IoT Applications on Secure Smart Shopping System

被引:78
作者
Li, Ruinian [1 ]
Song, Tianyi [1 ]
Capurso, Nicholas [1 ]
Yu, Jiguo [2 ]
Couture, Jason [1 ]
Cheng, Xiuzhen [1 ]
机构
[1] George Washington Univ, Dept Comp Sci, Washington, DC 20052 USA
[2] Qufu Normal Univ, Sch Informat Sci & Engn, Rizhao 276826, Peoples R China
基金
中国国家自然科学基金; 美国国家科学基金会;
关键词
Internet of Things (IoT); security; smart cart; smart shopping; INTERNET;
D O I
10.1109/JIOT.2017.2706698
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) is changing human lives by connecting everyday objects together. For example, in a grocery store, all items can be connected with each other, forming a smart shopping system. In such an IoT system, an inexpensive radio frequency identification (RFID) tag can be attached to each product which, when placed into a smart shopping cart, can be automatically read by a cart equipped with an RFID reader. As a result, billing can be conducted from the shopping cart itself, preventing customers from waiting in a long queue at checkout. Additionally, smart shelving can be added into this system, equipped with RFID readers, and can monitor stock, perhaps also updating a central server. Another benefit of this kind of system is that inventory management becomes much easier, as all items can be automatically read by an RFID reader instead of manually scanned by a laborer. To validate the feasibility of such a system, in this paper we identify the design requirements of a smart shopping system, build a prototype system to test functionality, and design a secure communication protocol to make the system practical. To the best of our knowledge, this is the first time a smart shopping system is proposed with security under consideration.
引用
收藏
页码:1945 / 1954
页数:10
相关论文
共 37 条
[1]  
Ali Z., 2013, International Journal of Advanced Research in Computer and Communication Engineering, V2, P4696
[2]   RFID Technology for IoT-Based Personal Healthcare in Smart Spaces [J].
Amendola, Sara ;
Lodato, Rossella ;
Manzari, Sabina ;
Occhiuzzi, Cecilia ;
Marrocco, Gaetano .
IEEE INTERNET OF THINGS JOURNAL, 2014, 1 (02) :144-152
[3]   Collective Data-Sanitization for Preventing Sensitive Information Inference Attacks in Social Networks [J].
Cai, Zhipeng ;
He, Zaobo ;
Guan, Xin ;
Li, Yingshu .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2018, 15 (04) :577-590
[4]   INTEGRATION OF WEARABLE DEVICES IN A WIRELESS SENSOR NETWORK FOR AN E-HEALTH APPLICATION [J].
Castillejo, Pedro ;
Martinez, Jose-Fernan ;
Rodriguez-Molina, Jesus ;
Cuerva, Alexandra .
IEEE WIRELESS COMMUNICATIONS, 2013, 20 (04) :38-49
[5]  
Chandrasekar P., 2014, IEEE (ICICES2014), P1
[6]  
Dai W, 2009, CRYPTO 5 6 0 BENCHMA
[7]  
Dasgupta A, 2009, ACM SIGMOD/PODS 2009 CONFERENCE, P153
[8]  
Dobkin D., 2012, The rf in RFID: uhf RFID in practice
[9]   Localization in Wireless Sensor Networks with Known Coordinate Database [J].
Fang, Zhen ;
Zhao, Zhan ;
Cui, Xunxue ;
Geng, Daoqu ;
Du, Lidong ;
Pang, Cheng .
EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2010,
[10]   Internet of Things (IoT): A vision, architectural elements, and future directions [J].
Gubbi, Jayavardhana ;
Buyya, Rajkumar ;
Marusic, Slaven ;
Palaniswami, Marimuthu .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2013, 29 (07) :1645-1660