A Light Protocol for Tracking Secure Stuff for the Internet of Things

  • Authors

    • Dr Chalasani Srinivas
    • Dr Srinivas Malladi
    • . .
    2018-05-31
    https://doi.org/10.14419/ijet.v7i2.32.15384
  • IoT, HMAC, CMAC, SPDL, LSOTP, RFID.
  • The Internet of Things (IoT) is growing in the web of an age-old IPv6 address for Internet connections and messages that arise between these and other devices and systems that work with the Internet. It is equipped with the unique ID and data transfer capability through the network. Among other things, tracking and tracking online travel is a major issue. Although there are many tracking techniques for moving objects, many are at risk. So there is a need for tracking the safety of an object Safety protocols should provide visibility and tracking of street objects in support of the Internet (IoT). This protocol is based on the RFID Identity System for IoT Objects. Existing ones do not provide authentication of sites that lead to fakes. Great use of energy. The proposed protocol improves road safety tracking using the base protocol light and SPDL. The requested protocol is intended to ensure accuracy, accuracy, confidentiality and encryption. To ensure safe monitoring of objects, the requested protocols use cryptic primitives that use HMAC concepts that are used to authenticate an object. This protocol introduction relies on code authentication code (CMC), which is used to reduce power consumption at low cost. The testing of a test network evaluates protocol implementation and is found to be safer and requires less calculation than existing protocols.

     

  • References

    1. [1] Stankovic, J. A. “Research directions for the internet of things†IEEE Internet of Things Journal, vol. 1, no.1, pp.3-9, Febru-ary,2014.

      [2] Kumar, Hemant, and Archana Singh. Internet of Things: A Comprehensive Analysis and Security Implementation through Elliptic Curve Cryptography, In International Journal of Current Engineering and Technology (IJCET), March ,2016.

      [3] Ray, B., Howdhury, M., Abawajy, J., and Jesmin, M. “Secure object tracking protocol for Networked RFID Systems†In the Pro-ceedings of 16th IEEE/ACIS International Conference of the IEEE on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD), pp. 1-7, June,2015.

      [4] Sankaran, S “Lightweight security framework for IoTs using identity based cryptography†In the Proceedings of IEEE Interna-tional Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 880-886, September,2016.

      [5] Jiang, S., Zhu, X., and Wang, L.“An Efficient Anonymous Batch Authentication Scheme Based on HMAC for VANETs†IEEE Transactions on Intelligent

      [6] Elkhiyaoui, K., Blass, E. O., and Molva, R. “CHECKER: On-site checking in RFID-based supply chains†In the Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks, pp. 173-184, April,2012.

      [7] Blass, E. O., Elkhiyaoui, K., Molva, R., and Antipolis, E. S. “Tracker: Security and privacy for RFID-based supply chains†In the Proceedings of 18th Annual Network and Distributed System Security Symposium, pp. 6-9, February,2011.

      [8] Burbridge, T., and Soppera, A. “Supply chain control using a RFID proxy re-signature schemeâ€, In the Proceedings of IEEE International Conference on RFID, pp. 29-36, April,2010.

      [9] Ouafi, K., and Vaudenay, S. “Pathchecker: An RFID applica-tion for tracing products in supply-chainsâ€, In the Proceedings of RFID Sec, July,2009.

      [10] Ray, B. R., Chowdhury, M. U., and Abawajy, J. H. “Secure Object Tracking Protocol for the Internet of Thingsâ€, IEEE Internet of Things Journal, vol. 3 no. 4, pp. 544-553, August,2016.

  • Downloads

  • How to Cite

    Chalasani Srinivas, D., Srinivas Malladi, D., & ., . (2018). A Light Protocol for Tracking Secure Stuff for the Internet of Things. International Journal of Engineering & Technology, 7(2.32), 121-124. https://doi.org/10.14419/ijet.v7i2.32.15384