Abstract
The Internet of Things as an emerging global, information service architecture facilitating the exchange of goods in global supply chain networks is developing on the technical basis of the present Domain Name System. In this paper, we assume that all the communication channels among Tag, Reader, and Server are insecure. We implement a TTP (Trust-Third-Party) based key management protocol to construct a secure session key among the tag, reader and server to construct a security Mobile RFID (Radio Frequency Identification) service based on the IOT(Internet of Things). The proposed idea is security and efficiency and supply three advantages for a secure IOT architecture.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Kim, H., Kim, Y.: An Early Binding Fast Handover for High-Speed Mobile Nodes on MIPv6 over Connectionless Packet Radio Link. In: Proc. 7th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2006), pp. 237–242 (2006)
Information Society Technologies Advisory Group (ISTAG): Revising Europe’s ICT Strategy, Report from the Information Society Technologies Advisory Group, ISTAG (2009)
Seidler, C.: RFID Opportunities for mobile telecommunication services. ITU-T Lighthouse Technical Paper (2005)
Chang, G.C.: A Feasible security mechanism for low cost RFID tags. In: International Conference on Mobile Business (ICMB 2005), pp. 675–677 (2005)
Osaka, K., Takagi, T., Yamazaki, K.: An efficient and secure RFID security method with ownership transfer. In: International Conference on Computational Intelligence and Security, vol. 2, pp. 1090–1095 (2006)
Kim, H.W., Lim, S.Y., Lee, H.J.: Symmetric encryption in RFID authentication protocol for strong location privacy and forward-security. In: International Conference on Hybrid Information Technology, vol. 2, pp. 718–723 (2006)
Yang, M.H., Wu, J.S., Chen, S.J.: Protect mobile RFID location privacy using dynamic identity. In: 7th IEEE International Conference on Cognitive Informatics (ICCI 2008), pp. 366–374 (2008)
Park, N., Won, D.: Dynamic privacy protection for mobile RFID service. In: RFID Security: Techniques, Protocols and System-on-Chip Design, pp. 229–254. Springer, US (2009)
Lo, N.W., Yeh, K.H., Yeun, C.Y.: New mutual agreement protocol to secure mobile RFID-enabled devices. Information Security Technical Report (2008)
EPCglobal Inc: EPCglobal Network: Overview of Design, Benefits, and Secutiry (2004)
EPCglobal Inc: EPCglobal Object Name Service (ONS) 1.0 (2005)
Miller, V.S.: Use of elliptic curves in cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 417–426. Springer, Heidelberg (1986)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Yan, T., Wen, Q. (2011). Building the Internet of Things Using a Mobile RFID Security Protocol Based on Information Technology. In: Jin, D., Lin, S. (eds) Advances in Computer Science, Intelligent System and Environment. Advances in Intelligent and Soft Computing, vol 104. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23777-5_24
Download citation
DOI: https://doi.org/10.1007/978-3-642-23777-5_24
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-23776-8
Online ISBN: 978-3-642-23777-5
eBook Packages: EngineeringEngineering (R0)