{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,6]],"date-time":"2026-05-06T05:55:01Z","timestamp":1778046901106,"version":"3.51.4"},"reference-count":42,"publisher":"MDPI AG","issue":"3","license":[{"start":{"date-parts":[[2019,7,31]],"date-time":"2019-07-31T00:00:00Z","timestamp":1564531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers"],"abstract":"<jats:p>The growing adoption of Radio-frequency Identification (RFID) systems, particularly in the healthcare field, demonstrates that RFID is a positive asset for healthcare institutions. RFID offers the ability to save organizations time and costs by enabling data of traceability, identification, communication, temperature and location in real time for both people and resources. However, the RFID systems challenges are financial, technical, organizational and above all privacy and security. For this reason, recent works focus on attribute-based access control (ABAC) schemes. Currently, ABAC are based on mostly centralized models, which in environments such as the supply chain can present problems of scalability, synchronization and trust between the parties. In this manuscript, we implement an ABAC model in RFID systems based on a decentralized model such as blockchain. Common criteria for the selection of the appropriate blockchain are detailed. Our access control policies are executed through the decentralized application (DApp), which interfaces with the blockchain through the smart contract. Smart contracts and blockchain technology, on the one hand, solve current centralized systems issues as well as being flexible infrastructures that represent the relationship of trust and support essential in the ABAC model in order to provide the security of RFID systems. Our system has been designed for a supply chain environment with an use case suitable for healthcare systems, so that assets such as surgical instruments containing an associated RFID tag can only access to specific areas. Our system is deployed in both a local and Testnet environment in order to stablish a deep comparison and determining the technical feasibility.<\/jats:p>","DOI":"10.3390\/computers8030057","type":"journal-article","created":{"date-parts":[[2019,7,31]],"date-time":"2019-07-31T11:37:07Z","timestamp":1564573027000},"page":"57","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":50,"title":["An Attribute-Based Access Control Model in RFID Systems Based on Blockchain Decentralized Applications for Healthcare Environments"],"prefix":"10.3390","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5687-1927","authenticated-orcid":false,"given":"Santiago","family":"Figueroa","sequence":"first","affiliation":[{"name":"Ceit, Manuel Lardizabal 15, 20018 Donostia\/San Sebasti\u00e1n, Spain"},{"name":"Departamento de Ingenier\u00eda El\u00e9ctrica y Electr\u00f3nica, Universidad de Navarra, Tecnun, Manuel Lardizabal 13, 20018 Donostia\/San Sebasti\u00e1n, Spain."}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3799-1410","authenticated-orcid":false,"given":"Javier","family":"A\u00f1orga","sequence":"additional","affiliation":[{"name":"Ceit, Manuel Lardizabal 15, 20018 Donostia\/San Sebasti\u00e1n, Spain"},{"name":"Departamento de Ingenier\u00eda El\u00e9ctrica y Electr\u00f3nica, Universidad de Navarra, Tecnun, Manuel Lardizabal 13, 20018 Donostia\/San Sebasti\u00e1n, Spain."}]},{"given":"Saioa","family":"Arrizabalaga","sequence":"additional","affiliation":[{"name":"Ceit, Manuel Lardizabal 15, 20018 Donostia\/San Sebasti\u00e1n, Spain"},{"name":"Departamento de Ingenier\u00eda El\u00e9ctrica y Electr\u00f3nica, Universidad de Navarra, Tecnun, Manuel Lardizabal 13, 20018 Donostia\/San Sebasti\u00e1n, Spain."}]}],"member":"1968","published-online":{"date-parts":[[2019,7,31]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"875","DOI":"10.1016\/j.ijinfomgt.2013.07.005","article-title":"A literature review of RFID-enabled healthcare applications and issues","volume":"33","author":"Wamba","year":"2013","journal-title":"Int. J. Inf. Manag."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1109\/MIC.2009.46","article-title":"Technology, Standards, and Real-World Deployments of the EPC Network","volume":"13","author":"Thiesse","year":"2009","journal-title":"IEEE Internet Comput."},{"key":"ref_3","unstructured":"Guinard, D. (2019, March 25). GS1 blog series: Everythng and GS1 in a nutshell. Available online: https:\/\/evrythng.com\/platform\/evrythng-gs1-in-a-nutshell\/."},{"key":"ref_4","unstructured":"GS1 (2017). GS1\u2019s Framework for the Design of Interoperable Traceability Systems for Supply Chains. GS1 Glob. Traceabil. Stand., 102, 1\u201358. Available online: https:\/\/www.gs1.org\/sites\/default\/files\/docs\/traceability\/GS1_Global_Traceability_Standard_i2.pdf."