RFID based Security in Internet of Things: A Study

Authors

  • Thomson Christain  PG Scholar, L. J. Institute of Computer Applications, Ahmedabad, Gujarat, India
  • Lalit Sengunthar  PG Scholar, L. J. Institute of Computer Applications, Ahmedabad, Gujarat, India
  • Oneel Christian  PG Scholar, L. J. Institute of Computer Applications, Ahmedabad, Gujarat, India
  • Urja Mankad  Assistant Professor, L. J. Institute of Computer Applications, Ahmedabad, Gujarat, India

Keywords:

Internet of Things (IoT), Security, Radio Frequency Identification (RFID), machine to machine (M2M).

Abstract

The Internet of Things (IoT) provides connectivity for everything and everyone. The IoT can be considered as the future evaluation of the Internet that realizes machine to machine (M2M) learning. Security and privacy are the main issues for IoT applications and facing some enormous challenges. This paper analyses the security architecture and security requirements of IoT as a whole and privacy protection, trust management is being discussed with the help of RFID which is explained in detail with all its consequences and also shown its application in different areas.

References

  1. Sundmaeker, H., Guillemin, P., Friess, P., &Woelffle´, S. (2010). Vision and challenges for realising the internet of things.Cluster of European Research Projects on the Internet of Things—CERP IoT.
  2. Y. Huang and G. Li, “Descriptive Models for Internet of Things,” in IEEE International Conference on Intelligent Control and Information Processing (ICICIP), August 2010.
  3. T. Fan and Y. Chen, “A Scheme of Data Management in the Internet of Things,” in 2nd IEEE International Conference on Network Infrastructure and Digital Content, Sept. 2010.
  4.  Y. Huang and G. Li, “A Semantic Analysis for Internet of Things,” in International Conference on Intelligent Computation Technology and Automation (ICICTA), May 2010.
  5. Q. Zhou and J. Zhang, “Research Prospect of Internet of Things Geography,” in 19th International Conference on Geoinformatics, June 2011.
  6. J. Li, Z. Huang, and X. Wang, “Countermeasure Research about Developing Internet of Things Economy,” in International Conference on E -Business and E -Government (ICEE), May 2011.
  7. Y. Yu, J. Wang, and G. Zhou, “The Exploration in the Education of Professionals in Applied Internet of Things Engineering,” in 4th International Conference on Distance Learning and Education (ICDLE), October 2010.
  8. https://www.slideshare.net/MohanKumarG/internetofthings-iot-aseminar-ppt-by-mohankumarghttps://www.slideshare.net/MohanKumarG/internetofthings-iot-aseminar-ppt-by-mohankumarg
  9. G. Yang, J. Xu, W. Chen, Z. H. Qi, and H. Y. Wang, “Security characteristic and technology in the internet of things,” Journal of Nanjing University of Posts and  Telecommunications (Natural Science), vol. 30, no. 4, Aug 2010.
  10. https://www.slideshare.net/swethak36/iot-rfid-finalppthttps://www.slideshare.net/swethak36/iot-rfid-finalppt
  11. Hu, F., & Wang, F. (2010). Study of recent development about privacy and security of the internet of things. In Proceedings of the international conference on web information systems and mining (pp. 91–95).
  12. Lv, B. Y., Pan, J. X., Ma, Q., & Xiao, Z. H. (2008). Research progress and application of RFID anti-collision algorithm. In Proceedings of the international conference on telecommunication engineering (vo1. 48, no. 7, pp. 124–128).
  13. http://assets.devx.com/articlefigs/15504.jpghttp://assets.devx.com/articlefigs/15504.jpg
  14. https://www.researchgate.net/profile/Jiafu_Wan2/publication/254029342_Security_in_the_Internet_of_Things_A_Review/links/550b9adf0cf290bdc111f796/Security-in-the-Internet-of-Things-A-Review.pdf
  15. Finkenzeller, K. (2003). RFID handbook fundamentals and applications in contactless smart cards and identification (2ndEd.). West Sussex: Wiley.
  16. Wang, D., Wang, J. W., & Zhao, Y. P. (2006). A novel solution to the reader collision problem in RFID system. In Proceedingof the IEEE wireless communications, networking and mobile computing (WiCOM 06) (pp. 1–4).
