Skip to main content

A Secure Data Exchange Protocol for the Internet of Things

  • Conference paper
Contemporary Research on E-business Technology and Strategy (iCETS 2012)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 332))

Included in the following conference series:

Abstract

With the rapid development of the RFID systems in the Internet of Things, many significant security concerns have been raised. This paper proposes a new Secure Data Exchange Protocol. This protocol combines Hash and stream cipher encryption algorithms. The analysis shows that this protocol involves no computationally intensive cryptographic operations and relatively little storage.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Juels, A.: Minimalist cryptography for RFID tags. Sec. Commun. Netw., SCN (2004)

    Google Scholar 

  2. Sarma, S., Weis, S., Engels, D.: RFID Systems and Security and Privacy Implications. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 454–469. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  3. Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 201–212. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  4. Avoine, G., Oechslin, P.: A Scalable and Provably Secure Hash Based RFID Protocol. In: The 2nd IEEE Internationall Workshop on Pervasive Computing and Communication Security (PerSec), pp. 125–140 (2005)

    Google Scholar 

  5. Zeng, L., Xiong, Z., Zhang, T.: Key Value Renewal Random Hash Lock for Security and Privacy Enhancement of RFID. Computer Engineering 33, 151–153 (2007)

    Google Scholar 

  6. Chen, S., Chen, R., Ling, L.: An Improved Hash-Based RFID Two-Way Security Authentication Algorithm. Computer Systems & Applications 19, 67–70 (2010)

    Google Scholar 

  7. Zhao, L., Zhang, A.: The Study and Design of Stream Ciphers based on the Linear Feedback Shift Register. Southwest Jiaotong University, pp. 19–42 (2006)

    Google Scholar 

  8. Luo, Q., Zhang, J.: Status Quo and Development of Stream Cipher. Information and Electronic Engineering 4, 75–80 (2006)

    Google Scholar 

  9. Li, Z., Lu, G., Xin, Y.: Application of Re-encryption Technology in RFID Security. Computer Engineering 34, 160–162 (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zhang, Y., Bo, L., Ma, Q. (2012). A Secure Data Exchange Protocol for the Internet of Things. In: Khachidze, V., Wang, T., Siddiqui, S., Liu, V., Cappuccio, S., Lim, A. (eds) Contemporary Research on E-business Technology and Strategy. iCETS 2012. Communications in Computer and Information Science, vol 332. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34447-3_20

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-34447-3_20

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-34446-6

  • Online ISBN: 978-3-642-34447-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics