A Security Information Transmission Scheme for Internet of Things

IoT (Internet of Thing), which is based on the EPCglobal architecture, has information transmission security risks in tag reading and ONS query process. It needs appropriate security scheme to achieve data confidentiality, access control, client privacy protection and other features in order to resist sophisticated attacks. In this paper, a secure transmission scheme without trusted center is discussed and an extension DNS protocol is proposed to enhance the security of ONS query process. In this protocol, designing of multi-KGC center and the application of CL-PKC (certificate less public key cryptography) can not only improve system fault tolerance ability, but also avoids the traditional complicated management of certificates. This paper also studies the implement of our scheme, including query protocols, virtual reader and middleware system.

[1]  Yi Xie,et al.  A security query protocol of ONS in EPC system , 2012, Anti-counterfeiting, Security, and Identification.

[2]  Zhongwen Li,et al.  A secret sharing scheme with general access structures and its applications , 2011 .

[3]  Kwangjo Kim,et al.  Enhancing Security of EPCglobal Gen-2 RFID Tag against Traceability and Cloning , 2006 .

[4]  Li Xiao-cong RFID Authentication Scheme Based on EPC-C1G2 Standard , 2010 .

[5]  Carlo Maria Medaglia,et al.  An Overview of Privacy and Security Issues in the Internet of Things , 2010 .

[6]  Geoff Mulligan,et al.  The Internet of Things: Here Now and Coming Soon , 2010 .

[7]  Zhou Yan,et al.  A Security Transmission Model for Internet of Things , 2011 .

[8]  Baoquan Zhang,et al.  Evaluation on security system of internet of things based on Fuzzy-AHP method , 2011, 2011 International Conference on E-Business and E-Government (ICEE).

[9]  Srijith Krishnan Nair,et al.  Self Managed Security Cell, a Security Model for the Internet of Things and Services , 2009, 2009 First International Conference on Advances in Future Internet.

[10]  Dai Yuxing,et al.  Realization Method of Neural Network Based on Matlab and Linux , 2010 .

[11]  Nie Peng Efficient mutual authentication protocol on EPCglobal Class 1 Gen 2 standard , 2011 .

[12]  Ari Juels,et al.  Strengthening EPC tags against cloning , 2005, WiSe '05.

[13]  Yi Xie,et al.  A secure access control protocol of RFID tags based on EPC C1G2 , 2012, 2012 International Conference on Machine Learning and Cybernetics.

[14]  Jian-Feng Ma,et al.  A Security Transmission Model for Internet of Things: A Security Transmission Model for Internet of Things , 2011 .

[15]  Han He,et al.  Security threats and measures for the Internet of Things , 2011 .