Abstract
In the world envisioned by the Internet of Things (IoT), every object is able to communicate digitally. An important step towards this vision is the use of passive RFID tags. These devices are contactless powered by a reader field and hence do not require a dedicated power source. The corresponding counter-parts to these tags are already integrated in some modern mobile phones. The combination of mobile readers integrated in every-day objects like smart phones and low-cost tags could deliver basic building blocks for a lot of new applications. However, in order to get broad acceptance, the capabilities of such systems in the sense of usability are as important as their security to preserve the privacy of the users. No malicious user should benefit from information that is collected, transferred, or processed. Hence, the user must be able to rely on the protocol as well as on the implementation. In this talk, we discuss potential future developments of the Internet of Things and the requirements regarding security and privacy. Furthermore, we highlight the need for trustworthy implementations and show actual results in this context.
Chapter PDF
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Schmidt, JM. (2011). Secure Implementations for the Internet of Things. In: Joye, M., Mukhopadhyay, D., Tunstall, M. (eds) Security Aspects in Information Technology. InfoSecHiComNet 2011. Lecture Notes in Computer Science, vol 7011. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-24586-2_2
Download citation
DOI: https://doi.org/10.1007/978-3-642-24586-2_2
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-24585-5
Online ISBN: 978-3-642-24586-2
eBook Packages: Computer ScienceComputer Science (R0)