You are not logged in.

Scalable RFID security framework and protocol supporting Internet of Things

Ray, BR, Abawajy, J and Chowdhury, M 2014, Scalable RFID security framework and protocol supporting Internet of Things, Computer Networks, vol. 67, pp. 89-103, doi: 10.1016/j.comnet.2014.03.023.

Attached Files
Name Description MIMEType Size Downloads

Title Scalable RFID security framework and protocol supporting Internet of Things
Author(s) Ray, BR
Abawajy, J
Chowdhury, MORCID iD for Chowdhury, M orcid.org/0000-0002-2866-4955
Journal name Computer Networks
Volume number 67
Start page 89
End page 103
Total pages 15
Publisher Elsevier
Place of publication Amsterdam, The Netherlands
Publication date 2014-07-04
ISSN 1389-1286
Keyword(s) Authentication
Internet of Things
Malware
RFID
Security framework
Security protocol
Science & Technology
Technology
Computer Science, Hardware & Architecture
Computer Science, Information Systems
Engineering, Electrical & Electronic
Telecommunications
Computer Science
Engineering
IDENTIFICATION
Summary Radio-frequency identification (RFID) is seen as one of the requirements for the implementation of the Internet-of-Things (IoT). However, an RFID system has to be equipped with a holistic security framework for a secure and scalable operation. Although much work has been done to provide privacy and anonymity, little focus has been given to performance, scalability and customizability issues to support robust implementation of IoT. Also, existing protocols suffer from a number of deficiencies such as insecure or inefficient identification techniques, throughput delay and inadaptability. In this paper, we propose a novel identification technique based on a hybrid approach (group-based approach and collaborative approach) and security check handoff (SCH) for RFID systems with mobility. The proposed protocol provides customizability and adaptability as well as ensuring the secure and scalable deployment of an RFID system to support a robust distributed structure such as the IoT. The protocol has an extra fold of protection against malware using an incorporated malware detection technique. We evaluated the protocol using a randomness battery test and the results show that the protocol offers better security, scalability and customizability than the existing protocols. © 2014 Elsevier B.V. All rights reserved.
Language eng
DOI 10.1016/j.comnet.2014.03.023
Field of Research 080501 Distributed and Grid Systems
Socio Economic Objective 890103 Mobile Data Networks and Services
HERDC Research category C1 Refereed article in a scholarly journal
Copyright notice ©2014, Elsevier
Persistent URL http://hdl.handle.net/10536/DRO/DU:30068202

Document type: Journal Article
Collection: School of Information Technology
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Versions
Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 16 times in TR Web of Science
Scopus Citation Count Cited 21 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 282 Abstract Views, 1 File Downloads  -  Detailed Statistics
Created: Fri, 12 Dec 2014, 11:23:49 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.