A Trust-Third-Party Based Key Management Protocol for Secure Mobile RFID Service Based on the Internet of Things

The Internet of Things as an emerging global, information service architecture facilitating the exchange of goods in global supply chain networks is developing on the technical basis of the present Domain Name System. Technological advancements lead to sm

  • PDF / 195,780 Bytes
  • 8 Pages / 429.725 x 659.895 pts Page_size
  • 51 Downloads / 158 Views

DOWNLOAD

REPORT


Abstract. The Internet of Things as an emerging global, information service architecture facilitating the exchange of goods in global supply chain networks is developing on the technical basis of the present Domain Name System. Technological advancements lead to smart objects being capable of identifying, locating, sensing and connecting and thus leading to new forms of communication between people and things and things themselves. In this paper, we assume that all the communication channels among Tag, Reader, and Server are insecure. We implement a TTP (Trust-Third-Party) based key management protocol to construct a secure session key among the tag, reader and server to construct a security Mobile RFID (Radio Frequency Identification) service based on the IOT(Internet of Things). A smart mobile phone with a RFID reader can provide Mobile RFID (MRFID) services based on RFID tagged objects. While the mobile RFID system has many advantages, the privacy violation problems at reader side, consumer tracking with malicious purpose and the sensitive information transmission problems among Tag, Reader and Server, are deeply concerned by individuals and scholars. The proposed idea is security and efficiency and supply three advantages for a secure IOT architecture. Keywords: The Internet of Things, Key Management Protocol, Trust Third Party, RFID, Mobile RFID, RFID Security.

1 Introduction The Internet of Things (IOT) is a technological phenomenon originating from innovative developments and concepts in information and communication technology associated with: 1) Ubiquitous Communication/Connectivity, 2) Pervasive Computing and Ambient Intelligence. These concepts have a strong impact on the development of the IOT [1]. Ubiquitous Communication means the general ability of objects to communicate (anywhere and anytime). Pervasive Computing means the enhancement of objects with processing power (the environment around us becomes the computer). Ambient Intelligence means the capability of objects to register changes in the physical environment and thus actively interact in a process. Typically, objects fulfilling these H. Tan (Ed.): Knowledge Discovery and Data Mining, AISC 135, pp. 201–208. springerlink.com © Springer-Verlag Berlin Heidelberg 2012

202

T. Yan and Q. Wen

requirements are called “smart objects” [2]. Hence, the IOT is defined as the ability of smart objects to communicate among each other and building networks of things, the Internet of Things. There are also some other explanation of the IOT is that the world’s objects build a dynamic network which is connected by the Internet and sometimes designated as the network of networks. The key players in enabling the IOT are smart objects, which are characterized by four technological attributes: • • • •

Identification Location Sensing Connectivity

Furthermore, smart objects can be active (local decision making is possible) or passive (sensor data is stored and can be read out–no local decision making is possible). The major enabling technologies for smart object