Abstract
We propose a grouping proof scheme to help the nursing staff on their final check automatically before a medicine round. During the medicine round, even though their RFID reader is offline, our method can generate multiple proofs for each patient and help the medical caretakers follow the five-right policy to correctly administer the drugs to their patients. Besides, because our scheme enables a nurse to target specific group tags during a medicine round, it is able to generate proofs even when the illegitimate tags are on site. We prove that our generated proof is reliable because it can resist most security threats and guarantee the integrity of the proof. Besides, our proposed scheme guarantees anonymity on the RFID tags, so the patients' sensitive information and location privacy can be protected. Last, we run a simulation to show that compared with the related methods our proposed scheme requires the least transmission time and the lowest computation loads to generate a proof.
1. Introduction
With the help of Radio Frequency Identification (RFID) technology, the identification process in medical treatment has been made simple. The automatic checking processes are able to mitigate two kinds of errors: action-based errors (slips) and memory-based errors (lapses) [1]. To avoid such medical malpractices, people used to rely on cross-check and proper labeling of medicines. These preventive mechanisms are aimed at achieving five rights: right patient, right medication, right dose, right route, and right time [2].
But cross-check is a labor-intensive and time-consuming work. Therefore, RFID-based automated inpatient medication systems are proposed to assist healthcare providers to double-check administration of medicines and to provide auditable evidence for medication safety [3–5]. These schemes are based on a yoking-proof [6], which collects information from tags with a reader and then records each tag's messages with a trustworthy verifier. Within a very limited time, a yoking-proof has to use the tags' identities and their messages to make a proof to the verifier via a reader, verifying that these tagged objects are all within the reader's read range in a specific timeframe. When a medical dispute arises, a nursing staff can use the grouping proof to testify that the inpatient, nurse, and prescribed medicine all stay in a specific area at a specific time. This proof may serve as evidence that right medicine has been administered to the right inpatient at the right time.
However, adversaries may forge a yoking-proof with replay attacks. They can replay prerecorded proofs to evade the check on each tag's presence in their own groups. Hence, Saito and Sakurai [7] use timestamps to replace the random numbers in a yoking-proof. Piramuthu [8] adds a verifier-generated nonce into the initiated message to avoid replay attacks. These protocols, however, are vulnerable to multiproof session attacks [9, 10], in which an adversary can eavesdrop on two simultaneous proofs and then interweave the captured parts of the two proofs to generate the third proof to evade checking. For this reason, both Peris-Lopez et al. and Wu et al. propose new grouping proof schemes [9–11] that can prevent adversaries from splitting a sniffed grouping proof and resist impersonation attacks [12]. That is, even though an attacker can eavesdrop on multiple proofs simultaneously, he is unable to forge a proof to pass the check.
Besides the security issues, Lien et al. [13] use XOR to create a reading order independent grouping proof (ROIGP), which reduces the time that a trusted verifier takes to check every possible sequence of generating a proof. However, ROIGP uses unicast to send its request messages and therefore it has to spend much time on collecting tags' proofs. In order to decrease the time on information gathering, Sun et al. [14] propose a grouping proof scheme, in which a reader broadcasts the request message to all tags. Thus, every tag is able to simultaneously create its unique signature for the received message. This scheme is group size insensitive because it allows each tag to compute its proofs in parallel, and therefore it has higher scalability.
Another security issue in current approaches is that a reader may not be able to connect a verifier while creating proofs [3, 5, 14–17]. There will be no trusted timer. For example, when nursing staff distribute medicine to inpatients in medicine rounds, their readers may be offline [4] and the readers' time cannot be trusted. Some offline grouping proofs [3, 5, 14] deploy RFID's timeout mechanism to keep the protocol's important messages on the tag. If timeout occurs, these messages are cleared so as to certify that the proofs are generated within the same timeframe. Burmester and Munilla [15] set a timer on their tag 1. If the proofing result is not returned to tag 1 within the timeframe, timeout occurs. But in healthcare services, time is an important issue for offline grouping proofs [16, 17] to achieve the five rights. Lin et al.'s scheme [16] uses a trusted time database to verify a reader's time. Ma et al.'s offline grouping proof [17] utilizes a clock tag's system time as a trusted timestamp when making proofs.
