Implementation Of An Efficient Security Scheme Through Elliptic Curve Cryptography Based Radio-Frequency Identification(RFID) In Context Of Internet Of Things

IOT becomes a revolutionary transformation in our future digital world. Impact of rapid growth and real adaption of IOT touches day by day every ones life. IOT platform where every day a large no of physical objects are connected with others through internet and each objects have a unique identification to other devices. We are gifted from IOT generation as smart cities , smart homes, smart devices, parking sensors, real time medical data prediction in health care application and many mores. But the major concerns of IOT platform are privacy concerns, insecure update, week encryption technique. poor passwords and some UI based vulnerabilities.. We have discussed about Radio Frequency Identification (RFID) under IOT environment where large amount of data are in open communication without proper authentication . Some widely used cryptographic algorithm already have used in IOT platform. For last few years , lots of attention of researcher to optimize size and power consumption of IOT devices which finds an efficient authentication scheme with minimum computational complexity. In this paper we have proposed a Elliptic curve Cryptography based RFID scheme for IOT platform.

[1]  Bappaditya Jana,et al.  A novel scheme to detect and remove black hole attack in cognitive radio vehicular ad hoc networks(CR-VANETs) , 2016, 2016 International Conference on Computer, Electrical & Communication Engineering (ICCECE).

[2]  Bappaditya Jana,et al.  A Hybrid Task Scheduling Approach Based on Genetic Algorithm and Particle Swarm Optimization Technique in Cloud Environment , 2018 .

[3]  Simson L. Garfinkel,et al.  RFID privacy: an overview of problems and proposed solutions , 2005, IEEE Security & Privacy Magazine.

[4]  Ronald L. Rivest,et al.  The blocker tag: selective blocking of RFID tags for consumer privacy , 2003, CCS '03.

[5]  Rajashree V Biradar,et al.  Classification and Comparison of Routing Protocols in Wireless Sensor Networks , 2009 .

[6]  Bappaditya Jana,et al.  A multilevel encryption technique in cloud security , 2017, 2017 7th International Conference on Communication Systems and Network Technologies (CSNT).

[7]  Bappaditya Jana,et al.  A performance analysis on elliptic curve cryptography in network security , 2016, 2016 International Conference on Computer, Electrical & Communication Engineering (ICCECE).

[8]  Tae Hwan Oh,et al.  RFID Implementation and Security Issues , 2011, ISA.

[9]  Ozgur B. Akan,et al.  Millimetre wave communication for 5G IoT applications , 2016 .

[10]  Bappaditya Jana,et al.  Quantum cryptography: Overview, security issues and future challenges , 2017, 2017 4th International Conference on Opto-Electronics and Applied Optics (Optronix).

[11]  Narendran Rajagopalan,et al.  Internet of Things: A Survey on IoT Protocol Standards , 2018 .

[12]  Era Johri,et al.  Home Automation Using Internet of Things (IoT) for Smart Cities , 2018 .

[13]  Thorsten Wild,et al.  Waveform contenders for 5G — OFDM vs. FBMC vs. UFMC , 2014, 2014 6th International Symposium on Communications, Control and Signal Processing (ISCCSP).

[14]  Felix Wortmann,et al.  Internet of Things , 2015, Business & Information Systems Engineering.

[15]  Prashant Krishnamurthy,et al.  Modeling of indoor positioning systems based on location fingerprinting , 2004, IEEE INFOCOM 2004.

[16]  Jorge Sá Silva,et al.  Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues , 2015, IEEE Communications Surveys & Tutorials.

[17]  Christof Paar,et al.  RFID. Security and Privacy , 2011, Lecture Notes in Computer Science.

[18]  Jolly Soparia,et al.  A Survey on Comparative Study of Wireless Sensor Network Topologies , 2014 .

[19]  Yang Xiao,et al.  Security and privacy in RFID and applications in telemedicine , 2006, IEEE Commun. Mag..

[20]  Chao Yang,et al.  A Research on Issues Related to RFID Security and Privacy , 2007, I3E.

[21]  Chih-Ming Hsiao,et al.  A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol , 2014, Ad Hoc Networks.

[22]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.

[23]  XU Chen-guang The Effect of Social Technology on the Development of the Internet of Things , 2011 .

[24]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[25]  Rönne Reimann,et al.  Locating Technology for AAL Applications with Direction Finding and Distance Measurement by Narrow Bandwidth Phase Analysis , 2012, EvAAL.

[26]  George Mastorakis,et al.  On the Track of 5G Radio Access Network for IoT Wireless Spectrum Sharing in Device Positioning Applications , 2016 .

[27]  Grzegorz Kolaczek,et al.  RFID Security: A Method for Tracking Prevention , 2016, ISCIS.

[28]  Wei Han Research of Intelligent Campus System Based on IOT , 2011 .

[29]  Marek Klonowski,et al.  Privacy Protection for RFID with Hidden Subset Identifiers , 2008, Pervasive.

[30]  James A. Thom,et al.  Cloud Computing Security: From Single to Multi-clouds , 2012, 2012 45th Hawaii International Conference on System Sciences.