},{"key":"ref_5","unstructured":"Hrabina, M. (2019, March 10). Taking Advantage of RFID\u2019s Expanding Role in Medical Devices. Available online: https:\/\/www.meddeviceonline.com\/doc\/taking-advantage-of-rfid-s-expanding-role-in-medical-devices-0001."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Figueroa Lorenzo, S., A\u00f1orga Benito, J., Garc\u00eda Cardarelli, P., Alberdi Garaia, J., and Arrizabalaga Juaristi, S. (2019). A comprehensive review of RFID and bluetooth security: Practical analysis. Technologies, 7.","DOI":"10.3390\/technologies7010015"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Griffin, P.H. (April, January 30). Secure authentication on the Internet of Things. Proceedings of the IEEE SoutheastCon 2017, Charlotte, NC, USA.","DOI":"10.1109\/SECON.2017.7925274"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1109\/JSYST.2007.909778","article-title":"RFID application development with the Accada middleware platform","volume":"1","author":"Floerkemeier","year":"2007","journal-title":"IEEE Syst. J."},{"key":"ref_9","unstructured":"The Global Language of Business (2019, June 09). GS1, EPCglobal. Available online: https:\/\/www.gs1.org\/epcglobal."},{"key":"ref_10","unstructured":"EPCglobal (2009). The Application Level Events (ALE) specification. Interface, 1\u2013229. Available online: https:\/\/www.gs1.org\/sites\/default\/files\/docs\/epc\/ale_1_1_1-standard-core-20090313.pdf."},{"key":"ref_11","unstructured":"EPCglobal (2019, June 09). The Application Level Events (ALE) Specification Version 1.1.1 Part II: XML and SOAP Bindings. Available online: https:\/\/www.gs1.org\/sites\/default\/files\/docs\/epc\/ale_1_1_1-standard-XMLandSOAPbindings-20090313.pdf."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Tounsi, W., Cuppens-Boulahia, N., Cuppens, F., and Garcia-Alfaro, J. (2013, January 28\u201331). Fine-grained privacy control for the RFID middleware of EPCglobal networks. Proceedings of the Fifth International Conference on Management of Emergent Digital EcoSystems, Luxembourg.","DOI":"10.1145\/2536146.2536154"},{"key":"ref_13","unstructured":"Contu, R., and Kavanagh, K.M. (2019, June 09). Market Trends: Cloud-Based Security Services Market, Worldwide. Available online: https:\/\/www.gartner.com\/en\/documents\/2607617\/market-trends-cloud-based-security-services-market-world."},{"key":"ref_14","unstructured":"Ekran System (2019, June 11). Role-Based Access Control vs Attribute-Based Access Control: How to Choose. Available online: https:\/\/www.ekransystem.com\/en\/blog\/rbac-vs-abac."},{"key":"ref_15","unstructured":"Hu, V.C., Friedman, A.R., Lang, A.J., Cogdell, M.M., Scarfone, K., and Kuhn, R. (2019). Guide to Attribute Based Access Control (ABAC) Definition and Considerations, National Institute of Standards and Technology. Spec. Publ. 800-162."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1109\/MITP.2013.37","article-title":"ABAC and RBAC: Scalable, flexible, and auditable access management","volume":"15","author":"Coyne","year":"2013","journal-title":"IT Prof."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"7273","DOI":"10.1109\/ACCESS.2018.2890389","article-title":"Ultralightweight mutual authentication RFID protocol for blockchain enabled supply chains","volume":"7","author":"Ong","year":"2019","journal-title":"IEEE Access"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1016\/j.comnet.2016.11.007","article-title":"Access control in the Internet of Things: Big challenges and new opportunities","volume":"112","author":"Ouaddah","year":"2017","journal-title":"Comput. Netw."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Ouechtati, H., and Ben Azzouna, N. (2017, January 11\u201314). Trust-ABAC towards an access control system for the Internet of Things. Proceedings of the International Conference on Green, Pervasive, and Cloud Computing, Cetara, Italy.","DOI":"10.1007\/978-3-319-57186-7_7"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Hemdi, M., and Deters, R. (2016, January 13\u201315). Using REST based protocol to enable ABAC within IoT systems. Proceedings of the IEEE 7th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), Vancouver, BC, Canada.","DOI":"10.1109\/IEMCON.2016.7746297"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Pervez, H., Muneeb, M., Irfan, M.U., and Haq, I.U. (2018, January 19\u201321). A comparative analysis of DAG-based blockchain architectures. Proceedings of the 12th International Conference on Open Source Systems and Technologies (ICOSST), Lahore, Pakistan.","DOI":"10.1109\/ICOSST.2018.8632193"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1109\/MITP.2018.021921652","article-title":"To Blockchain or not to Blockchain: That is the question","volume":"20","author":"Gatteschi","year":"2018","journal-title":"IT Prof."