Apart from the offline issues, a medicine round requires exact distribution of multiple portions of medicine to different inpatients [18, 19]. In such a case, it will be impractical for nursing staff to take one portion of medicine to one inpatient at a time, and different groups of tagged items will be mixed up within the same read range of a reader. To the best of our knowledge, current grouping proof schemes [5, 14–17] need a reader to collect information from every tag in its reading range. Besides, the schemes [3, 5–8, 13–17, 20] cannot target specific group tags [21], whose proofs may include nontargeted tags or tags not on site. If a medical dispute arises, these schemes that have included extra medicines for proofing can only indicate medication errors, even though right medicines have been administered to right inpatients.
In order for a nursing staff to generate multiple offline grouping proofs in a medicine round, we propose a novel scheme to generate grouping proofs when targeted tags and nontarget tags are mixed up. The major objective of our proposed method is that our generated proof can serve as evidence to show that the nurse has carried out “five rights” when administrating medications: right patient, right medicine, right route, right time, and right dose [2]. For reducing the time of generating proofs, our scheme is designed to make a reader send queries by broadcast and to use an order independent function to create proofs. Therefore, each tag is able to compute its proofs in parallel. We will analyze the performance of the pipelining in Section 4 and show that our scheme takes the fewest instruction counts to create a proof than other group proofing schemes. Furthermore, our scheme allows multiple readers to create their proofs at the same time and the same place. It has flexibility to create different proofs in a medicine round and to generate proofs as evidence showing that the nurse has fulfilled the five rights in this medicine round. Besides, our scheme is secure against most attacks in grouping proofs [6–10, 21].
The main contributions of our protocol include the following: (1) it is able to generate proofs when targeted tags and nontarget tags are mixed up; (2) the time of generating a proof does not increase with the number of tags in a group; (3) it requires the fewest messages to generate a proof; (4) it has flexibility of generating a grouping proof in an online or offline medicine round; (5) it has flexibility of generating proofs for all tags or selected tags; (6) it allows multiple readers to generate proofs simultaneously; (7) it automates the five-right checking in a medicine round; (8) it guarantees the anonymity of tags protecting patients' privacy; and (9) it can provide reliable proofs because it is able to ensure message integrity and to prevent attacks [21] on grouping proofs, including replay of sniffed communications and multiproof session attacks.
The organization of this paper is as follows. Preliminaries and steps of our grouping proof protocol will be elaborated in Section 2. Section 3 provides a security analysis of our method, including potential threats and the levels of trust. A performance evaluation and comparison are conducted in Section 4. A conclusion is drawn in Section 5.
2. Antinoise Multiple Grouping Proof
We propose a grouping proof protocol that can generate multiple proofs at one time whether the reader is connected to a verifier or not. These generated proofs can serve as evidence to show if a nurse has fulfilled five rights in her medication services. With the help of RFID, current medication procedures have become more automatic and save more time in cross-check. It reduces the need of labor work and decreases medication errors and medical disputes in a medicine round. When a nursing staff provides medication services in a medicine round, the work can be divided into two phases [22], as depicted in Figure 1: (1) final checking before a medicine round and (2) administration of drugs during a medicine round. Therefore, our scheme is designed to generate different proofs in two phases. Figure 1(a) depicts the first phase: the nurse's reader is connected to a verifier, and it sends queries to all medicines on site to generate a proof to ensure that every dispensed medicine and no extra medicines is on the drug trolley ready for administration. Figure 1(b) shows the second phase: the nurse's reader sends a multicast message to her tag, the target inpatient, and his medicines to collect their messages for generating proofs. The reader sends the proofs back to the verifier if it is able to connect the verifier; otherwise, the reader stores the proofs until it connects the verifier (as the dash line in Figure 1(b) shows).

Two phases of proofing in a medicine round: (a) generating a proof for all tags and (b) generating a proof for selected tags.
To automate our medicine round proof procedure, our protocol requires every nurse's ID, prescribed medicine pack, and inpatient's wristband to be equipped with an RFID tag. All tags are physically secured and free from being compromised by adversaries. Computation power of these tags is high enough to run asymmetric cipher algorithms [23–25]. After admission, a patient is labeled with an RFID wristband that contains an identification (ID) number and some extra information, for example, his doctor's ID. Before a nurse takes a medicine round, he/she is equipped with a hand-held clinical assistant RFID reader that is authorized to access a trustworthy verifier and the hospital information system (HIS) [26], and the reader is communicating with them through a secure channel. The proof that our scheme generates is based on the integration of information that the RFID reader accesses from tags and of the information that is retrieved from hospital applications. Such proof can be used to lower the chance of nursing staff's slips and lapses in a medicine round and to certify that in a medicine round a nurse has made the five rights. The proof serves as evidence and is stored in a verifier, which is trusted and cannot be compromised.
