A Light Protocol for Tracking Secure Stuff for the Internet of Things

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    The Internet of Things (IoT) is growing in the web of an age-old IPv6 address for Internet connections and messages that arise between these and other devices and systems that work with the Internet. It is equipped with the unique ID and data transfer capability through the network. Among other things, tracking and tracking online travel is a major issue. Although there are many tracking techniques for moving objects, many are at risk. So there is a need for tracking the safety of an object Safety protocols should provide visibility and tracking of street objects in support of the Internet (IoT). This protocol is based on the RFID Identity System for IoT Objects. Existing ones do not provide authentication of sites that lead to fakes. Great use of energy. The proposed protocol improves road safety tracking using the base protocol light and SPDL. The requested protocol is intended to ensure accuracy, accuracy, confidentiality and encryption. To ensure safe monitoring of objects, the requested protocols use cryptic primitives that use HMAC concepts that are used to authenticate an object. This protocol introduction relies on code authentication code (CMC), which is used to reduce power consumption at low cost. The testing of a test network evaluates protocol implementation and is found to be safer and requires less calculation than existing protocols.

     


  • Keywords


    IoT, HMAC, CMAC, SPDL, LSOTP, RFID.

  • References


      [1] Stankovic, J. A. “Research directions for the internet of things” IEEE Internet of Things Journal, vol. 1, no.1, pp.3-9, Febru-ary,2014.

      [2] Kumar, Hemant, and Archana Singh. Internet of Things: A Comprehensive Analysis and Security Implementation through Elliptic Curve Cryptography, In International Journal of Current Engineering and Technology (IJCET), March ,2016.

      [3] Ray, B., Howdhury, M., Abawajy, J., and Jesmin, M. “Secure object tracking protocol for Networked RFID Systems” In the Pro-ceedings of 16th IEEE/ACIS International Conference of the IEEE on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD), pp. 1-7, June,2015.

      [4] Sankaran, S “Lightweight security framework for IoTs using identity based cryptography” In the Proceedings of IEEE Interna-tional Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 880-886, September,2016.

      [5] Jiang, S., Zhu, X., and Wang, L.“An Efficient Anonymous Batch Authentication Scheme Based on HMAC for VANETs” IEEE Transactions on Intelligent

      [6] Elkhiyaoui, K., Blass, E. O., and Molva, R. “CHECKER: On-site checking in RFID-based supply chains” In the Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks, pp. 173-184, April,2012.

      [7] Blass, E. O., Elkhiyaoui, K., Molva, R., and Antipolis, E. S. “Tracker: Security and privacy for RFID-based supply chains” In the Proceedings of 18th Annual Network and Distributed System Security Symposium, pp. 6-9, February,2011.

      [8] Burbridge, T., and Soppera, A. “Supply chain control using a RFID proxy re-signature scheme”, In the Proceedings of IEEE International Conference on RFID, pp. 29-36, April,2010.

      [9] Ouafi, K., and Vaudenay, S. “Pathchecker: An RFID applica-tion for tracing products in supply-chains”, In the Proceedings of RFID Sec, July,2009.

      [10] Ray, B. R., Chowdhury, M. U., and Abawajy, J. H. “Secure Object Tracking Protocol for the Internet of Things”, IEEE Internet of Things Journal, vol. 3 no. 4, pp. 544-553, August,2016.


 

View

Download

Article ID: 15384
 
DOI: 10.14419/ijet.v7i2.32.15384




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.