Abstract
With the rapid development of the RFID systems in the Internet of Things, many significant security concerns have been raised. This paper proposes a new Secure Data Exchange Protocol. This protocol combines Hash and stream cipher encryption algorithms. The analysis shows that this protocol involves no computationally intensive cryptographic operations and relatively little storage.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Juels, A.: Minimalist cryptography for RFID tags. Sec. Commun. Netw., SCN (2004)
Sarma, S., Weis, S., Engels, D.: RFID Systems and Security and Privacy Implications. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 454–469. Springer, Heidelberg (2003)
Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 201–212. Springer, Heidelberg (2004)
Avoine, G., Oechslin, P.: A Scalable and Provably Secure Hash Based RFID Protocol. In: The 2nd IEEE Internationall Workshop on Pervasive Computing and Communication Security (PerSec), pp. 125–140 (2005)
Zeng, L., Xiong, Z., Zhang, T.: Key Value Renewal Random Hash Lock for Security and Privacy Enhancement of RFID. Computer Engineering 33, 151–153 (2007)
Chen, S., Chen, R., Ling, L.: An Improved Hash-Based RFID Two-Way Security Authentication Algorithm. Computer Systems & Applications 19, 67–70 (2010)
Zhao, L., Zhang, A.: The Study and Design of Stream Ciphers based on the Linear Feedback Shift Register. Southwest Jiaotong University, pp. 19–42 (2006)
Luo, Q., Zhang, J.: Status Quo and Development of Stream Cipher. Information and Electronic Engineering 4, 75–80 (2006)
Li, Z., Lu, G., Xin, Y.: Application of Re-encryption Technology in RFID Security. Computer Engineering 34, 160–162 (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zhang, Y., Bo, L., Ma, Q. (2012). A Secure Data Exchange Protocol for the Internet of Things. In: Khachidze, V., Wang, T., Siddiqui, S., Liu, V., Cappuccio, S., Lim, A. (eds) Contemporary Research on E-business Technology and Strategy. iCETS 2012. Communications in Computer and Information Science, vol 332. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34447-3_20
Download citation
DOI: https://doi.org/10.1007/978-3-642-34447-3_20
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-34446-6
Online ISBN: 978-3-642-34447-3
eBook Packages: Computer ScienceComputer Science (R0)