To ensure that our scheme is able to be secure against malicious attempts, our infrastructure includes an attacker who is able to eavesdrop the reader-tag communications. And the insider intends to do the following two malicious things. First, a nurse may modify the time of a medicine round trying to hide his/her medical malpractices, such as a delayed medication service. Second, a nurse may forge a proof to cover his/her absence in a medicine round.
Our protocol consists of three parts: initialization, proofing, and verification. The three parts will be elaborated in the following subsections.
2.1. Initialization
When a nurse receives the drug administration chart for a medicine round, which specifies the time, rout, name list of inpatients, and their prescribed medicines, he/she is assigned a hand-held clinical assistant reader. The reader belongs to a reader set R that consists of n readers that have been assigned to the nursing staff for their medicine rounds; that is,

Flowchart of group proofing: (a) before medicine round and (b) during medicine round.

Infrastructure of our grouping proofs.
If the collected proof is verified, it means that the medicines on the trolley match the doctors' prescribed medicines. As shown in Figure 2(b), verifier writes the following k sets of parameters into the reader
The message
As the purple reader is depicted in Figure 3, when flag
2.2. Proof Generation
When a nurse takes his/her reader

Grouping proof generation of selected tags.
When a nurse takes his/her reader
If the reader can connect the verifier, it sends the generated proof
2.3. Verification of Proof Correctness
Through a secure channel a nurse sends proof
When the verifier receives proof Check the “right time.” The verifier uses the identifier Verify the correctness of the proof. The verifier uses the buffered session key Check the remaining four rights. When the verifier receives proofs of all k inpatients in this medicine round, it checks the sequence of these k inpatients' identifiers
3. Security Analysis
In our Antinoise Multiple Grouping Proof (ANGMP) protocol, we assume that the wired networks and wireless communications are secured and that we can leave them out of discussion in the following security analysis. Rather, our analysis will be focused on the security issues between a nurse's reader and the tags.
Antireplay Attack. Even though an adversary can pass the verification of our medicine check by replaying the logged message 4 when the same nonce
At the medicine round phase, we require that every verifier-tag communication contains a nonce
Antitag Impersonation Attack. A tag that does not have the key
Anti-Multiproof Session Attack. In our protocol, the proof generated by a tag is encrypted with the session key
Anticoncurrency Attack. Since each tag only needs to send one message in a session, there will be no overwriting of the computation results caused by race condition during the proof in our protocol. And our tags can use the group key to authenticate the request messages sent from the reader, so our scheme can avoid the concurrency attack.
Forward Secrecy. We use the verifier-tag shared key
Anonymity. In our scheme, each tag
Antitracking Attack. Since our protocol is able to guarantee the anonymity of a tag and the nonces and the keys used to encrypt or hash the message are updated after every complete session, the tag ID
Guarantee of Five Rights. To sum up, an adversary is not able to launch a replay attack, multiproof session attack, and concurrency attack, nor can he make tag impersonation, to generate a valid proof evading our verification. And, the verifier uses
3.1. Comparison
Here we compare our proposed scheme Antinoise Multiple Grouping Proof (ANMGP) with current grouping proof schemes in terms of certain security issues: replay attack, multiproof session attack, concurrency attack, tracking attack, and tag impersonation attack. The comparison results are shown in Table 1, in which “O” denotes that the scheme is secure against the threat; “X” the scheme is vulnerable to the threat; and “△” the scheme is secure only when certain circumstances have been satisfied.
Comparison of resistance to attacks.
