An Anonymity and Authentication Mechanism for Internet of Things

Authentication has received increasing attention in the literatures of Internet of Things. At the same time, numerous concerns have been raised about the issue of anonymity due to users’ awareness of their privacy nowadays. How to achieve trade-off between anonymity and certification simultaneously? In this paper, we propose a security architecture to ensure anonymity and certification for Internet of Things. We use pseudonym and threshold secret sharing approach to resolve conflict between anonymity and certification. Moreover, the implementation of Bloom filter offers security authentication for remote command. Security analysis shows that the proposed mechanism can perfectly achieve tradeoff between anonymity, certification, and also resist impersonation, tamper as well as compromise attacks.

[1]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[2]  John Bloom,et al.  A modular approach to key safeguarding , 1983, IEEE Trans. Inf. Theory.

[3]  Dong Wang,et al.  Impact of RFID Technology on Tracking of Export Goods in Kenya , 2010, J. Convergence Inf. Technol..

[4]  G. R. BLAKLEY Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).

[5]  Srijith Krishnan Nair,et al.  Self Managed Security Cell, a Security Model for the Internet of Things and Services , 2009, 2009 First International Conference on Advances in Future Internet.

[6]  Holger Ziekow In-Network Event Processing in a Peer to Peer Broker Network for the Internet of Things , 2007, OTM Workshops.

[7]  Yuanbo Guo,et al.  Security Improvement in Authentication Protocol for Gen-2 Based RFID System , 2011 .

[8]  Marit Hansen,et al.  Privacy-enhancing identity management , 2004, Inf. Secur. Tech. Rep..

[9]  Jaemin Park,et al.  A Practical Approach for Enhancing Security of EPCglobal RFID Gen2 Tag , 2007, Future Generation Communication and Networking (FGCN 2007).

[10]  Ari Juels,et al.  RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.

[11]  Oliver Günther,et al.  Distributed ONS and its Impact on Privacy , 2007, 2007 IEEE International Conference on Communications.

[12]  Amardeo Sarma,et al.  Identities in the Future Internet of Things , 2009, Wirel. Pers. Commun..

[13]  J. Mitsugi,et al.  A Tamper Detection Method for RFID Tag Data , 2008, 2008 IEEE International Conference on RFID.

[14]  Christian Floerkemeier,et al.  RFID Application Development With the Accada Middleware Platform , 2007, IEEE Systems Journal.

[15]  Sébastien Canard,et al.  Low-Cost Cryptography for Privacy in RFID Systems , 2006, CARDIS.

[16]  Ehud D. Karnin,et al.  On secret sharing systems , 1983, IEEE Trans. Inf. Theory.

[17]  Dong Hoon Lee,et al.  Anti-cloning protocol suitable to EPCglobal Class-1 Generation-2 RFID systems , 2009, Comput. Stand. Interfaces.

[18]  Vladimir Oleshchuk,et al.  Internet of things and privacy preserving technologies , 2009, 2009 1st International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology.

[19]  Dong Wang,et al.  Use of RFID for Intelligent Pre-shipment Inspection , 2010, J. Digit. Content Technol. its Appl..

[20]  Olivier Savry,et al.  Security and Privacy Protection of Contactless Devices , 2010 .

[21]  Sandra Dominikus,et al.  Strong Authentication for RFID Systems Using the AES Algorithm , 2004, CHES.