A secure and scalable transaction protocol for ubiquitous sensor network using RFID systems

被引:0
|
作者
Choi, Soo-Hyun [1 ]
Jeong, You-Hyeon [2 ]
机构
[1] UCL, Dept Comp Sci, London WC1E 6BT, England
[2] ETRI, BcN Res Div, Taejon, South Korea
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The RFID technology has ample growth potential since it can be applied to practically all areas, ranging from retail and logistics sectors to livestock management, home network systems, traffic control and hospital patient management. With the advent of this technology, it is possible to realize Ubiquitous Sensor Network (USN) such that every object is given an RFID tag giving them a digital identity, so-called ubiquitous tag or ubiquitous sensor. However, it is clear that the biggest challenge for RFID technology is to provide benefits without threatening the privacy of information. Many solutions have been suggested for RFID systems, but none of them suits to the USN environment because of their security weakness or non-scalability. In this paper, we propose a secure and scalable transaction (SST) protocol for USN using RFID technology. The SST protocol uses the Advanced Encryption Standard (AES) algorithm for authentication and encryption so that it can be free from tag cloning and privacy attack. Moreover, it is scalable in a sense that an RFID reader does not need to perform a shared key distribution and management. In analyzing SST protocol, we show how forward privacy is guaranteed and demonstrate the results.
引用
收藏
页码:1781 / +
页数:2
相关论文
共 50 条
  • [21] Scalable authentication protocol in RFID-based systems
    Ren, Xuping
    Zhang, Haiping
    Li, Yunfa
    You, Xindong
    Ren, Xuping, 1600, Transport and Telecommunication Institute, Lomonosova street 1, Riga, LV-1019, Latvia (18): : 131 - 138
  • [22] Secure and Efficient Tag Searching in RFID Systems using Serverless Search Protocol
    Ahamed, Sheikh I.
    Rahman, Farzana
    Hoque, Endadul
    Kawsar, Fahim
    Nakajima, Tatsuo
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2008, 2 (04): : 57 - 66
  • [23] Provably secure ubiquitous systems: Universally composable RFID authentication protocols
    Burmester, Mike
    van Le, Tri
    de Medeiros, Breno
    2006 SECURECOMM AND WORKSHOPS, 2006, : 332 - +
  • [24] Secure payment protocol for healthcare using USIM in ubiquitous
    Back, JM
    Hong, IS
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2005, PT 3, 2005, 3482 : 964 - 972
  • [25] Secure Object Tracking Protocol for Networked RFID Systems
    Ray, Biplob
    Howdhury, Morshed
    Abawajy, Jemal
    Jesmin, Monika
    2015 16TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD), 2015, : 135 - 141
  • [26] XTEA based Secure Authentication Protocol for RFID Systems
    Khan, Gul N.
    Yu, Jack
    Yuan, Fei
    2011 20TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN), 2011,
  • [27] A secure and efficient authentication protocol for mobile RFID systems
    Sandhya, M.
    Rangaswamy, T.R.
    Journal of Digital Information Management, 2011, 9 (03): : 99 - 105
  • [28] An enhanced scalable and secure RFID authentication protocol for WBAN within an IoT environment
    Izza, Sarah
    Benssalah, Mustapha
    Drouiche, Karim
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 58
  • [29] A secure time synchronization protocol for sensor network
    Li, Hui
    Zheng, Yanfei
    Wen, Mi
    Chen, Kefei
    EMERGING TECHNOLOGIES IN KNOWLEDGE DISCOVERY AND DATA MINING, 2007, 4819 : 515 - 526
  • [30] Analysis of the RFID security protocol for secure smart home network
    Kim, Hyun-Seok
    Oh, Jung-Hyun
    Choi, Jin-Young
    2006 INTERNATIONAL CONFERENCE ON HYBRID INFORMATION TECHNOLOGY, VOL 2, PROCEEDINGS, 2006, : 356 - +