Scalable RFID security framework and protocol supporting Internet of Things

被引:41
作者
Ray, Biplob R. [1 ]
Abawajy, Jemal [1 ]
Chowdhury, Morshed [1 ]
机构
[1] Deakin Univ, Sch Informat Technol, Parallel & Distributed Comp Lab, Melbourne, Vic, Australia
关键词
RFID; Internet of Things; Authentication; Security protocol; Security framework; Malware; AUTHENTICATION PROTOCOL;
D O I
10.1016/j.comnet.2014.03.023
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Radio-frequency identification (RFID) is seen as one of the requirements for the implementation of the Internet-of-Things (IoT). However, an RFID system has to be equipped with a holistic security framework for a secure and scalable operation. Although much work has been done to provide privacy and anonymity, little focus has been given to performance, scalability and customizability issues to support robust implementation of IoT. Also, existing protocols suffer from a number of deficiencies such as insecure or inefficient identification techniques, throughput delay and inadaptability. In this paper, we propose a novel identification technique based on a hybrid approach (group-based approach and collaborative approach) and security check handoff (SCH) for RFID systems with mobility. The proposed protocol provides customizability and adaptability as well as ensuring the secure and scalable deployment of an RFID system to support a robust distributed structure such as the IoT. The protocol has an extra fold of protection against malware using an incorporated malware detection technique. We evaluated the protocol using a randomness battery test and the results show that the protocol offers better security, scalability and customizability than the existing protocols. (C) 2014 Elsevier B.V. All rights reserved.
引用
收藏
页码:89 / 103
页数:15
相关论文
共 31 条
[1]   SQLIA detection and prevention approach for RFID systems [J].
Abawajy, Jemal .
JOURNAL OF SYSTEMS AND SOFTWARE, 2013, 86 (03) :751-758
[2]  
Ashton Kevin, AUTO ID LABS
[3]  
Avoine G, 2006, LECT NOTES COMPUT SC, V3897, P291
[4]  
Avoine G., 2007, Proceedings of the IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks, P1
[5]  
Canard S., 2008, 4 WORKSH RFID SECURI
[6]  
Erguler I., 2011, EURASIP J WIREL COMM, V1, P5412
[7]   Security flaws in a recent RFID delegation protocol [J].
Erguler, Imran ;
Anarim, Emin .
PERSONAL AND UBIQUITOUS COMPUTING, 2012, 16 (03) :337-349
[8]  
Fernando H, 2011, LECT NOTES COMPUT SC, V7017, P245, DOI 10.1007/978-3-642-24669-2_24
[9]  
Fouladgar S., 2008, AIPACA 08, P31, DOI DOI 10.1145/1461464.1461467
[10]  
Henrici D, 2004, SECOND IEEE ANNUAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, P149