A Light Protocol for Tracking Secure Stuff for the Internet of Things
DOI:
https://doi.org/10.14419/ijet.v7i2.32.15384Published:
2018-05-31Keywords:
IoT, HMAC, CMAC, SPDL, LSOTP, RFID.Abstract
The Internet of Things (IoT) is growing in the web of an age-old IPv6 address for Internet connections and messages that arise between these and other devices and systems that work with the Internet. It is equipped with the unique ID and data transfer capability through the network. Among other things, tracking and tracking online travel is a major issue. Although there are many tracking techniques for moving objects, many are at risk. So there is a need for tracking the safety of an object Safety protocols should provide visibility and tracking of street objects in support of the Internet (IoT). This protocol is based on the RFID Identity System for IoT Objects. Existing ones do not provide authentication of sites that lead to fakes. Great use of energy. The proposed protocol improves road safety tracking using the base protocol light and SPDL. The requested protocol is intended to ensure accuracy, accuracy, confidentiality and encryption. To ensure safe monitoring of objects, the requested protocols use cryptic primitives that use HMAC concepts that are used to authenticate an object. This protocol introduction relies on code authentication code (CMC), which is used to reduce power consumption at low cost. The testing of a test network evaluates protocol implementation and is found to be safer and requires less calculation than existing protocols.
References
[1] Stankovic, J. A. “Research directions for the internet of things†IEEE Internet of Things Journal, vol. 1, no.1, pp.3-9, Febru-ary,2014.
[2] Kumar, Hemant, and Archana Singh. Internet of Things: A Comprehensive Analysis and Security Implementation through Elliptic Curve Cryptography, In International Journal of Current Engineering and Technology (IJCET), March ,2016.
[3] Ray, B., Howdhury, M., Abawajy, J., and Jesmin, M. “Secure object tracking protocol for Networked RFID Systems†In the Pro-ceedings of 16th IEEE/ACIS International Conference of the IEEE on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD), pp. 1-7, June,2015.
[4] Sankaran, S “Lightweight security framework for IoTs using identity based cryptography†In the Proceedings of IEEE Interna-tional Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 880-886, September,2016.
[5] Jiang, S., Zhu, X., and Wang, L.“An Efficient Anonymous Batch Authentication Scheme Based on HMAC for VANETs†IEEE Transactions on Intelligent
[6] Elkhiyaoui, K., Blass, E. O., and Molva, R. “CHECKER: On-site checking in RFID-based supply chains†In the Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks, pp. 173-184, April,2012.
[7] Blass, E. O., Elkhiyaoui, K., Molva, R., and Antipolis, E. S. “Tracker: Security and privacy for RFID-based supply chains†In the Proceedings of 18th Annual Network and Distributed System Security Symposium, pp. 6-9, February,2011.
[8] Burbridge, T., and Soppera, A. “Supply chain control using a RFID proxy re-signature schemeâ€, In the Proceedings of IEEE International Conference on RFID, pp. 29-36, April,2010.
[9] Ouafi, K., and Vaudenay, S. “Pathchecker: An RFID applica-tion for tracing products in supply-chainsâ€, In the Proceedings of RFID Sec, July,2009.
[10] Ray, B. R., Chowdhury, M. U., and Abawajy, J. H. “Secure Object Tracking Protocol for the Internet of Thingsâ€, IEEE Internet of Things Journal, vol. 3 no. 4, pp. 544-553, August,2016.
How to Cite
License
Authors who publish with this journal agree to the following terms:- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution Licensethat allows others to share the work with an acknowledgement of the work''s authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal''s published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
Accepted 2018-07-10
Published 2018-05-31