Hospital Automation using RFID Technology University of Colorado at Colorado Springs College of Engineering & Applied Science Gustavo Florentino.

Slides:



Advertisements
Similar presentations
Smart Card Authentication. Outline for Today Introduction of Smart Card Authentication Different Authentication Techniques Explain Authentication Techniques.
Advertisements

MAC Raushan. DES simple fiestel network 3131 PlainText Blocks 2*4=8bits 31 f f =0011 xor 0011=0000 = 0 f(r,k)=(2*r+k^2)%8 f(1,5)=(2*1+5^2)%8=3 xor 3 3.
CIS 193A – Lesson6 CRYPTOGRAPHY RAPELCGRQ. CIS 193A – Lesson6 Focus Question Which cryptographic methods help computer users maintain confidentiality,
An Introduction to Secure Sockets Layer (SSL). Overview Types of encryption SSL History Design Goals Protocol Problems Competing Technologies.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
1 Pertemuan 12 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
Cryptography and Authentication Lab ECE4112 Group4 Joel Davis Scott Allen Quinn.
WAP Public Key Infrastructure CSCI – Independent Study Fall 2002 Jaleel Syed Presentation No 5.
Principles of Information Security, 2nd edition1 Cryptography.
Java Security Model Lab#1 I. Omaima Al-Matrafi. Safety features built into the JVM Type-safe reference casting Structured memory access (no pointer arithmetic)
FIT3105 Smart card based authentication and identity management Lecture 4.
Cryptography Basic (cont)
Chapter 5 Cryptography Protecting principals communication in systems.
Adaptive Security for Wireless Sensor Networks Master Thesis – June 2006.
Apr 22, 2003Mårten Trolin1 Agenda Course high-lights – Symmetric and asymmetric cryptography – Digital signatures and MACs – Certificates – Protocols Interactive.
CSI 400/500 Operating Systems Spring 2009 Lecture #20 – Security Measures Wednesday, April 29 th.
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
Cryptography1 CPSC 3730 Cryptography Chapter 11, 12 Message Authentication and Hash Functions.
Encryption Methods By: Michael A. Scott
Encryption is a way to transform a message so that only the sender and recipient can read, see or understand it. The mechanism is based on the use of.
CSCI 6962: Server-side Design and Programming
Radio Frequency Identification By Bhagyesh Lodha Vinit Mahedia Vishnu Saran Mitesh Bhawsar.
©Copyrights 2011 Eom, Hyeonsang All Rights Reserved Distributed Information Processing 20 th Lecture Eom, Hyeonsang ( 엄현상 ) Department of Computer Science.
Using ISO tags for Authentication Eddie LaCost Embedded RF.
SSL / TLS in ITDS Arun Vishwanathan 23 rd Dec 2003.
Introduction to Stream Cipher Sayed Mahdi Mohammad Hasanzadeh Spring 2004.
Computer encryption is… Based on the science of cryptography.
1 Architectural Support for Copy and Tamper Resistant Software David Lie, Chandu Thekkath, Mark Mitchell, Patrick Lincoln, Dan Boneh, John Mitchell and.
Cryptography Encryption/Decryption Franci Tajnik CISA Franci Tajnik.
Cryptography, Authentication and Digital Signatures
Cryptography and Network Security (CS435) Part Fourteen (Web Security)
Web Security : Secure Socket Layer Secure Electronic Transaction.
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
Module 3 – Cryptography Cryptography basics Ciphers Symmetric Key Algorithms Public Key Algorithms Message Digests Digital Signatures.
Chapter 21 Distributed System Security Copyright © 2008.
Cryptography and Network Security (CS435) Part Twelve (Electronic Mail Security)
Primitive Operations. Communication Operations –Reader to tag Read Write –Tag to Tag Read Write Hash and Encryption Operations –Hash: MD5, Sha-1, Sha-256,
Strong Security for Distributed File Systems Group A3 Ka Hou Wong Jahanzeb Faizan Jonathan Sippel.
Encryption. What is Encryption? Encryption is the process of converting plain text into cipher text, with the goal of making the text unreadable.
Encryption Questions answered in this lecture: How does encryption provide privacy? How does encryption provide authentication? What is public key encryption?
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Csci5233 computer security & integrity 1 Cryptography: an overview.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
Cryptographic Hash Functions Prepared by Dr. Lamiaa Elshenawy
PGP & IP Security  Pretty Good Privacy – PGP Pretty Good Privacy  IP Security. IP Security.
Azam Supervisor : Prof. Raj Jain
1 Thuy, Le Huu | Pentalog VN Web Services Security.
Electronic Mail Security Prepared by Dr. Lamiaa Elshenawy
Network Security Celia Li Computer Science and Engineering York University.
 Encryption provides confidentiality  Information is unreadable to anyone without knowledge of the key  Hashing provides integrity  Verify the integrity.
Security By Meenal Mandalia. What is ? stands for Electronic Mail. much the same as a letter, only that it is exchanged in a different.
A Secure and Efficient Application Download Architecture in 3G Mobile Environment Speaker: Kuo-Zhe Chiou Laboratory of Cryptography and Information Security.
Secure Instant Messenger in Android Name: Shamik Roy Chowdhury.
Biometric Encryption Base RSA Algorithm Supervisor: Ass. Prof. Dr. Dang Tran Khanh Student: Dung Ngo Dinh.
Security of the Internet of Things: perspectives and challenges
Electronic Banking & Security Electronic Banking & Security.
Information Systems Design and Development Security Precautions Computing Science.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
PRESENTATION ON SECURE SOCKET LAYER (SSL) BY: ARZOO THAKUR M.E. C.S.E (REGULAR) BATCH
Security Using Armstrong Numbers and Authentication using Colors
Cryptography: an overview
Cryptography: an overview
Basics of Cryptography
TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES NAMED AFTER MUHAMMAD AL-KHWARIZMI THE SMART HOME IS A BASIC OF SMART CITIES: SECURITY AND METHODS OF.
Computer Communication & Networks
Cryptography: an overview
Chapter -7 CRYPTOGRAPHIC HASH FUNCTIONS
Presentation transcript:

