Abstract
This paper concentrates in the privacy protection in Internet of things. It firstly focuses on the security issues and attack risks of Internet of things from four aspects, which are perception layer, transport layer, application layer and the integrated networking system. And it puts forward some proposals on wireless sensor network and RFID (Radio Frequency Identification) security system structure. The researches are theoretical basis in security defense of Internet of things. Furthermore, in order to reduce the security risks in Internet of things communication process, this paper puts forward key-changed mutual authentication protocol. The protocol integrates random number generator in the tag and reader, and adopts the one-way Hash function, key refresh in real time, key backup and other mechanisms. The analysis shows that this protocol is able to be well applied to low cost Internet of things system and effectively prevent the network from replay, replication, denial of service, spoofing and tag tracking attacks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Sharma, S., Sahu, A., Verma, A., et al.: Wireless Sensor Network Security. In: Second International Conference Computer Science and Information Technology (CCSIT 2012), pp. 317–326 (2012)
Li, P., Wang, R., Zhou, Y., Dai, Q.: Research on Network Malicious Code Dendritic Cell Immune Algorithm Based on Fuzzy Weighted Support Vector Machine. In: Wang, R., Xiao, F. (eds.) CWSN 2012. CCIS, vol. 334, pp. 181–190. Springer, Heidelberg (2013)
Sakthidharan, G.R., Chitra, S.: A survey on wireless sensor network: An application perspective. In: 2012 International Conference on Computer Communication and Informatics, pp. 1–5 (2012)
Oh, S.Y., Cornell, B., Smith, D., et al.: Rapid detection of influenza A virus in clinical samples using an ion channel switch biosensor. Biosensors and Bioelectronics 23(7), 1161–1165 (2008)
Peng, S.C.: A Survey on Malware Containment Models in Smartphones. Applied Mechanics and Materials 263, 3005–3011 (2013)
Menahem, E., Shabtai, A., Rokach, L., et al.: Improving malware detection by applying multi-inducer ensemble. Computational Statistics and Data Analysis 53(4), 1483–1494 (2009)
Gao, F., Hu, Z.H.: The Security Mechanism for Wireless Sensor Networks. Applied Mechanics and Materials 256, 2392–2395 (2013)
Holm, H., Sommestad, T., Almroth, J., et al.: A quantitative evaluation of vulnerability scanning. Information Management and Computer Security 19(4), 231–247 (2011)
Shaila, K., et al.: Mobile node authentication using key distribution scheme in wireless sensor networks. International Journal of Ad Hoc and Ubiquitous Computing 12(1), 34–45 (2013)
Jain, P., Goyal, S.: An Adaptive Intrusion Prevention System Based on Immunity. In: International Conference on Advances in Computing, Control, and Telecommunication Technologies, Trivandrum, Kerala, India, pp. 759–763. IEEE, Piscataway (2009)
Sun, F.X.: A Danger Theory Inspired Security Evaluation Paradigm for Computer Network. Advanced Materials Research 179(1), 1333–1337 (2011)
Folcik, V.A., Broderick, G., Mohan, S., et al.: Using an agent-based model to analyze the dynamic communication network of the immune response. Theoretical Biology and Medical Modelling 8(1), 1–25 (2011)
Nohl, K., Evans, D., Starbug, Plotz, H.: Reverse-Engineering a Cryptographic RFID Tag. In: USENIC Security Symposium, pp. 185–194. USENIC Association (2008)
Chang, Z.-H.: Research of RFID Privacy Protection Authentication Protocol and Application. The PLA Information Engineering University, Henan (2008)
Ohkubo, M., Suzuki, K., Kinoshita, S.: Hash-chain based Forward-Secure Privacy Protection Scheme for Low-cost RFID. In: Proceedings of the 2004 Symposium on Cryptography and Information Security (SCIS 2004) (2004)
Henrici, D., Muller, P.: Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers. In: Proceedings of the 2nd IEEE Annual Conference on Pervasive Computing and Communications Workshops (PERCOMW 2004), Washington, DC, USA, pp. 149–153 (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Peng, L., Ru-chuan, W., Xiao-yu, S., Long, C. (2014). Privacy Protection Based on Key-changed Mutual Authentication Protocol in Internet of Things. In: Sun, L., Ma, H., Hong, F. (eds) Advances in Wireless Sensor Networks. CWSN 2013. Communications in Computer and Information Science, vol 418. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-54522-1_34
Download citation
DOI: https://doi.org/10.1007/978-3-642-54522-1_34
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-54521-4
Online ISBN: 978-3-642-54522-1
eBook Packages: Computer ScienceComputer Science (R0)