  17. Song, I. C., Hong, S. H., & Chang, K. H. (2009). An improved reader anti-collision algorithm based on pulse protocol with lotoccupied probability in dense reader mode. In Proceeding of the IEEE 69th vehicular technology conference (pp. 1–5).
  18. Kim, J., Lee, W., Yu, J., Myung, J., Kim, E., & Lee, C. (2005). Effect of localized optimal clustering for reader anti-collision inRFID networks: Fairness aspects to the readers. In Proceeding of the IEEE international conference on computer communications and networks (pp. 497–502).
  19. Juels, A., Rivest, R. L., &Szydlo, M. (2003). The blocker tag: Selective blocking of RFID tags for consumer privacy. In Proceedings of the 10th ACM conference on computer and communications security (CCS 2003), (pp. 103–111).
  20. Ohkubo, M., Suzuki, K., & Kinoshita, S. (2003). Cryptographic approach to privacy- friendly tags. RFID privacy workshop (p.82). Cambridge, MA: MIT.
  21. Duels, A., Pappu, R., & Euros, S. (2003). Privacy protection RFID-enabled banknotes. In Proceedings of seventh internationalfinancial cryptography conference (pp. 103–121).
  22. T2TIT Research Group. (2006). The T2TIT—Thing to thing in the internet of things-project. ANR.
  23. Lakafosis, V., Traille, A., & Lee, H. (2011). RFID-CoA: The RFID tags as certificates of authenticity. In Proceedings of theIEEE international conference on RFID (pp. 207–214).
  24. https://www.slideshare.net/indravi/will-internet-of-things-iot-be-secure-enoughhttps://www.slideshare.net/indravi/will-internet-of-things-iot-be-secure-enough
  25. Hachem, S., Teixeira, T., &Issarny, V. (2011). Ontologies for the internet of things (pp. 1–6). New York: ACM.
  26. https://image.slidesharecdn.com/internet-of-things-iota-seminar-ppt-by-mohan-kumar-g-160122172302/95/internetofthings-iot-aseminar-ppt-by-mohankumarg-7-638.jpg?cb=1453483528https://image.slidesharecdn.com/internet-of-things-iota-seminar-ppt-by-mohan-kumar-g-160122172302/95/internetofthings-iot-aseminar-ppt-by-mohankumarg-7-638.jpg?cb=1453483528/
  27. https://www.slideshare.net/MohanKumarG/internetofthings-iot-aseminar-ppt-by-mohankumarg
  28. https://www.analyticsvidhya.com/blog/2016/08/10-youtube-videos-explaining-the-real-world-applications-of-internet-of-things-iot/https://www.analyticsvidhya.com/blog/2016/08/10-youtube-videos-explaining-the-real-world-applications-of-internet-of-things-iot/
  29. https://techcrunch.com/2015/10/24/why-iot-security-is-so-critical/
  30. https://www.forbes.com/sites/gilpress/2017/03/20/6-hot-internet-of-things-iot-security-technologies/#6ab252291b49
  31. https://www.cisco.com/c/en/us/about/security-center/secure-iot-proposed-framework.htmlhttps://www.cisco.com/c/en/us/about/security-center/secure-iot-proposed-framework.html
  32. https://www.ericsson.com/en/.../ericsson.../end-to-end-security-management-for-the-iothttps://www.ericsson.com/en/.../ericsson.../end-to-end-security-management-for-the-iot...
  33. www.collaberatact.com/IoT/Security‎
  34. Suo, Hui, et al. "Security in the internet of things: a review." Computer Science and Electronics Engineering (ICCSEE), 2012 international conference on. Vol. 3. IEEE, 2012.
  35. Tamboli, Jinita, et al. "Security in the Internet of Things." Communication, Cloud and Big Data: Proceedings of CCB 2014 (2014).
  36. Kamath, Srikanth H., Suyashi Pandey, and Kar Tanisha. "Security Issues in Internet of Things." International Journal of Emerging Research in Management &Technology 6.5 (2017): 260-264.
  37. Dezhgir, Hamid, And Haniyeh Hooshmand. "Security On The Internet Of Things." (2017).
  38. Sayana, Laxman Singh, And Bineet Kumar Joshi. "Security Issues In Internet Of Things."

Downloads

Published

2018-01-20

Issue

Section

Research Articles

How to Cite

[1]
Thomson Christain, Lalit Sengunthar, Oneel Christian, Urja Mankad, " RFID based Security in Internet of Things: A Study, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 4, Issue 2, pp.87-92, January-February-2018.