Hospital Automation using RFID Technology University of Colorado at Colorado Springs College of Engineering & Applied Science Gustavo Florentino

Objectives Speed up processes in the laboratory. Use smart cards to store patient’s information and to perform authentication. Use RFID tags to identify sample recipients. Reduce faults on exams regarding to data flow in the laboratory. Create a system which is simple for hospital employees to operate.

System features Authentication on the system is done through smart cards. Information can be stored on patient’s card. Like: blood type, allergies, hypertension, diabetics, and so on. The identification of chemistry tubes is performed through RFID tags (not covered).

Problems Many smartcards → low cost. The smart card used does not have processor to process user programs. Then, many authentication algorithms proposed in literature cannot be used. Ex: challenge- response.

Security requirements We have to:  Avoid non-authorized people from reading the information stored on the card.  Use the card as an authentication device.  Ensure that the data on the card has not been tampered.

Architecture Database Server PhysicianAdministrator Biochemist Analysis Laboratory Reception

Smart card memory structure 2 Kbits cards; 32 blocks of 8 bytes.

Memory mapping 6: memory manager version. 7: user id. Data on shadowed blocks are ciphered Version id User id User data Block

Data formatting Markup language  Back-slash followed by 3 ASCII characters. Markup language: \beg, \rnd, \crc, \usr, \bty, \dia, \hpt, \ale, \end. Example: \beg\rnd37026\crcb80e\usrJoseph Jr\btyAB+\diaT\hptF\aleAcetylsalicylic acid\end

Security Symmetric key cryptography: AES  Faster than an asymmetric algorithm.  At first, only the system is capable of reading and writing on the card. One key is used for each card. System security doesn’t rely on manufacturer’s specific mechanisms. So we can easily change the reader and card model or manufacturer if necessary.

Authentication protocol \beg\rnd37026\crcb80 e\usrJosé Teodoro da Fonseca\tsgAB+\diaT\ hptF\aleácido acetil salicílico, dipirona\end 1. The class MemoryManagerFactory checks the version id on block 6 and instantiates the proper MemoryManager. 2. Block 7 is read to get the user id. 3. The secret key is retrieved from the database and the user data area is deciphered. 4. Finally, \rnd value is compared to the one existing on the database. If they match, the user is successfully authenticated to the system. Version id User id User data

Data integrity A cyclic redundancy check code is used to verify integrity of the data contained on the card. Stronger message digests weren’t employed due to memory constraints. While data is read from the card, it’s checked if the CRC calculated matches the one read from the card. This procedure avoids changes of the data on the card by malicious users.

Conclusions Due to severe memory and processing constraints, many techniques found on the literature cannot be applied to this system. The solution was to make use of digital signature concepts.