Study of Recent Development about Privacy and Security of the Internet of Things

This paper depicts the current situation of the development of the Internet of Things(IoT). RFID system is vulnerable to various attacks, because there is no physical or visible contact in its communication process. The research on security and privacy domain also increasingly causes the attention of academia. And this paper is mainly underlined that security and privacy issues exist ubiquitously, these problems are not completely solved until now. In succession, different approaches recently been proposed to address security and privacy issues are discussed and analysised specifically in the world of the Internet of Things. Meanwhile, the challenges and future trends of the IoT are also mentioned.

[1]  Xu Jin Anti-collision Algorithm for RFID System , 2009 .

[2]  Joongheon Kim,et al.  Weighted Localized Clustering: A Coverage-Aware Reader Collision Arbitration Protocol in RFID Networks , 2005, ICESS.

[3]  Yunhao Liu,et al.  Randomizing RFID private authentication , 2009, 2009 IEEE International Conference on Pervasive Computing and Communications.

[4]  Jong Hyuk Park,et al.  Distributed Tag Access with Collision-Avoidance among Mobile RFID Readers , 2009, 2009 International Conference on Computational Science and Engineering.

[5]  Chae-Woo Lee,et al.  AN ENHANCED COLORWAVE READER ANTI-COLLISION ALGORITHM IN RFID SYSTEM , 2006 .

[6]  Joongheon Kim,et al.  Effect of localized optimal clustering for reader anti-collision in RFID networks: fairness aspects to the readers , 2005, Proceedings. 14th International Conference on Computer Communications and Networks, 2005. ICCCN 2005..

[7]  Máire O'Neill,et al.  Low-cost digital signature architecture suitable for radio frequency identification tags , 2010, IET Comput. Digit. Tech..

[8]  Ming-Hour Yang,et al.  Authentication Protocol in Mobile RFID Network , 2009, 2009 Fourth International Conference on Systems.

[9]  Rasool Jalili,et al.  AFMAP: Anonymous Forward-Secure Mutual Authentication Protocols for RFID Systems , 2009, 2009 Third International Conference on Emerging Security Information, Systems and Technologies.

[10]  Benjamin C. M. Fung,et al.  Preserving RFID data privacy , 2009, 2009 IEEE International Conference on RFID.

[11]  Vladimir Oleshchuk,et al.  Internet of things and privacy preserving technologies , 2009, 2009 1st International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology.

[12]  Yuping Zhao,et al.  A Novel Solution to the Reader Collision Problem in RFID System , 2006, 2006 International Conference on Wireless Communications, Networking and Mobile Computing.

[13]  Srijith Krishnan Nair,et al.  Self Managed Security Cell, a Security Model for the Internet of Things and Services , 2009, 2009 First International Conference on Advances in Future Internet.

[14]  Qiaoling Tong,et al.  Dynamic Framed Slotted ALOHA Algorithm Based on Bayesian Estimation in RFID System , 2009, 2009 WRI World Congress on Computer Science and Information Engineering.

[15]  Jeong Hyun Yi,et al.  A study of mobile proxy for privacy enhancement , 2010, 2010 Digest of Technical Papers International Conference on Consumer Electronics (ICCE).

[16]  G. Pujolle,et al.  HIP-based RFID Networking Architecture , 2007, 2007 IFIP International Conference on Wireless and Optical Communications Networks.

[17]  Pascal Urien,et al.  HIP-tags architecture implementation for the Internet of things , 2009, 2009 First Asian Himalayas International Conference on Internet.

[18]  Lee Su-Ryun,et al.  An Enhanced Colorwave Reader Anti-collision Algorithm in RFID System , 2006 .

[19]  Kaixing Wu,et al.  A New Energy-Aware Scheme for RFID System Based on ALOHA , 2010, 2010 Second International Conference on Future Networks.

[20]  Daniel W. Engels,et al.  I. Radio-Frequency Identification: Security Risks and Challenges , 2003 .

[21]  Daniel W. Engels,et al.  HiQ: a hierarchical Q-learning algorithm to solve the reader collision problem , 2006, International Symposium on Applications and the Internet Workshops (SAINTW'06).

[22]  Weiming Wu,et al.  Mutual authentication protocol based on tag ID number updating for low-cost RFID , 2009, 2009 IEEE International Conference on Network Infrastructure and Digital Content.

[23]  C. Pepin,et al.  HIP-tags, a new paradigm for the Internet Of Things , 2008, 2008 1st IFIP Wireless Days.

[24]  Ronald L. Rivest,et al.  The blocker tag: selective blocking of RFID tags for consumer privacy , 2003, CCS '03.

[25]  Mostafa Salah,et al.  Parallel binary tree splitting protocol for tag anti-collision in RFID systems , 2009, 2009 4th International Design and Test Workshop (IDT).

[26]  Y.-C. Lee,et al.  A New Ultralightweight RFID Protocol with Mutual Authentication , 2009, 2009 WASE International Conference on Information Engineering.

[27]  Ronald L. Rivest,et al.  Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems , 2003, SPC.

[28]  Boris Sokolov,et al.  New concept of RFID reader networks structure: hardware and software architecture , 2009, 2009 International Conference on Ultra Modern Telecommunications & Workshops.

[29]  Yuan-Cheng Lai,et al.  General binary tree protocol for coping with the capture effect in RFID tag identification , 2010, IEEE Communications Letters.

[30]  InChan Song,et al.  An Improved Reader Anti-Collision Algorithm Based on Pulse Protocol with Slot Occupied Probability in Dense Reader Mode , 2009, VTC Spring 2009 - IEEE 69th Vehicular Technology Conference.

[31]  Cagatay Karabat A Novel Secure RFID System to Ensure Privacy , 2009, 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[32]  Doo Seop Eom,et al.  DiCa: Distributed Tag Access with Collision-Avoidance Among Mobile RFID Readers , 2006, EUC Workshops.

[33]  Daniel W. Engels,et al.  Colorwave: an anticollision algorithm for the reader collision problem , 2003, IEEE International Conference on Communications, 2003. ICC '03..

[34]  Sridhar Iyer,et al.  PULSE: A MAC Protocol for RFID Networks , 2005, EUC Workshops.

[35]  Frank Yeong-Sung Lin,et al.  A Simulated Annealing Algorithm for RFID Reader Networks , 2007, 2007 IEEE Wireless Communications and Networking Conference.

[36]  Sarah Spiekermann,et al.  Critical RFID Privacy-Enhancing Technologies , 2009, IEEE Security & Privacy.