Analysis of RFID Application for U-healthcare System in Internet of Things

Jung Tae Kim
2014 International Journal of Smart Home  
In the past years, Internet of Things (IoT) has been focused and fused with wireless sensor node such as RFID, NFC tag and small sensor nodes, especially for hospital environment with mobile device. Due to the weakness characteristics of wireless signals, unauthorized person can access easier to hospital networks in wireless part than wired network systems. This may induced in several security problems. Therefore, a lot of threats, attacks and vulnerability are occurred in wireless surroundings
more » ... because of their limited resources such as small memory and low computation capability in wireless sensor network. RFID is often utilized as a prerequisite for the IoT in healthcare system. We surveyed and analyzed the technologies and characteristics of RFID and its application based on IoT. availability and sharing, and so on. Electronic healthcare (e-healthcare) offers a great convenience to patients and healthcare providers, and improves the quality of life. Electronic healthcare is becoming a vital part of our living environment and exhibits many advantages over paper-based legacy systems. Privacy is the essential concern of patients and the biggest obstacle to e-healthcare deployment [2] . The major benefit of RFID technology includes the increasing patient's management and managing documents with its mobility and usability. RFID systems should be considered to resist all kinds of attacks and threats. Until now, many works have done about security issues how they can implement the standard cryptographic. But, a lot of security threats and attacking attempts exist in RFID system. It is not solved yet properly. The application system is moving and converging on IoT (Internet of Things). Hailong Feng, et al, surveyed a recent development about privacy and security of Internet of things [3] . Security and privacy issues of RFID tags can effect both organization and individuals. Unprotected tags may be vulnerable to eavesdropping, traffic analysis, spoofing or denial of service and many unknown problems. Unauthorized readers can affect and infringe the privacy by accessing tags without illegal access control. Even if the content of tag is secure, it also can be tracked by the predictable tag responses: "location privacy" can be affected by a traffic analysis attack. Attackers can also threaten the security of systems. It depends on the original characteristics of RFID. The representative attack is the denial of service attack. Many researcher works to implement security system with low cost and privacy protocol to increase the applicability. A lot of lightweight solutions have been proposed for RFID, but they are still expensive and vulnerable to the security and do not fully resolve the security issues. Therefore, there is a good research scope in the field of designing an efficient ultralightweight cryptographic protocol for low-cost RFID system [4] . IoT is considered as one of the advanced major communication in recent years, since it offers the basis for the development of independent cooperative services and applications in wireless communication and network. A variety of research is under study using this concept in different areas, such as building automation, intelligent transport systems, and so on, in particular, healthcare application. For example, IoT's potential application for mobile health applications has been reported in [5] . A ubiquitous and mobile integrated clinical environment platform based on the IoT offers equipment or node for large scale connectivity with different sensors, as well as integration with information systems. This improves accessibility to clinical services, compatibility and ubiquity, enhancing mobility, and guarantees access to medical information, anywhere and anytime. Specifically, the capabilities of technologies for the identification of objects, such as Radio Frequency Identification (RFID), and for communication and ubiquitous access to information, such as wireless personal devices, embedded systems and smart objects should be evaluated further study. The architecture of IoT system is generally divided into three layers: the perception layer, the network layer, and the service layer (or application layer). Nowadays, U-healthcare which is very sensitive to the character of user's information among other ubiquitous computing field is popular in medical field. U-healthcare deals with extremely private information including personal health/medical information, so it is exposed to various weakness and threat in the part of security and privacy. Particularly we consider U-hospital healthcare network environment in here. The U-hospital network allows the medical step to use mobile medical devices, to measure and record user's medical data, and to have information related to their patient or treatment from health information system. In U-hospital service network environment, we can define four parts: medical sensor and device part, middleware part, communication part, and back-end information service Tier. The
doi:10.14257/ijsh.2014.8.6.13 fatcat:kixqngaa4zcftbqopodhpjrucm