The Internet of Things: Perspectives on Security from RFID and WSN

Preprint English OPEN
Shah, Ayush; Pal, Ambar; Acharya, H. B.;
  • Subject: Computer Science - Networking and Internet Architecture | Computer Science - Cryptography and Security

A massive current research effort focuses on combining pre-existing 'Intranets' of Things into one Internet of Things. However, this unification is not a panacea; it will expose new attack surfaces and vectors, just as it enables new applications. We therefore urgently ... View more
  • References (63)
    63 references, page 1 of 7

    [1] Rakesh Agrawal, Jerry Kiernan, Ramakrishnan Srikant, and Yirong Xu. Hippocratic databases. In Proceedings of the 28th international conference on Very Large Data Bases, pages 143-154. VLDB Endowment, 2002.

    [2] Ross Anderson and Markus Kuhn. Low cost attacks on tamper resistant devices. In Security Protocols, pages 125-136. Springer, 1998.

    [3] Gildas Avoine and Philippe Oechslin. A scalable and provably secure hash-based rfid protocol. In Pervasive Computing and Communications Workshops, 2005. PerCom 2005 Workshops. Third IEEE International Conference on, pages 110-114. IEEE, 2005.

    [4] Lejla Batina, Jorge Guajardo, Tim Kerins, Nele Mentens, Pim Tuyls, and Ingrid Verbauwhede. An elliptic curve processor suitable for rfid-tags. IACR Cryptology ePrint Archive, 2006:227, 2006.

    [5] Levente Buttya´n, Tama´s Holczer, and Istva´n Vajda. Optimal key-trees for tree-based private authentication. In Privacy Enhancing Technologies, pages 332-350. Springer, 2006.

    [6] Bogdan Carbunar, Yang Yu, Weidong Shi, Michael Pearce, and Venu Vasudevan. Query privacy in wireless sensor networks. ACM Transactions on Sensor Networks (TOSN), 6(2):14, 2010.

    [7] Haowen Chan, Adrian Perrig, and Dawn Song. Random key predistribution schemes for sensor networks. In Security and Privacy, 2003. Proceedings. 2003 Symposium on, pages 197-213. IEEE, 2003.

    [8] Hung-Yu Chien and Che-Hao Chen. Mutual authentication protocol for rfid conforming to epc class 1 generation 2 standards. Computer Standards & Interfaces, 29(2):254-259, 2007.

    [9] Taehwan Choi, Hrishikesh B Acharya, and Mohamed G Gouda. The best keying protocol for sensor networks. Pervasive and Mobile Computing, 9(4):564-571, 2013.

    [10] Jolyon Clulow, Gerhard P Hancke, Markus G Kuhn, and Tyler Moore. So near and yet so far: Distance-bounding attacks in wireless networks. In Security and Privacy in Ad-Hoc and Sensor Networks, pages 83-97. Springer, 2006.

  • Metrics
    No metrics available
Share - Bookmark