دانلود رایگان مقاله پروتکل RFID انتقال مالکیت بر اساس ابر

عنوان فارسی
پروتکل RFID انتقال مالکیت بر اساس ابر
عنوان انگلیسی
RFID ownership transfer protocol based on cloud
صفحات مقاله فارسی
0
صفحات مقاله انگلیسی
13
سال انتشار
2016
نشریه
الزویر - Elsevier
فرمت مقاله انگلیسی
PDF
کد محصول
E922
رشته های مرتبط با این مقاله
مهندسی کامپیوتر و مهندسی فناوری اطلاعات
گرایش های مرتبط با این مقاله
شبکه های کامپیوتری
مجله
شبکه های کامپیوتر - Computer Networks
دانشگاه
دانشکده علوم کامپیوتر و فناوری، دانشگاه معدن و فن آوری چین
کلمات کلیدی
RFID، اینترنت اشیا، عدم قابلیت ردیابی به عقب؛ عدم ردیابی قوی به جلو
چکیده

abstract


RFID and Cloud computing are widely used in the IoT (Internet of Things). However, there are few research works which combine RFID ownership transfer schemes with Cloud computing. Subsequently, this paper points out the weaknesses in two protocols proposed by Xie et al. (2013) [3] and Doss et al. (2013) [9]. To solve the security issues of these protocols, we present a provably secure RFID ownership transfer protocol which achieves the security and privacy requirements for cloud-based applications. To be more specific, the communication channels among the tags, mobile readers and the cloud database are insecure. Besides, an encrypted hash table is used in the cloud database. Next, the presented protocol not only meets backward untraceability and the proposed strong forward untraceability, but also resists against replay attacks, tracing attacks, inner reader malicious impersonation attacks, tag impersonation attacks and desynchronization attacks. The comparisons of security and performance properties show that the proposed protocol has more security, higher efficiency and better scalability compared with other schemes.

نتیجه گیری

7. Conclusions


Existing RFID protocols are inapplicable to ownership transfer and cloud-based applications, since they do not meet the primary requirements. Moreover, in order to support mobile, remote and cloud-platform data access, the proposed CROP scheme integrates cloud service and quadratic residue mechanisms to provide backward untraceablity, forward untraceablity and strong forward untraceablity properties. The ownership transfer scheme in the cloud platform is expected to be applied in a variety of applications. In the future, we will optimize the performance (authentication effi- ciency) by reducing the number of hash computations in the DB, integrate more practical features for supply chain management, and explore the simulation of the real experiment. The open issues include energy-efficient data processing in supply chain management, software infrastructures for supporting IoT and interaction models for hand-held and mobile devices.


بدون دیدگاه