Using Radio Frequency Identification (RFID) Tags to Store Medical Information Needed by First Responders: Data Format, Privacy, and Security

نویسندگان

  • Chris Hart
  • Peter J. Hawrylak
چکیده

In the event of an accident or emergency, a victim’s medical information such as blood type, prescribed drugs, and other pertinent medical history is critical to Emergency Medical Technicians (EMTs) so that the correct treatment can be provided to the victim as quickly as possible. Victims of car accidents, heart attacks, etc., are not always able to answer simple but crucial medical questions. Treatment time is critical in an emergency situation and the EMT must quickly obtain correct medical information to provide treatment until the victim is stabilized or admitted to the hospital. With an unconscious patient, the EMT must perform a number of tests to obtain these details. A Radio Frequency Identification (RFID) tag encoded with this information could provide this information quickly and correctly, while saving the time and expense of the tests to answer these questions. The ability of the RFID tag to communicate through objects can minimize the movement of the victim to obtain the necessary information. This paper presents a standardized format for encoding (storing) this information in the RFID tag for use in the United States. The use of data compression techniques are explored to maximize the amount of information able to be stored in the RFID tag. Privacy and security issues with this application are discussed and a potential solution is presented. Using Radio Frequency Identification (RFID) Tags to Store Medical Information Needed by First Responders: Data Format, Privacy, and Security

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Game-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags

The term "Internet of Things (IoT)" expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a great technology and an interesting candidate to provide communications for IoT networks, but numerous security and privacy issues need to be considered. In this paper, we analyze the security and ...

متن کامل

Enhancing privacy of recent authentication schemes for low-cost RFID systems

Nowadays Radio Frequency Identification (RFID) systems have appeared in lots of identification and authentication applications. In some sensitive applications, providing secure and confidential communication is very important for end-users. To this aim, different RFID authentication protocols have been proposed, which have tried to provide security and privacy of RFID users. In this paper, we a...

متن کامل

Development and Implementation of RFID Technology

Radio Frequency Identification (RFID) is an automated identification technology that uses tags to transmit data upon RFID reader queries. Compared to barcodes identification technology, RFID tags provide a unique identifier, which raises concerns over user privacy, such as clandestine tracking and inventorying [1]. In its original version, a RFID tag responds to a reader query with its fixed un...

متن کامل

Secure and Efficient Tag Searching in RFID Systems using Serverless Search Protocol

In the coming pervasive society, Radio Frequency Identification(RFID) Tags will be affixed within every product and object including human. This technology is anticipated to be a major technology which will be utilized by several pervasive services where these tags will be used to identify various objects. However, the use of RFID tags may create new threats to the security and privacy of indiv...

متن کامل

Efficiency and Privacy Enhancement for a Track and Trace System of RFID-Based Supply Chains

One of the major applications of Radio Frequency Identification (RFID) technology is in supply chain management as it promises to provide real-time visibility based on the function of track and trace. However, such an RFID-based track and trace system raises new security and privacy challenges due to the restricted resource of tags. In this paper, we refine three privacy related models (i.e., t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IJCMAM

دوره 3  شماره 

صفحات  -

تاریخ انتشار 2012