ترجمه مقاله نقش ضروری ارتباطات 6G با چشم انداز صنعت 4.0
- مبلغ: ۸۶,۰۰۰ تومان
ترجمه مقاله پایداری توسعه شهری، تعدیل ساختار صنعتی و کارایی کاربری زمین
- مبلغ: ۹۱,۰۰۰ تومان
abstract
RFID and Cloud computing are widely used in the IoT (Internet of Things). However, there are few research works which combine RFID ownership transfer schemes with Cloud computing. Subsequently, this paper points out the weaknesses in two protocols proposed by Xie et al. (2013) [3] and Doss et al. (2013) [9]. To solve the security issues of these protocols, we present a provably secure RFID ownership transfer protocol which achieves the security and privacy requirements for cloud-based applications. To be more specific, the communication channels among the tags, mobile readers and the cloud database are insecure. Besides, an encrypted hash table is used in the cloud database. Next, the presented protocol not only meets backward untraceability and the proposed strong forward untraceability, but also resists against replay attacks, tracing attacks, inner reader malicious impersonation attacks, tag impersonation attacks and desynchronization attacks. The comparisons of security and performance properties show that the proposed protocol has more security, higher efficiency and better scalability compared with other schemes.
7. Conclusions
Existing RFID protocols are inapplicable to ownership transfer and cloud-based applications, since they do not meet the primary requirements. Moreover, in order to support mobile, remote and cloud-platform data access, the proposed CROP scheme integrates cloud service and quadratic residue mechanisms to provide backward untraceablity, forward untraceablity and strong forward untraceablity properties. The ownership transfer scheme in the cloud platform is expected to be applied in a variety of applications. In the future, we will optimize the performance (authentication effi- ciency) by reducing the number of hash computations in the DB, integrate more practical features for supply chain management, and explore the simulation of the real experiment. The open issues include energy-efficient data processing in supply chain management, software infrastructures for supporting IoT and interaction models for hand-held and mobile devices.