Distributed Key Management Authentication algorithm in Internet of Things (IOT)

被引:0
作者
Rachini, Ali S. [1 ]
Khatoun, R. [2 ]
机构
[1] Lebanese Univ, Beirut, Lebanon
[2] Telecom Paris, Paris, France
来源
2020 SIXTH INTERNATIONAL CONFERENCE ON MOBILE AND SECURE SERVICES (MOBISECSERV)) | 2020年
关键词
IoT; RFID; security; authentication algorithm; distributed algorithm;
D O I
10.1109/mobisecserv48690.2020.9042958
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Radio frequency identification system (RFID) is a wireless technology based on radio waves. These radio waves transmit data from the tag to a reader, which then transmits the information to a server. RFID tags have several advantages, they can be used in merchandise, to track vehicles, and even patients. Connecting RFID tags to internet terminal or server it called Internet of Things (IoT). Many people have shown interest in connected objects or the Internet of Things (IoT). The IoT is composed of many complementary elements each having their own specificities. The RFID is often seen as a prerequisite for the IoT. The main challenge of RFID is the security issues. Connecting RFID with IoT poses security threats and challenges which are needed to be discussed properly before deployment. In this paper, we proposed a new distributed encryption algorithm to be used in the IoT structure in order to reduce the security risks that are confronted in RFID technology.
引用
收藏
页数:5
相关论文
共 12 条
[1]  
Chang Allen Y., 2009, 2009 IEEE 43rd International Carnahan Conference on Security Technology. ICCST 2009, P36, DOI 10.1109/CCST.2009.5335567
[2]   An Efficient Anonymous Authentication Protocol for RFID Systems Using Dynamic Tokens [J].
Chen, Min ;
Chen, Shigang .
2015 IEEE 35th International Conference on Distributed Computing Systems, 2015, :756-757
[3]   A secure authentication scheme for RFID systems [J].
Dass, Prajnamaya ;
Om, Hari .
1ST INTERNATIONAL CONFERENCE ON INFORMATION SECURITY & PRIVACY 2015, 2016, 78 :100-106
[4]  
Dromard J, 2013, 2013 20TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS (ICT)
[5]  
Gui YQ, 2013, 2013 INTERNATIONAL CONFERENCE ON ICT CONVERGENCE (ICTC 2013): FUTURE CREATIVE CONVERGENCE TECHNOLOGIES FOR NEW ICT ECOSYSTEMS, P359, DOI 10.1109/ICTC.2013.6675373
[6]  
Jianqing Fu, 2010, 2010 2nd International Conference on Computer Engineering and Technology (ICCET), P497, DOI 10.1109/ICCET.2010.5485559
[7]  
Li J, 2010, PROCEEDINGS OF 2010 INTERNATIONAL CONFERENCE ON LOGISTICS SYSTEMS AND INTELLIGENT MANAGEMENT, VOLS 1-3, P1648, DOI 10.1109/ICLSIM.2010.5461250
[8]  
Li S., 2015, INFORM SYSTEMS FRONT, V17, P243
[9]  
Rahman M, 2015, CONSUM COMM NETWORK, P910, DOI 10.1109/CCNC.2015.7158097
[10]   A stochastic approach for packet dropping attacks detection in mobile Ad hoc networks [J].
Rmayti, Mohammad ;
Khatoun, Rida ;
Begriche, Youcef ;
Khoukhi, Lyes ;
Gaiti, Dominique .
COMPUTER NETWORKS, 2017, 121 :53-64