Advertisement

A Trust-Third-Party Based Key Management Protocol for Secure Mobile RFID Service Based on the Internet of Things

  • Tao Yan
  • Qiaoyan Wen
Part of the Advances in Intelligent and Soft Computing book series (AINSC, volume 135)

Abstract

The Internet of Things as an emerging global, information service architecture facilitating the exchange of goods in global supply chain networks is developing on the technical basis of the present Domain Name System. Technological advancements lead to smart objects being capable of identifying, locating, sensing and connecting and thus leading to new forms of communication between people and things and things themselves. In this paper, we assume that all the communication channels among Tag, Reader, and Server are insecure. We implement a TTP (Trust-Third-Party) based key management protocol to construct a secure session key among the tag, reader and server to construct a security Mobile RFID (Radio Frequency Identification) service based on the IOT(Internet of Things). A smart mobile phone with a RFID reader can provide Mobile RFID (MRFID) services based on RFID tagged objects. While the mobile RFID system has many advantages, the privacy violation problems at reader side, consumer tracking with malicious purpose and the sensitive information transmission problems among Tag, Reader and Server, are deeply concerned by individuals and scholars. The proposed idea is security and efficiency and supply three advantages for a secure IOT architecture.

Keywords

The Internet of Things Key Management Protocol Trust Third Party RFID Mobile RFID RFID Security 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Kim, H., Kim, Y.: An Early Binding Fast Handover for High-Speed Mobile Nodes on MIPv6 over Connectionless Packet Radio Link. In: Proc. 7th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2006), pp. 237–242 (2006)Google Scholar
  2. 2.
    Information Society Technologies Advisory Group (ISTAG): Revising Europe’s ICT Strategy. Report from the Information Society Technologies Advisory Group (ISTAG) (2009) Google Scholar
  3. 3.
    Seidler, C.: RFID Opportunities for mobile telecommunication services. ITU-T Lighthouse Technical Paper (2005)Google Scholar
  4. 4.
    Chang, G.C.: A Feasible security mechanism for low cost RFID tags. In: International Conference on Mobile Business, ICMB 2005, pp. 675–677 (2005)Google Scholar
  5. 5.
    Osaka, K., Takagi, T., Yamazaki, K., Takahashi, O.: An Efficient and Secure RFID Security Method with Ownership Transfer. In: Wang, Y., Cheung, Y.-m., Liu, H. (eds.) CIS 2006. LNCS (LNAI), vol. 4456, pp. 778–787. Springer, Heidelberg (2007)Google Scholar
  6. 6.
    Kim, H.W., Lim, S.Y., Lee, H.J.: Symmetric encryption in RFID authentication protocol for strong location privacy and forward-security. In: International Conference on Hybrid Information Technology, vol. 2, pp. 718–723 (2006)Google Scholar
  7. 7.
    Yang, M.H., Wu, J.S., Chen, S.J.: Protect mobile RFID location privacy using dynamic identity. In: 7th IEEE International Conference on Cognitive Informatics (ICCI 2008), pp. 366–374 (2008)Google Scholar
  8. 8.
    Park, N., Won, D.: Dynamic privacy protection for mobile RFID service. In: RFID Security: Techniques, Protocols and System-on-Chip Design, pp. 229–254. Springer, US (2009)Google Scholar
  9. 9.
    Lo, N.W., Yeh, K.H., Yeun, C.Y.: New mutual agreement protocol to secure mobile RFID-enabled devices. Information Security Technical Report (2008)Google Scholar
  10. 10.
    EPCglobal Inc.: EPCglobal Network: Overview of Design, Benefits, and Secutiry (2004)Google Scholar
  11. 11.
    EPCglobal Inc.: EPCglobal Object Name Service (ONS) 1.0 (2005) Google Scholar
  12. 12.
    Miller, V.S.: Use of Elliptic Curves in Cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 417–426. Springer, Heidelberg (1986)Google Scholar

Copyright information

© Springer-Verlag GmbH Berlin Heidelberg 2012

Authors and Affiliations

  1. 1.State Key Laboratory of Networking and Switching TechnologyBUPTBeijingChina

Personalised recommendations