Table 1 shows that our grouping proof is able to resist most of known threats to current grouping proof schemes. Saito and Sakurai's scheme [7] has been found unable to resist replay attacks [14, 21] because their tags' messages do not include a nonce. Piramuthu's method [8] suffers from multiproof session attacks [9, 10] because their first tag does not confirm the final proof. Many of the proposed schemes [8, 9, 13, 17, 20] are vulnerable to concurrency attacks as pointed out in Sun et al.'s and Sundaresan et al.'s research [14, 21]. The scheme [32] proposed by Peris-Lopez et al. also suffers from concurrency attacks because of the race condition [33]. In their scheme, when a tag receives other proofing requests before it finishes the previous one in the latter steps, the tag overwrites the former computing results. In Sun et al.'s scheme [14], when a tag belongs to two simultaneous proof-generation groups, it suffers from the race condition problem. And this renders their method prone to concurrency attacks. The schemes [11, 14, 21] and our proposed scheme ANMGP are able to guarantee the anonymity of tags. These schemes change the keys or the nonces in every tag-generated message to remove the connection between any two of their tag-generated messages. Therefore, they can prevent an adversary from sniffing the tag messages to track their tags' location. Saito and Sakurai's scheme [7] has been proved vulnerable to tag impersonation attack [10] because the verifier fails to authenticate the proof. As Table 1 depicts, the schemes [11, 21] and our proposed ANMGP are able to resist all the threats discussed above. However, the schemes [11, 21] cannot satisfy the requirements of five rights; see Table 2.
Comparison of five-right checking.
Table 2 depicts that verification of “right medicine,” “right dose,” and “right patient” has already been included in current grouping proofs. During a medicine round, the reader may not be able to connect the backend system. But the schemes [7, 9, 11, 16, 21, 32] do not provide a mechanism to stamp trustworthy time on their proofs when the nurse needs to generate multiple proofs in a medicine round (c.f. Table 3). Instead, they provide trustworthy time only when the reader is connected to the backend systems. Unlike the schemes above, Ma et al. [17] and ANMGP stamp trustworthy time on every individual offline proofs to guarantee right time. Besides, compared with the related schemes, ours is the only one that checks all the identifiers and the time sequence with the administration chart to ensure right route.
Comparison of features in proof generation.
△1: proofs' timestamps are scheduled time, not ward visiting time.
△2: need to connect the backend system.
△3: need to get online for trustworthy time.
4. Performance
This section analyzes the communication and computation loads of our protocol and compares our protocol with the schemes that are able to generate a proof including three or more tags. Our comparison is focused on their supported functions, message lengths, and computation time. For fair comparison, the 2-tag proof schemes that we have discussed in the previous section will not be included in our performance analysis. We use Ciphertext-Policy Attribute-Based Encryption (CPABE) [31] to set the attributes and types (inpatient, nurse, doctor, and medicine), and we also use the CPABE's key generation function,
Table 3 depicts the comparison results between our proposed ANMGP and other grouping proof schemes. We use “O” to denote that the scheme is capable of this function, “X” to denote that the scheme fails to achieve this function, and “△”to denote that the scheme can achieve this function only when certain circumstances have been satisfied.
Table 3 shows the supported features of current proofing schemes. It has been pointed out in [14, 21] that the schemes [7, 13, 16, 17, 20] cannot guarantee forward secrecy because their tags use permanent secrets. And the schemes [7, 13, 16, 20] have been found by [14, 21] unable to keep the anonymity of a patient's identifier. The schemes [13, 14, 20] do not stamp the start/end time on their proofs, and consequently there is no trustworthy time for the verifier to ensure when proofs are generated. Even though the schemes [7, 16, 21] stamp their time on the proofs, the schemes [7, 16, 21] need to connect the backend system to get time for each proof. The proofs of the schemes [11, 32] contain only the scheduled time for a medicine round, not the real ward-visiting time. Therefore, the schemes [7, 11, 16, 21, 32] cannot provide trustworthy timestamps for each of their proofs when the nurse needs to generate multiple offline proofs in a medicine round. The schemes [7, 13, 20] need to connect the backend systems to generate their proofs. Therefore, they cannot make offline proofs. The schemes [7, 11, 16, 21] need to go online to obtain trustworthy time for each of their proofs. The schemes [13, 14] and our proposed ANMGP achieve order independence because we fuse the tag-generated proofs with the operator XOR, which fulfills the commutative principle. Unlike those schemes that have to generate the proofs sequentially, Sun et al. [14] and our ANMGP multicast queries to all their tags in the same group. Also the RFID readers use order independence operators to fuse proofs. Sun et al. tags and ours can calculate the proofs simultaneously. The schemes [7, 11, 13, 16, 17, 20] cannot designate tags to generate proofs because they collect the proofs of all the tags on site. Although Sun et al.'s scheme [14] uses multicast to collect the proofs of the same group's tags, their first message includes all the tags on site to form the group. So they cannot designate the proof generator. Sundaresan et al.'s scheme [21] and our proposed scheme ANMGP are able to filter the proofs when our targeted tags and nontarget tags are mixed up. As Table 3 shows, compared with related grouping schemes, our proposed scheme ANMGP is the only one that is able to achieve simultaneity and to designate a specific proof generator.
