The Internet of Things: Perspectives on Security from RFID and WSN
Shah, Ayush; Pal, Ambar; Acharya, H. B.;
Subject: Computer Science - Networking and Internet Architecture | Computer Science - Cryptography and Security
A massive current research effort focuses on combining pre-existing 'Intranets' of Things into one Internet of Things. However, this unification is not a panacea; it will expose new attack surfaces and vectors, just as it enables new applications. We therefore urgently ... View more
 Rakesh Agrawal, Jerry Kiernan, Ramakrishnan Srikant, and Yirong Xu. Hippocratic databases. In Proceedings of the 28th international conference on Very Large Data Bases, pages 143-154. VLDB Endowment, 2002.
 Ross Anderson and Markus Kuhn. Low cost attacks on tamper resistant devices. In Security Protocols, pages 125-136. Springer, 1998.
 Gildas Avoine and Philippe Oechslin. A scalable and provably secure hash-based rfid protocol. In Pervasive Computing and Communications Workshops, 2005. PerCom 2005 Workshops. Third IEEE International Conference on, pages 110-114. IEEE, 2005.
 Lejla Batina, Jorge Guajardo, Tim Kerins, Nele Mentens, Pim Tuyls, and Ingrid Verbauwhede. An elliptic curve processor suitable for rfid-tags. IACR Cryptology ePrint Archive, 2006:227, 2006.
 Levente Buttya´n, Tama´s Holczer, and Istva´n Vajda. Optimal key-trees for tree-based private authentication. In Privacy Enhancing Technologies, pages 332-350. Springer, 2006.
 Bogdan Carbunar, Yang Yu, Weidong Shi, Michael Pearce, and Venu Vasudevan. Query privacy in wireless sensor networks. ACM Transactions on Sensor Networks (TOSN), 6(2):14, 2010.
 Haowen Chan, Adrian Perrig, and Dawn Song. Random key predistribution schemes for sensor networks. In Security and Privacy, 2003. Proceedings. 2003 Symposium on, pages 197-213. IEEE, 2003.
 Hung-Yu Chien and Che-Hao Chen. Mutual authentication protocol for rfid conforming to epc class 1 generation 2 standards. Computer Standards & Interfaces, 29(2):254-259, 2007.
 Taehwan Choi, Hrishikesh B Acharya, and Mohamed G Gouda. The best keying protocol for sensor networks. Pervasive and Mobile Computing, 9(4):564-571, 2013.
 Jolyon Clulow, Gerhard P Hancke, Markus G Kuhn, and Tyler Moore. So near and yet so far: Distance-bounding attacks in wireless networks. In Security and Privacy in Ad-Hoc and Sensor Networks, pages 83-97. Springer, 2006.