A secure and scalable transaction protocol for ubiquitous sensor network using RFID systems

被引:0
|
作者
Choi, Soo-Hyun [1 ]
Jeong, You-Hyeon [2 ]
机构
[1] UCL, Dept Comp Sci, London WC1E 6BT, England
[2] ETRI, BcN Res Div, Taejon, South Korea
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The RFID technology has ample growth potential since it can be applied to practically all areas, ranging from retail and logistics sectors to livestock management, home network systems, traffic control and hospital patient management. With the advent of this technology, it is possible to realize Ubiquitous Sensor Network (USN) such that every object is given an RFID tag giving them a digital identity, so-called ubiquitous tag or ubiquitous sensor. However, it is clear that the biggest challenge for RFID technology is to provide benefits without threatening the privacy of information. Many solutions have been suggested for RFID systems, but none of them suits to the USN environment because of their security weakness or non-scalability. In this paper, we propose a secure and scalable transaction (SST) protocol for USN using RFID technology. The SST protocol uses the Advanced Encryption Standard (AES) algorithm for authentication and encryption so that it can be free from tag cloning and privacy attack. Moreover, it is scalable in a sense that an RFID reader does not need to perform a shared key distribution and management. In analyzing SST protocol, we show how forward privacy is guaranteed and demonstrate the results.
引用
收藏
页码:1781 / +
页数:2
相关论文
共 50 条
  • [1] Secure and Scalable RFID Authentication Protocol
    Fernandez-Mir, Albert
    Castella-Roca, Jordi
    Viejo, Alexandre
    DATA PRIVACY MANAGEMENT AND AUTONOMOUS SPONTANEOUS SECURITY, 2011, 6514 : 231 - 243
  • [2] A Scalable and Secure RFID Ownership Transfer Protocol
    Mamun, Mohammad Saiful Islam
    Miyaji, Atsuko
    2014 IEEE 28TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2014, : 343 - 350
  • [3] Secure ubiquitous authentication protocols for RFID systems
    Morshed, Md Monzur
    Atkins, Anthony
    Yu, Hongnian
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2012,
  • [4] Secure ubiquitous authentication protocols for RFID systems
    Md Monzur Morshed
    Anthony Atkins
    Hongnian Yu
    EURASIP Journal on Wireless Communications and Networking, 2012
  • [5] A scalable and secure RFID mutual authentication protocol using ECC for Internet of Things
    Naeem, Muhammad
    Chaudhry, Shehzad Ashraf
    Mahmood, Khalid
    Karuppiah, Marimuthu
    Kumari, Saru
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2020, 33 (13)
  • [6] Secure Authentication Protocol for RFID Systems
    Khan, Gul N.
    Moessner, Markus B.
    2011 20TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN), 2011,
  • [7] A scalable and provably secure hash-based RFID protocol
    Avoine, G
    Oechslin, P
    Third IEEE International Conference on Pervasive Computing and Communications, Workshops, 2005, : 110 - 114
  • [8] An Internet Protocol for flexible, scalable, and secure interaction with ubiquitous computing devices
    Driessen, PF
    Gabert, J
    Levy, MR
    vanEmden, MH
    1997 IEEE PACIFIC RIM CONFERENCE ON COMMUNICATIONS, COMPUTERS AND SIGNAL PROCESSING, VOLS 1 AND 2: PACRIM 10 YEARS - 1987-1997, 1997, : 414 - 416
  • [9] A Secure Scalable Authentication Protocol for Access Network Communications using ECC
    Patel, Suyash
    Dua, Amit
    Kumar, Neeraj
    2021 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC WORKSHOPS), 2021,
  • [10] Design and implementation of a secure IBS platform using RFID and sensor network
    Lee, Byunggil
    Kim, Howon
    2006 IEEE TENTH INTERNATIONAL SYMPOSIUM ON CONSUMER ELECTRONICS, PROCEEDINGS, 2006, : 703 - +