A Trust-Third-Party Based Key Management Protocol for Secure Mobile RFID Service Based on the Internet of Things

被引:0
|
作者
Yan, Tao [1 ]
Wen, Qiaoyan [1 ]
机构
[1] BUPT, State Key Lab Networking & Switching Technol, Beijing, Peoples R China
来源
关键词
The Internet of Things; Key Management Protocol; Trust Third Party; RFID; Mobile RFID; RFID Security;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The Internet of Things as an emerging global, information service architecture facilitating the exchange of goods in global supply chain networks is developing on the technical basis of the present Domain Name System. Technological advancements lead to smart objects being capable of identifying, locating, sensing and connecting and thus leading to new forms of communication between people and things and things themselves. In this paper, we assume that all the communication channels among Tag, Reader, and Server are insecure. We implement a TTP (Trust-Third-Party) based key management protocol to construct a secure session key among the tag, reader and server to construct a security Mobile RFID (Radio Frequency Identification) service based on the IOT(Internet of Things). A smart mobile phone with a RFID reader can provide Mobile RFID (MRFID) services based on RFID tagged objects. While the mobile RFID system has many advantages, the privacy violation problems at reader side, consumer tracking with malicious purpose and the sensitive information transmission problems among Tag. Reader and Server, are deeply concerned by individuals and scholars. The proposed idea is security and efficiency and supply three advantages for a secure IOT architecture.
引用
收藏
页码:201 / 208
页数:8
相关论文
共 50 条
  • [1] A Trust-Third-Party Based Key Management Protocol for Secure Mobile RFID Service
    Bai Enjian
    Ge Huayong
    Wu Kejia
    Zhang Wen
    [J]. 2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 3740 - 3744
  • [2] Mutual authentication and key distribution protocol based on the Trust-Third-Party in mobile RFID environment
    Xu Fangfang
    Yang Zhao
    Yang Bo
    [J]. PROCEEDINGS OF THE 2018 13TH IEEE CONFERENCE ON INDUSTRIAL ELECTRONICS AND APPLICATIONS (ICIEA 2018), 2018, : 2501 - 2509
  • [3] Design of a Trusted Third Party Key Exchange Protocol for Secure Internet of Things (IoT)
    Jamshiya, P. K.
    Menon, Divya M.
    [J]. PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 1834 - 1838
  • [4] Trust and Mobility-Based Protocol for Secure Routing in Internet of Things
    Muzammal, Syeda Mariam
    Murugesan, Raja Kumar
    Jhanjhi, N. Z.
    Hossain, M. Shamim
    Yassine, Abdulsalam
    [J]. SENSORS, 2022, 22 (16)
  • [5] A secure ECC-based RFID mutual authentication protocol for internet of things
    Amjad Ali Alamr
    Firdous Kausar
    Jongsung Kim
    Changho Seo
    [J]. The Journal of Supercomputing, 2018, 74 : 4281 - 4294
  • [6] A provably secure RFID authentication protocol based on ECQV for the medical internet of things
    Agrahari, Abhay Kumar
    Varma, Shirshu
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2021, 14 (03) : 1277 - 1289
  • [7] A provably secure RFID authentication protocol based on ECQV for the medical internet of things
    Abhay Kumar Agrahari
    Shirshu Varma
    [J]. Peer-to-Peer Networking and Applications, 2021, 14 : 1277 - 1289
  • [8] A secure ECC-based RFID mutual authentication protocol for internet of things
    Alamr, Amjad Ali
    Kausar, Firdous
    Kim, Jongsung
    Seo, Changho
    [J]. JOURNAL OF SUPERCOMPUTING, 2018, 74 (09): : 4281 - 4294
  • [9] A Decentralized Batch-based Group Key Management Protocol for Mobile Internet of Things (DBGK)
    Abdmeziem, Mohammed Riyadh
    Tandjaoui, Djamel
    Romdhani, Imed
    [J]. CIT/IUCC/DASC/PICOM 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - UBIQUITOUS COMPUTING AND COMMUNICATIONS - DEPENDABLE, AUTONOMIC AND SECURE COMPUTING - PERVASIVE INTELLIGENCE AND COMPUTING, 2015, : 1110 - 1118
  • [10] A Blockchain-based Key Management Protocol for Secure Device-to-Device Communication in the Internet of Things
    Kandi, Mohamed Ali
    Kouicem, Djamel Eddine
    Lakhlef, Hicham
    Bouabdallah, Abdelmadjid
    Challal, Yacine
    [J]. 2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 1868 - 1873