A Light Protocol for Tracking Secure Stuff for the Internet of Things
Keywords:IoT, HMAC, CMAC, SPDL, LSOTP, RFID.
The Internet of Things (IoT) is growing in the web of an age-old IPv6 address for Internet connections and messages that arise between these and other devices and systems that work with the Internet. It is equipped with the unique ID and data transfer capability through the network. Among other things, tracking and tracking online travel is a major issue. Although there are many tracking techniques for moving objects, many are at risk. So there is a need for tracking the safety of an object Safety protocols should provide visibility and tracking of street objects in support of the Internet (IoT). This protocol is based on the RFID Identity System for IoT Objects. Existing ones do not provide authentication of sites that lead to fakes. Great use of energy. The proposed protocol improves road safety tracking using the base protocol light and SPDL. The requested protocol is intended to ensure accuracy, accuracy, confidentiality and encryption. To ensure safe monitoring of objects, the requested protocols use cryptic primitives that use HMAC concepts that are used to authenticate an object. This protocol introduction relies on code authentication code (CMC), which is used to reduce power consumption at low cost. The testing of a test network evaluates protocol implementation and is found to be safer and requires less calculation than existing protocols.
 Stankovic, J. A. â€œResearch directions for the internet of thingsâ€ IEEE Internet of Things Journal, vol. 1, no.1, pp.3-9, Febru-ary,2014.
 Kumar, Hemant, and Archana Singh. Internet of Things: A Comprehensive Analysis and Security Implementation through Elliptic Curve Cryptography, In International Journal of Current Engineering and Technology (IJCET), March ,2016.
 Ray, B., Howdhury, M., Abawajy, J., and Jesmin, M. â€œSecure object tracking protocol for Networked RFID Systemsâ€ In the Pro-ceedings of 16th IEEE/ACIS International Conference of the IEEE on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD), pp. 1-7, June,2015.
 Sankaran, S â€œLightweight security framework for IoTs using identity based cryptographyâ€ In the Proceedings of IEEE Interna-tional Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 880-886, September,2016.
 Jiang, S., Zhu, X., and Wang, L.â€œAn Efficient Anonymous Batch Authentication Scheme Based on HMAC for VANETsâ€ IEEE Transactions on Intelligent
 Elkhiyaoui, K., Blass, E. O., and Molva, R. â€œCHECKER: On-site checking in RFID-based supply chainsâ€ In the Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks, pp. 173-184, April,2012.
 Blass, E. O., Elkhiyaoui, K., Molva, R., and Antipolis, E. S. â€œTracker: Security and privacy for RFID-based supply chainsâ€ In the Proceedings of 18th Annual Network and Distributed System Security Symposium, pp. 6-9, February,2011.
 Burbridge, T., and Soppera, A. â€œSupply chain control using a RFID proxy re-signature schemeâ€, In the Proceedings of IEEE International Conference on RFID, pp. 29-36, April,2010.
 Ouafi, K., and Vaudenay, S. â€œPathchecker: An RFID applica-tion for tracing products in supply-chainsâ€, In the Proceedings of RFID Sec, July,2009.
 Ray, B. R., Chowdhury, M. U., and Abawajy, J. H. â€œSecure Object Tracking Protocol for the Internet of Thingsâ€, IEEE Internet of Things Journal, vol. 3 no. 4, pp. 544-553, August,2016.
View Full Article:
How to Cite
LicenseAuthors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under aÂ Creative Commons Attribution Licensethat allows others to share the work with an acknowledgement of the work''s authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal''s published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (SeeÂ The Effect of Open Access).