The following subsections will compare the performance of our proposed proofing schemes (ANMGP-MC for medicine checking proof; ANMGP-MR for medicine round proof) with that of related grouping proof schemes. The comparison includes the transmission time, computation time, and the total time that is required for each of the schemes to generate a proof with m tags in a group.
4.1. Comparison of Transmission
In this subsection, we compare the transmission cost of our proposed ANMGP with that of related work. Besides, the transmission cost of sending a message from a reader to a tag is different from sending a message from a tag to a reader, so we analyze them separately in Table 4, in which
Comparison of message length.
m denotes the number of tags in a group.
According to EPC Class-1 Gen2 standard [34], the highest transmission rate from a reader to a tag is 160 kbps and from a tag to a reader is 640 kbps. We use the transmission rate and the message lengths that we have calculated in Table 4 to compute the transmission time between a tag and its reader. With

Comparison of transmission time required to generate m-tag proofs: (a) collecting from all tags on sites and (b) collecting from appointed tags.
Figure 5(a) shows that our proposed ANMGP-MC has the shortest transmission time. Even though our reader has to send the initialization message to m tags, the total message lengths do not increase with the number of tags because ANMGP-MC's initialization message is broadcast to the tags. Besides, the reader-to-tag transmission rate is much lower than the tag-to-reader rate [34], so our ANMGP-MC has the shortest transmission time when compared with other proof generation schemes. This can also explain why ANMGP-MR's transmission time is shorter than Sundaresan et al.'s [21], as shown in Figure 5(b).
4.2. Comparison of Computation
In this subsection, we compare our proposed ANMGP with the related schemes in terms of their computation cost. In Table 5,
Comparison of computation time.
m denotes the number of tags in a group.
For fair comparison of computation time among the schemes listed in Table 5, we use the clock cycles required to run a DESLite [20, 35] to calculate all schemes'

Comparison of computation time required to generate m-tag proofs: (a) collected from all tags on site and (b) collected from target tags.
Figure 6(a) shows that if compared with other schemes our proposed ANMGP-MC requires the fewest computation loads to generate a proof for all the tags. It is because we require the tags to compute their proofs in parallel, and all they need to do is to generate a message authentication code and a nonce. As Figure 6(b) shows, our ANMGP-MR takes shorter computation time than Sundaresan et al.'s scheme [21], and ANMGP-MR's computation load does not increase with the number of tags because our tags are able to calculate the proofs simultaneously.
5. Conclusion
We propose a grouping proof generation algorithm ANMGP, which is able to help a nurse to do his/her final check automatically before a medicine round. During the medicine round, even though his/her RFID reader is offline, ANMGP can also help his/her correctly administer the drugs to his/her patients. Besides, because our scheme enables the nursing staff to target specific group tags during a medicine round, it is able to generate proofs when illegitimate tags are mixed up with the targeted and the nontargeted tags. Our security analysis has shown that ANMGP is a reliable proofing scheme because it can resist most security threats, such as eavesdropping, replay attacks, concurrency attacks, tracking attacks, and multiproof session attacks. ANMGP also helps the nursing staff to achieve five rights in his/her medicine round automatically. And, since it guarantees anonymity and forward secrecy on the tags, the patients' sensitive information and location privacy can also be protected.
Moreover, we analyze and compare our tag's computational loads and the transmission time with those of other related schemes. The comparison results show that our proposed scheme requires the least time for proofing. To sum up, our proposed ANMGP is the only proofing scheme that can target specific group tags, achieve simultaneity, and have high efficiency.
Footnotes
Conflict of Interests
The authors declare that there is no conflict of interests regarding the publication of this paper.
Acknowledgment
This research was supported by the Ministry of Science and Technology of Taiwan under Grant no. MOST 104-2221-E-033-020.