},{"key":"ref_23","first-page":"206","article-title":"Blockchain based access control","volume":"10320 LNCS","author":"Mori","year":"2017","journal-title":"Lect. Notes Comput. Sci."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Hwang, D., Choi, J., and Kim, K.H. (2018, January 17\u201319). Dynamic access control scheme for IoT devices using blockchain. Proceedings of the International Conference on Information and Communication Technology Convergence (ICTC), Jeju, Korea.","DOI":"10.1109\/ICTC.2018.8539659"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"12240","DOI":"10.1109\/ACCESS.2018.2812844","article-title":"RBAC-SC: Role-based access control using smart contract","volume":"6","author":"Cruz","year":"2018","journal-title":"IEEE Access"},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Zhu, Y., Qin, Y., Gan, G., Shuai, Y., and Chu, W.C.C. (2018, January 23\u201327). TBAC: Transaction-based access control on blockchain for resource sharing with cryptographically decentralized authorization. Proceedings of the IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC), Tokyo, Japan.","DOI":"10.1109\/COMPSAC.2018.00083"},{"key":"ref_27","unstructured":"Gartner (2019, June 10). Blockchain: What\u2019s Ahead?. Available online: https:\/\/www.gartner.com\/en\/information-technology\/insights\/blockchain."},{"key":"ref_28","unstructured":"Blockchain, C. (2019, June 10). Tokenization of Financial Assets: Financial Blockchain Revolution. Available online: https:\/\/medium.com\/@credits\/tokenization-of-financial-assets-financial-blockchain-revolution-bc632e75c8."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Yasri, D. (2019, June 10). Revolutionizing Healthcare with Tokenization. Available online: https:\/\/medium.com\/pikciochain\/revolutionizing-healthcare-with-tokenization-d4d36a2ca6fe.","DOI":"10.23880\/JQHE-16000147"},{"key":"ref_30","unstructured":"Sazandrishvili, G. (2019, June 10). Asset Tokenization on Blockchain Explained in Plain English. Available online: https:\/\/medium.com\/coinmonks\/asset-tokenization-on-blockchain-explained-in-plain-english-f4e4b5e26a6d."},{"key":"ref_31","unstructured":"Samarati, P., and de Vimercati, S.C. (2011). Access Control Policies, Models, and Mechanisms. International School on Foundations of Security Analysis and Design, Springer."},{"key":"ref_32","unstructured":"Lorenzo, S.F., A\u00f1orga, J., and Arrizabalaga, S. (2019, July 10). An Attribute-Based Access Control model in RFID systems based on blockchain Decentralized Applications for healthcare environments (video demonstration). Available online: https:\/\/zenodo.org\/record\/3339217."},{"key":"ref_33","unstructured":"Transcends (2019, June 11). RIFIDI Community Wiki. Available online: http:\/\/wiki.rifidi.net\/index.php\/Main_Page."},{"key":"ref_34","unstructured":"(2019, June 10). Serme, node-epc. Available online: https:\/\/github.com\/sarme\/node-epc."},{"key":"ref_35","unstructured":"Cubedro, M.O. (2019, June 10). Ethereum Network Stats. Available online: https:\/\/github.com\/cubedro\/eth-netstats."},{"key":"ref_36","unstructured":"Cubedro, M.O. (2019, June 10). Ethereum Network Intelligence API. Available online: https:\/\/github.com\/cubedro\/eth-net-intelligence-api."},{"key":"ref_37","unstructured":"llrp.org (2019, June 11). LLRP Toolkit. Available online: http:\/\/llrp.org\/."},{"key":"ref_38","unstructured":"Huebner, A., Facchi, C., and Janicke, H. (2012, January 18\u201323). Rifidi toolkit: Virtuality for testing RFID systems. Proceedings of the Seventh International Conference on Systems and Networks Communications (ICSNC 2012), Lisbon, Portugal."},{"key":"ref_39","unstructured":"GitHub (2019, June 11). Truffle Blockchain Group 2019. Available online: https:\/\/github.com\/trufflesuite\/drizzle."},{"key":"ref_40","unstructured":"Cubedro, M.O. (2019, June 07). Ropsten Stats. Available online: https:\/\/ropsten-stats.parity.io\/."},{"key":"ref_41","unstructured":"Ethereum Community (2019, June 13). Etherscan Ropsten Testnet Network. Available online: https:\/\/ropsten.etherscan.io\/."},{"key":"ref_42","unstructured":"Wuehler, M. (2019, July 06). Infura Dashboard Update. Available online: https:\/\/blog.infura.io\/infura-dashboard-update-9f02d0643eb3."}],"container-title":["Computers"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-431X\/8\/3\/57\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T13:11:44Z","timestamp":1760188304000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-431X\/8\/3\/57"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7,31]]},"references-count":42,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2019,9]]}},"alternative-id":["computers8030057"],"URL":"https:\/\/doi.org\/10.3390\/computers8030057","relation":{},"ISSN":["2073-431X"],"issn-type":[{"value":"2073-431X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,7,31]]}}}