Adjusting Matryoshka Protocol to Address the Scalability Issue in IoT Environment

被引:4
|
作者
Al, Gaith [1 ]
Doss, Robin [1 ]
Chowdhury, Morshed [1 ]
机构
[1] Deakin Univ, Sch Informat Technol, Geelong, Vic, Australia
关键词
Scalability; IoT; RFID; Matryoshka; INTERNET;
D O I
10.1007/978-3-319-65548-2_7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The security and privacy issues in large scale deployments of RFID/IOT systems is of critical concern to researchers and industry alike. However scalability is often a forgotten aspect of protocol design and is not well addressed. In this paper, we propose an extension to an existing RFID protocol to address the scalability issues required in an IoT context. We also present a review of work by other researchers in this context.
引用
收藏
页码:84 / 94
页数:11
相关论文
共 50 条
  • [31] Securing MQTT protocol for IoT environment using IDS based on ensemble learning
    Zeghida, Hayette
    Boulaiche, Mehdi
    Chikh, Ramdane
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2023, 22 (04) : 1075 - 1086
  • [32] An Enhanced Reliable Message Transmission System Based on MQTT Protocol in IoT Environment
    Hwang, Hyun Cheon
    Park, Ji Su
    Lee, Byeong Rae
    Shon, Jin Gon
    ADVANCES IN COMPUTER SCIENCE AND UBIQUITOUS COMPUTING, 2017, 421 : 982 - 987
  • [33] Access Control Protocol for Battlefield Surveillance in Drone-Assisted IoT Environment
    Bera, Basudeb
    Das, Ashok Kumar
    Garg, Sahil
    Piran, Md Jalil
    Hossain, M. Shamim
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (04) : 2708 - 2721
  • [34] Cryptanalysis and Countermeasure of "An Efficient NTRU-based Authentication Protocol in IoT Environment"
    Park, YoHan
    Seok, Woojin
    Lee, Wonhyuk
    Ju, Hong Taek
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2020, 11 (12) : 25 - 31
  • [35] A tropical algebraic collatz conjecture based key exchange protocol for IoT environment
    J. Jackson
    R. Perumal
    International Journal of Information Technology, 2025, 17 (1) : 485 - 493
  • [36] Improved RPL Protocol for Low-Power and Lossy Network for IoT Environment
    Hadaya N.N.
    Alabady S.A.
    SN Computer Science, 2021, 2 (5)
  • [37] Securing MQTT protocol for IoT environment using IDS based on ensemble learning
    Hayette Zeghida
    Mehdi Boulaiche
    Ramdane Chikh
    International Journal of Information Security, 2023, 22 : 1075 - 1086
  • [38] A Secure and LoRaWAN Compatible User Authentication Protocol for Critical Applications in the IoT Environment
    Jabbari, Abdollah
    Mohasefi, Jamshid Bagherzadeh
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (01) : 56 - 65
  • [39] An enhanced scalable and secure RFID authentication protocol for WBAN within an IoT environment
    Izza, Sarah
    Benssalah, Mustapha
    Drouiche, Karim
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 58
  • [40] Proposal of Receiver Initiated MAC Protocol for WSN in urban environment using IoT
    Fernandes, Renato F., Jr.
    Brandao, Dennis
    IFAC PAPERSONLINE, 2016, 49 (30): : 102 - 107