Skip to main content

A Trial of Yoking-Proof Protocol in RFID-based Smart-Home Environment

  • Conference paper
  • First Online:
Distributed Computer and Communication Networks (DCCN 2016)

Abstract

Owing to significant progress in the Internet of Things (IoT) within both academia and industry, this breakthrough technology is increasingly penetrating our everyday lives. However, the levels of user adoption and business revenue are still lagging behind the original expectations. The reasons include strong security and privacy concerns behind the IoT, which become critically important in the smart home environment. Our envisioned smart home scenario comprises a variety of sensors, actuators, and end-user devices interacting and sharing data securely. Correspondingly, we aim at investigating and verifying in practice the Yoking-proof protocol, which is a multi-factor authentication solution for smart home systems with an emphasis on data confidentiality and mutual authentication. Our international team conducted a large trial featuring the Yoking-proof protocol, RFID technology, as well as various sensors and user terminals. This paper outlines the essentials of this trial, reports on our practical experience, and summarizes the main lessons learned.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    See Cottonwood: USB Long Range UHF RFID reader, 2016 http://store.linksprite.com/cottonwood-usb-long-range-uhf-rfid-reader-iso18000-6c-epc-g2/.

  2. 2.

    See a showcase video capturing the functionality of our utilized testbed: https://www.youtube.com/watch?v=zDP2MpO0YHY.

References

  1. Atzori, L., Iera, A., Morabito, G.: The Internet of Things: a survey. Comput. Netw. 54(15), 2787–2805 (2010)

    Article  MATH  Google Scholar 

  2. Cisco, Cisco Visual Networking Index, Global mobile data traffic forecast update, 2015–2020, White paper, 2016

    Google Scholar 

  3. Perera, C., Liu, C.H., Jayawardena, S.: The emerging Internet of Things marketplace from an industrial perspective: a survey. IEEE Trans. Emerg. Top. Comput. 3(4), 585–598 (2015)

    Article  Google Scholar 

  4. Vishnevsky, V.M., Larionov, A.: Design concepts of an application platform for traffic law enforcement and vehicles registration comprising RFID technology. In: Proceedings of IEEE International Conference on RFID-Technologies and Applications (RFID-TA), pp. 148–153. IEEE (2012)

    Google Scholar 

  5. Vishnevsky, V., Kozyrev, D., Rykov, V.: New generation of safety systems for automobile traffic control using RFID technology and broadband wireless communication. In: Vishnevsky, V., Kozyrev, D., Larionov, A. (eds.) DCCN 2013. CCIS, vol. 279, pp. 145–153. Springer, Heidelberg (2014). doi:10.1007/978-3-319-05209-0_13

    Chapter  Google Scholar 

  6. Miori, V., Russo, D.: Home automation devices belong to the IoT world. ERCIM News 101, 22–23 (2015)

    Google Scholar 

  7. Vishnevsky, V.M., Larionov, A., Ivanov, R.: Architecture of application platform for RFID-enabled traffic law enforcement system. In: Proceedings of 7th International Workshop on Communication Technologies for Vehicles (Nets4Cars-Fall), pp. 45–49. IEEE (2014)

    Google Scholar 

  8. Komninos, N., Philippou, E., Pitsillides, A.: Survey in smart grid and smart home security: issues, challenges and countermeasures. IEEE Commun. Surv. Tutorials 16(4), 1933–1954 (2014)

    Article  Google Scholar 

  9. Hosek, J., Masek, P., Kovac, D., Ries, M., Kröpfl, F.: IP home gateway as universal multi-purpose enabler for smart home services. e & i Elektrotechnik und Informationstechnik 131(4–5), 123–128 (2014)

    Article  Google Scholar 

  10. He, D., Zeadally, S.: An analysis of RFID authentication schemes for Internet of Things in healthcare environment using elliptic curve cryptography. IEEE Internet Things J. 2(1), 72–83 (2015)

    Article  Google Scholar 

  11. Yu, Y.-C., Hou, T.-W., Chiang, T.-C.: Low cost RFID real lightweight binding proof protocol for medication errors and patient safety. J. Med. Syst. 36(2), 823–828 (2012)

    Article  Google Scholar 

  12. Ning, H., Liu, H., Yang, L.T.: Aggregated-proof based hierarchical authentication scheme for the Internet of Things. IEEE Trans. Parallel Distrib. Syst. 26(3), 657–667 (2015)

    Article  Google Scholar 

  13. Ramsey, B.W., Temple, M.A., Mullins, B.E.: PHY foundation for multi-factor ZigBee node authentication. In: Proceedings of IEEE Global Communications Conference (GLOBECOM), pp. 795–800. IEEE (2012)

    Google Scholar 

  14. Juels, A.: ‘Yoking-proofs’ for RFID tags. In: Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops, pp. 138–143. IEEE (2004)

    Google Scholar 

  15. Saito, J., Sakurai, K.: Grouping proof for RFID tags. In: Proceedings of 19th International Conference on Advanced Information Networking and Applications (AINA 2005) Volume 1 (AINA papers), vol. 2, pp. 621–624. IEEE (2005)

    Google Scholar 

  16. Nuamcherm, T., Kovintavewat, P., Tantibundhit, C., Ketprom, U., Mitrpant, C.: An improved proof for RFID tags. In: Proceedings of 5th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON), vol. 2, pp. 737–740. IEEE (2008)

    Google Scholar 

  17. Chen, C.-L., Wu, C.-Y.: An RFID system yoking-proof protocol conforming to EPCglobal C1G2 standards. Secur. Commun. Netw. 7(12), 2527–2541 (2014)

    Article  Google Scholar 

  18. Masek, P., Hosek, J., Zeman, K., Stusek, M., Kovac, D., Cika, P., Masek, J., Andreev, S., Kröpfl, F.: Implementation of true IoT vision: survey on enabling protocols and hands-on experience. Int. J. Distrib. Sens. Netw. 2016 (2016)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sergey Andreev .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing AG

About this paper

Cite this paper

Prudanov, A. et al. (2016). A Trial of Yoking-Proof Protocol in RFID-based Smart-Home Environment. In: Vishnevskiy, V., Samouylov, K., Kozyrev, D. (eds) Distributed Computer and Communication Networks. DCCN 2016. Communications in Computer and Information Science, vol 678. Springer, Cham. https://doi.org/10.1007/978-3-319-51917-3_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-51917-3_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-51916-6

  • Online ISBN: 978-3-319-51917-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics