Skip to main content

Privacy Protection Based on Key-changed Mutual Authentication Protocol in Internet of Things

  • Conference paper
Book cover Advances in Wireless Sensor Networks (CWSN 2013)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 418))

Included in the following conference series:

Abstract

This paper concentrates in the privacy protection in Internet of things. It firstly focuses on the security issues and attack risks of Internet of things from four aspects, which are perception layer, transport layer, application layer and the integrated networking system. And it puts forward some proposals on wireless sensor network and RFID (Radio Frequency Identification) security system structure. The researches are theoretical basis in security defense of Internet of things. Furthermore, in order to reduce the security risks in Internet of things communication process, this paper puts forward key-changed mutual authentication protocol. The protocol integrates random number generator in the tag and reader, and adopts the one-way Hash function, key refresh in real time, key backup and other mechanisms. The analysis shows that this protocol is able to be well applied to low cost Internet of things system and effectively prevent the network from replay, replication, denial of service, spoofing and tag tracking attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Sharma, S., Sahu, A., Verma, A., et al.: Wireless Sensor Network Security. In: Second International Conference Computer Science and Information Technology (CCSIT 2012), pp. 317–326 (2012)

    Google Scholar 

  2. Li, P., Wang, R., Zhou, Y., Dai, Q.: Research on Network Malicious Code Dendritic Cell Immune Algorithm Based on Fuzzy Weighted Support Vector Machine. In: Wang, R., Xiao, F. (eds.) CWSN 2012. CCIS, vol. 334, pp. 181–190. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  3. Sakthidharan, G.R., Chitra, S.: A survey on wireless sensor network: An application perspective. In: 2012 International Conference on Computer Communication and Informatics, pp. 1–5 (2012)

    Google Scholar 

  4. Oh, S.Y., Cornell, B., Smith, D., et al.: Rapid detection of influenza A virus in clinical samples using an ion channel switch biosensor. Biosensors and Bioelectronics 23(7), 1161–1165 (2008)

    Article  Google Scholar 

  5. Peng, S.C.: A Survey on Malware Containment Models in Smartphones. Applied Mechanics and Materials 263, 3005–3011 (2013)

    Google Scholar 

  6. Menahem, E., Shabtai, A., Rokach, L., et al.: Improving malware detection by applying multi-inducer ensemble. Computational Statistics and Data Analysis 53(4), 1483–1494 (2009)

    Article  MATH  MathSciNet  Google Scholar 

  7. Gao, F., Hu, Z.H.: The Security Mechanism for Wireless Sensor Networks. Applied Mechanics and Materials 256, 2392–2395 (2013)

    Google Scholar 

  8. Holm, H., Sommestad, T., Almroth, J., et al.: A quantitative evaluation of vulnerability scanning. Information Management and Computer Security 19(4), 231–247 (2011)

    Article  Google Scholar 

  9. Shaila, K., et al.: Mobile node authentication using key distribution scheme in wireless sensor networks. International Journal of Ad Hoc and Ubiquitous Computing 12(1), 34–45 (2013)

    Article  Google Scholar 

  10. Jain, P., Goyal, S.: An Adaptive Intrusion Prevention System Based on Immunity. In: International Conference on Advances in Computing, Control, and Telecommunication Technologies, Trivandrum, Kerala, India, pp. 759–763. IEEE, Piscataway (2009)

    Chapter  Google Scholar 

  11. Sun, F.X.: A Danger Theory Inspired Security Evaluation Paradigm for Computer Network. Advanced Materials Research 179(1), 1333–1337 (2011)

    Article  Google Scholar 

  12. Folcik, V.A., Broderick, G., Mohan, S., et al.: Using an agent-based model to analyze the dynamic communication network of the immune response. Theoretical Biology and Medical Modelling 8(1), 1–25 (2011)

    Article  Google Scholar 

  13. Nohl, K., Evans, D., Starbug, Plotz, H.: Reverse-Engineering a Cryptographic RFID Tag. In: USENIC Security Symposium, pp. 185–194. USENIC Association (2008)

    Google Scholar 

  14. Chang, Z.-H.: Research of RFID Privacy Protection Authentication Protocol and Application. The PLA Information Engineering University, Henan (2008)

    Google Scholar 

  15. Ohkubo, M., Suzuki, K., Kinoshita, S.: Hash-chain based Forward-Secure Privacy Protection Scheme for Low-cost RFID. In: Proceedings of the 2004 Symposium on Cryptography and Information Security (SCIS 2004) (2004)

    Google Scholar 

  16. Henrici, D., Muller, P.: Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers. In: Proceedings of the 2nd IEEE Annual Conference on Pervasive Computing and Communications Workshops (PERCOMW 2004), Washington, DC, USA, pp. 149–153 (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Peng, L., Ru-chuan, W., Xiao-yu, S., Long, C. (2014). Privacy Protection Based on Key-changed Mutual Authentication Protocol in Internet of Things. In: Sun, L., Ma, H., Hong, F. (eds) Advances in Wireless Sensor Networks. CWSN 2013. Communications in Computer and Information Science, vol 418. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-54522-1_34

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-54522-1_34

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-54521-4

  • Online ISBN: 978-3-642-54522-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics