQs, which must be selected depending on the research field. In addition, the RQs must be selected carefully because they determine the research direction and help rapidly obtain the required information and studies. Result: We gathered 2133 relevant studies and retained 92 primary papers after four filtering processes. We classified them into three facets. Results provide researchers and readers an overview of existing relevant studies and help them identify the properties in the focus area. Conclusion: The systematic mapping study used to report the design, execution, tool, application and results of a Radio frequency identification (RFID). We systematically choosing and deeply analyzed a all conceptance related (RFID) techniques and implementation methods which provide an complete about the (RFID) state and enviroment of studies . Firstly we collect 2133 From the initially searchbased on manual and automatic searches. We reduction to 92 papers depend on the inclusion and exclusion criteria for this review.


2008 ◽  
pp. 3848-3855
Author(s):  
Jorma Kajava ◽  
Juhani Anttila ◽  
Rauno Varonen

New technology has continuously changed the face of computing, and each change has involved an improvement in computer architecture and information processing. There are strong indications that the next paradigm shift in information technology will be kicked off by tiny radio frequency identification (RFID) tags. These lowly devices are being ushered in by corporations like Wal-Mart to facilitate business logistics, but other uses are waiting in the wings. As usual with any technology, criminally-minded individuals have been quick to exploit smart tags for their own purposes. Thus, it is in place to take a look at the dark side of RFID technology to see how it may affect the security and privacy of citizens.


Author(s):  
Dennis M.L. Wong ◽  
Raphael C.W. Phan

In this chapter, we discuss the business implications, as well as security and privacy issues, of the widespread deployment of radio frequency identification (RFID) systems. We first describe, in more detail, the components that make up an RFID system to facilitate better understanding of the implications of each, and then review the commercial applications of the RFID. We then discuss the security and privacy issues for RFID systems and what mechanisms have been proposed to safeguard these. The topics discussed in this chapter highlight the benefits of using RFIDs for user convenience in ubiquitous and pervasive commercial services and e-businesses, while maintaining the integrity of such systems against malicious attacks on the users’ security and privacy. This is vital for a business establishment to coexist with peers and remain competitively attractive to customers.


Author(s):  
David Parry ◽  
Anne Philpott ◽  
Alan Montefiore

A systematic literature review of published sources that discuss radio frequency identification technology, ubiquitous health care, and dosage measurement was performed. The results were then critiqued. Methods of storing data and using Radio Frequency Identification (RFID) were studied. These results were used as an aid for developing a prototype system for monitoring medication dosages in a home health care environment. The combination of an RFID technology – the Intel Wireless Sensor Platform (WISPs) and the construction of a specific pill dispensing container in this prototype demonstrated that it is possible to use RFID technology to effectively and ubiquitously monitor and track drug taking compliance. With further refinements on the dispensing unit and optimization of the software this product could be manufactured and released to home care patients to help increase compliance and reduce health related issues. This could form the heart of a modular telecare data collection system. RFID-based devices that can store data in standardized formats may allow incremental development of home telecare systems in an economical fashion.


Sign in / Sign up

Export Citation Format

Share Document