Abstract
Owing to significant progress in the Internet of Things (IoT) within both academia and industry, this breakthrough technology is increasingly penetrating our everyday lives. However, the levels of user adoption and business revenue are still lagging behind the original expectations. The reasons include strong security and privacy concerns behind the IoT, which become critically important in the smart home environment. Our envisioned smart home scenario comprises a variety of sensors, actuators, and end-user devices interacting and sharing data securely. Correspondingly, we aim at investigating and verifying in practice the Yoking-proof protocol, which is a multi-factor authentication solution for smart home systems with an emphasis on data confidentiality and mutual authentication. Our international team conducted a large trial featuring the Yoking-proof protocol, RFID technology, as well as various sensors and user terminals. This paper outlines the essentials of this trial, reports on our practical experience, and summarizes the main lessons learned.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsNotes
- 1.
See Cottonwood: USB Long Range UHF RFID reader, 2016 http://store.linksprite.com/cottonwood-usb-long-range-uhf-rfid-reader-iso18000-6c-epc-g2/.
- 2.
See a showcase video capturing the functionality of our utilized testbed: https://www.youtube.com/watch?v=zDP2MpO0YHY.
References
Atzori, L., Iera, A., Morabito, G.: The Internet of Things: a survey. Comput. Netw. 54(15), 2787–2805 (2010)
Cisco, Cisco Visual Networking Index, Global mobile data traffic forecast update, 2015–2020, White paper, 2016
Perera, C., Liu, C.H., Jayawardena, S.: The emerging Internet of Things marketplace from an industrial perspective: a survey. IEEE Trans. Emerg. Top. Comput. 3(4), 585–598 (2015)
Vishnevsky, V.M., Larionov, A.: Design concepts of an application platform for traffic law enforcement and vehicles registration comprising RFID technology. In: Proceedings of IEEE International Conference on RFID-Technologies and Applications (RFID-TA), pp. 148–153. IEEE (2012)
Vishnevsky, V., Kozyrev, D., Rykov, V.: New generation of safety systems for automobile traffic control using RFID technology and broadband wireless communication. In: Vishnevsky, V., Kozyrev, D., Larionov, A. (eds.) DCCN 2013. CCIS, vol. 279, pp. 145–153. Springer, Heidelberg (2014). doi:10.1007/978-3-319-05209-0_13
Miori, V., Russo, D.: Home automation devices belong to the IoT world. ERCIM News 101, 22–23 (2015)
Vishnevsky, V.M., Larionov, A., Ivanov, R.: Architecture of application platform for RFID-enabled traffic law enforcement system. In: Proceedings of 7th International Workshop on Communication Technologies for Vehicles (Nets4Cars-Fall), pp. 45–49. IEEE (2014)
Komninos, N., Philippou, E., Pitsillides, A.: Survey in smart grid and smart home security: issues, challenges and countermeasures. IEEE Commun. Surv. Tutorials 16(4), 1933–1954 (2014)
Hosek, J., Masek, P., Kovac, D., Ries, M., Kröpfl, F.: IP home gateway as universal multi-purpose enabler for smart home services. e & i Elektrotechnik und Informationstechnik 131(4–5), 123–128 (2014)
He, D., Zeadally, S.: An analysis of RFID authentication schemes for Internet of Things in healthcare environment using elliptic curve cryptography. IEEE Internet Things J. 2(1), 72–83 (2015)
Yu, Y.-C., Hou, T.-W., Chiang, T.-C.: Low cost RFID real lightweight binding proof protocol for medication errors and patient safety. J. Med. Syst. 36(2), 823–828 (2012)
Ning, H., Liu, H., Yang, L.T.: Aggregated-proof based hierarchical authentication scheme for the Internet of Things. IEEE Trans. Parallel Distrib. Syst. 26(3), 657–667 (2015)
Ramsey, B.W., Temple, M.A., Mullins, B.E.: PHY foundation for multi-factor ZigBee node authentication. In: Proceedings of IEEE Global Communications Conference (GLOBECOM), pp. 795–800. IEEE (2012)
Juels, A.: ‘Yoking-proofs’ for RFID tags. In: Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops, pp. 138–143. IEEE (2004)
Saito, J., Sakurai, K.: Grouping proof for RFID tags. In: Proceedings of 19th International Conference on Advanced Information Networking and Applications (AINA 2005) Volume 1 (AINA papers), vol. 2, pp. 621–624. IEEE (2005)
Nuamcherm, T., Kovintavewat, P., Tantibundhit, C., Ketprom, U., Mitrpant, C.: An improved proof for RFID tags. In: Proceedings of 5th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON), vol. 2, pp. 737–740. IEEE (2008)
Chen, C.-L., Wu, C.-Y.: An RFID system yoking-proof protocol conforming to EPCglobal C1G2 standards. Secur. Commun. Netw. 7(12), 2527–2541 (2014)
Masek, P., Hosek, J., Zeman, K., Stusek, M., Kovac, D., Cika, P., Masek, J., Andreev, S., Kröpfl, F.: Implementation of true IoT vision: survey on enabling protocols and hands-on experience. Int. J. Distrib. Sens. Netw. 2016 (2016)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing AG
About this paper
Cite this paper
Prudanov, A. et al. (2016). A Trial of Yoking-Proof Protocol in RFID-based Smart-Home Environment. In: Vishnevskiy, V., Samouylov, K., Kozyrev, D. (eds) Distributed Computer and Communication Networks. DCCN 2016. Communications in Computer and Information Science, vol 678. Springer, Cham. https://doi.org/10.1007/978-3-319-51917-3_3
Download citation
DOI: https://doi.org/10.1007/978-3-319-51917-3_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-51916-6
Online ISBN: 978-3-319-51917-3
eBook Packages: Computer ScienceComputer Science (R0)