iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://unpaywall.org/10.1007/978-3-642-23777-5_24
Building the Internet of Things Using a Mobile RFID Security Protocol Based on Information Technology | SpringerLink
Skip to main content

Building the Internet of Things Using a Mobile RFID Security Protocol Based on Information Technology

  • Conference paper
Advances in Computer Science, Intelligent System and Environment

Part of the book series: Advances in Intelligent and Soft Computing ((AINSC,volume 104))

Abstract

The Internet of Things as an emerging global, information service architecture facilitating the exchange of goods in global supply chain networks is developing on the technical basis of the present Domain Name System. In this paper, we assume that all the communication channels among Tag, Reader, and Server are insecure. We implement a TTP (Trust-Third-Party) based key management protocol to construct a secure session key among the tag, reader and server to construct a security Mobile RFID (Radio Frequency Identification) service based on the IOT(Internet of Things). The proposed idea is security and efficiency and supply three advantages for a secure IOT architecture.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Kim, H., Kim, Y.: An Early Binding Fast Handover for High-Speed Mobile Nodes on MIPv6 over Connectionless Packet Radio Link. In: Proc. 7th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2006), pp. 237–242 (2006)

    Google Scholar 

  2. Information Society Technologies Advisory Group (ISTAG): Revising Europe’s ICT Strategy, Report from the Information Society Technologies Advisory Group, ISTAG (2009)

    Google Scholar 

  3. Seidler, C.: RFID Opportunities for mobile telecommunication services. ITU-T Lighthouse Technical Paper (2005)

    Google Scholar 

  4. Chang, G.C.: A Feasible security mechanism for low cost RFID tags. In: International Conference on Mobile Business (ICMB 2005), pp. 675–677 (2005)

    Google Scholar 

  5. Osaka, K., Takagi, T., Yamazaki, K.: An efficient and secure RFID security method with ownership transfer. In: International Conference on Computational Intelligence and Security, vol. 2, pp. 1090–1095 (2006)

    Google Scholar 

  6. Kim, H.W., Lim, S.Y., Lee, H.J.: Symmetric encryption in RFID authentication protocol for strong location privacy and forward-security. In: International Conference on Hybrid Information Technology, vol. 2, pp. 718–723 (2006)

    Google Scholar 

  7. Yang, M.H., Wu, J.S., Chen, S.J.: Protect mobile RFID location privacy using dynamic identity. In: 7th IEEE International Conference on Cognitive Informatics (ICCI 2008), pp. 366–374 (2008)

    Google Scholar 

  8. Park, N., Won, D.: Dynamic privacy protection for mobile RFID service. In: RFID Security: Techniques, Protocols and System-on-Chip Design, pp. 229–254. Springer, US (2009)

    Google Scholar 

  9. Lo, N.W., Yeh, K.H., Yeun, C.Y.: New mutual agreement protocol to secure mobile RFID-enabled devices. Information Security Technical Report (2008)

    Google Scholar 

  10. EPCglobal Inc: EPCglobal Network: Overview of Design, Benefits, and Secutiry (2004)

    Google Scholar 

  11. EPCglobal Inc: EPCglobal Object Name Service (ONS) 1.0 (2005)

    Google Scholar 

  12. Miller, V.S.: Use of elliptic curves in cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 417–426. Springer, Heidelberg (1986)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Yan, T., Wen, Q. (2011). Building the Internet of Things Using a Mobile RFID Security Protocol Based on Information Technology. In: Jin, D., Lin, S. (eds) Advances in Computer Science, Intelligent System and Environment. Advances in Intelligent and Soft Computing, vol 104. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23777-5_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-23777-5_24

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-23776-8

  • Online ISBN: 978-3-642-23777-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics