메뉴 건너뛰기




Volumn 3, Issue 4, 2016, Pages 544-553

Secure Object Tracking Protocol for the Internet of Things

Author keywords

Internet of Things (IoT); radio frequency identification (RFID); secure object tracking

Indexed keywords

INTERNET; INTERNET PROTOCOLS; RADIO FREQUENCY IDENTIFICATION (RFID); RADIO WAVES; TRACKING (POSITION);

EID: 84982871211     PISSN: None     EISSN: 23274662     Source Type: Journal    
DOI: 10.1109/JIOT.2016.2572729     Document Type: Article
Times cited : (48)

References (27)
  • 1
    • 84906842496 scopus 로고    scopus 로고
    • Research directions for the Internet of Things
    • Feb.
    • J. A. Stankovic, "Research directions for the Internet of Things," IEEE Internet Things J., vol. 1, no. 1, pp. 3-9, Feb. 2014.
    • (2014) IEEE Internet Things J. , vol.1 , Issue.1 , pp. 3-9
    • Stankovic, J.A.1
  • 2
    • 84906261221 scopus 로고    scopus 로고
    • RFID technology for IoT-based personal healthcare in smart spaces
    • Apr.
    • S. Amendola, R. Lodato, S. Manzari, C. Occhiuzzi, and G. Marrocco, "RFID technology for IoT-based personal healthcare in smart spaces," IEEE Internet Things J., vol. 1, no. 2, pp. 144-152, Apr. 2014.
    • (2014) IEEE Internet Things J. , vol.1 , Issue.2 , pp. 144-152
    • Amendola, S.1    Lodato, R.2    Manzari, S.3    Occhiuzzi, C.4    Marrocco, G.5
  • 3
    • 84961801375 scopus 로고    scopus 로고
    • PRLS-INVES: A general experimental investigation strategy for high accuracy and precision in passive RFID location systems
    • Apr.
    • P. Yang, "PRLS-INVES: A general experimental investigation strategy for high accuracy and precision in passive RFID location systems," IEEE Internet Things J., vol. 2, no. 2, pp. 159-167, Apr. 2015.
    • (2015) IEEE Internet Things J. , vol.2 , Issue.2 , pp. 159-167
    • Yang, P.1
  • 4
    • 84919978090 scopus 로고    scopus 로고
    • Securing the Internet of Things: A standardization perspective
    • Jun.
    • S. L. Keoh, S. S. Kumar, and H. Tschofenig, "Securing the Internet of Things: A standardization perspective," IEEE Internet Things J., vol. 1, no. 3, pp. 265-275, Jun. 2014.
    • (2014) IEEE Internet Things J. , vol.1 , Issue.3 , pp. 265-275
    • Keoh, S.L.1    Kumar, S.S.2    Tschofenig, H.3
  • 5
    • 84962562081 scopus 로고    scopus 로고
    • An analysis of RFID authentication schemes for Internet of things in healthcare environment using elliptic curve cryptography
    • Feb.
    • D. He and S. Zeadally, "An analysis of RFID authentication schemes for Internet of things in healthcare environment using elliptic curve cryptography," IEEE Internet Things J., vol. 2, no. 1, pp. 72-83, Feb. 2015.
    • (2015) IEEE Internet Things J. , vol.2 , Issue.1 , pp. 72-83
    • He, D.1    Zeadally, S.2
  • 6
    • 59649125918 scopus 로고    scopus 로고
    • RFID-enabled discovery of supply networks
    • Feb.
    • H. H. Bi and D. K. J. Lin, "RFID-enabled discovery of supply networks," IEEE Trans. Eng. Manage., vol. 56, no. 1, pp. 129-141, Feb. 2009.
    • (2009) IEEE Trans. Eng. Manage. , vol.56 , Issue.1 , pp. 129-141
    • Bi, H.H.1    Lin, D.K.J.2
  • 8
    • 84875116626 scopus 로고    scopus 로고
    • Pathchecker: An RFID application for tracing products in suply-chains
    • Leuven, Belgium
    • K. Ouafi and S. Vaudenay, "Pathchecker: An RFID application for tracing products in suply-chains," in Proc. Inf. Security Group (GSI), Leuven, Belgium, 2009, pp. 1-14.
    • (2009) Proc. Inf. Security Group (GSI) , pp. 1-14
    • Ouafi, K.1    Vaudenay, S.2
  • 9
    • 77953897563 scopus 로고    scopus 로고
    • Supply chain control using a RFID proxy re-signature scheme
    • Orlando, FL, USA
    • T. Burbridge and A. Soppera, "Supply chain control using a RFID proxy re-signature scheme," in Proc. IEEE Int. Conf. RFID, Orlando, FL, USA, 2010, pp. 29-36.
    • (2010) Proc. IEEE Int. Conf. RFID , pp. 29-36
    • Burbridge, T.1    Soppera, A.2
  • 12
    • 84946530951 scopus 로고    scopus 로고
    • PUF-based secure checker protocol for networked RFID systems
    • Subang, Malaysia
    • B. Ray, M. Chowdhury, and J. Abawaiy, "PUF-based secure checker protocol for networked RFID systems," in Proc. IEEE Conf. Open Syst. (ICOS), Subang, Malaysia, 2014, pp. 78-83.
    • (2014) Proc. IEEE Conf. Open Syst. (ICOS) , pp. 78-83
    • Ray, B.1    Chowdhury, M.2    Abawaiy, J.3
  • 13
    • 80051668213 scopus 로고    scopus 로고
    • Networked RFID systems
    • P. H. Cole and D. C. Ranasinghe, Eds. Heidelberg, Germany: Springer
    • D. C. Ranasinghe and P. H. Cole, "Networked RFID systems," in Networked RFID Systems and Lightweight Cryptography, P. H. Cole and D. C. Ranasinghe, Eds. Heidelberg, Germany: Springer, 2008, pp. 45-58.
    • (2008) Networked RFID Systems and Lightweight Cryptography , pp. 45-58
    • Ranasinghe, D.C.1    Cole, P.H.2
  • 14
    • 84876943063 scopus 로고    scopus 로고
    • Internet of Things (IoT): A vision, architectural elements, and future directions
    • J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, "Internet of Things (IoT): A vision, architectural elements, and future directions," Future Gener. Comput. Syst., vol. 29, no. 7, pp. 1645-1660, 2013.
    • (2013) Future Gener. Comput. Syst. , vol.29 , Issue.7 , pp. 1645-1660
    • Gubbi, J.1    Buyya, R.2    Marusic, S.3    Palaniswami, M.4
  • 15
    • 67650240831 scopus 로고    scopus 로고
    • Unbounded verification, falsification, and characterization of security protocols by pattern refinement
    • Alexandria, VA, USA
    • C. J. F. Cremers, "Unbounded verification, falsification, and characterization of security protocols by pattern refinement," in Proc. 15th ACM Conf. Comput. Commun. Security (CCS), Alexandria, VA, USA, 2008, pp. 119-128.
    • (2008) Proc. 15th ACM Conf. Comput. Commun. Security (CCS) , pp. 119-128
    • Cremers, C.J.F.1
  • 17
    • 49049105769 scopus 로고    scopus 로고
    • Design and implementation of PUF-based 'unclonable' RFID ICs for anti-counterfeiting and security applications
    • Las Vegas, NV, USA
    • S. Devadas et al., "Design and implementation of PUF-based 'unclonable' RFID ICs for anti-counterfeiting and security applications," in Proc. IEEE Int. Conf. RFID, Las Vegas, NV, USA, 2008, pp. 58-64.
    • (2008) Proc. IEEE Int. Conf. RFID , pp. 58-64
    • Devadas, S.1
  • 18
    • 85019715933 scopus 로고    scopus 로고
    • Enhancing RFID security and privacy by physically unclonable functions
    • A.-R. Sadeghi and D. Naccache, Eds. Heidelberg, Germany: Springer
    • A.-R. Sadeghi, I. Visconti, and C. Wachsmann, "Enhancing RFID security and privacy by physically unclonable functions," in Towards Hardware-Intrinsic Security, A.-R. Sadeghi and D. Naccache, Eds. Heidelberg, Germany: Springer, 2010, pp. 281-305.
    • (2010) Towards Hardware-Intrinsic Security , pp. 281-305
    • Sadeghi, A.-R.1    Visconti, I.2    Wachsmann, C.3
  • 19
    • 84873433835 scopus 로고    scopus 로고
    • Security with noisy data
    • London, U.K.: Springer
    • Y. Dodis, L. Reyzin, and A. Smith, "Security with noisy data," in Fuzzy Extractors. London, U.K.: Springer, 2007, pp. 79-99.
    • (2007) Fuzzy Extractors. , pp. 79-99
    • Dodis, Y.1    Reyzin, L.2    Smith, A.3
  • 20
    • 84868313780 scopus 로고    scopus 로고
    • A privacy-preserving path-checking solution for RFID-based supply chains
    • T. Chim and T. Yuen, Eds. Heidelberg, Germany: Springer
    • W. Xin, H. Sun, T. Yang, Z. Guan, and Z. Chen, "A privacy-preserving path-checking solution for RFID-based supply chains," in Information and Communications Security, vol. 7618, T. Chim and T. Yuen, Eds. Heidelberg, Germany: Springer, 2012, pp. 400-407.
    • (2012) Information and Communications Security , vol.7618 , pp. 400-407
    • Xin, W.1    Sun, H.2    Yang, T.3    Guan, Z.4    Chen, Z.5
  • 21
    • 84888188818 scopus 로고    scopus 로고
    • A RFID path-checking protocol based on ordered multisignatures
    • Fairfax, VA, USA: IOS Press
    • W. Xin, H. Sun, Z. Wang, Z. Guan, and Z. Chen, "A RFID path-checking protocol based on ordered multisignatures," in Radio Frequency Identification System Security, vol. 8. Fairfax, VA, USA: IOS Press, 2012, pp. 33-44.
    • (2012) Radio Frequency Identification System Security , vol.8 , pp. 33-44
    • Xin, W.1    Sun, H.2    Wang, Z.3    Guan, Z.4    Chen, Z.5
  • 24
    • 77957551809 scopus 로고    scopus 로고
    • Comparative analysis of formal model checking tools for security protocol verification
    • N. Meghanathan, S. Boumerdassi, N. Chaki, and D. Nagamalai, Eds. Heidelberg, Germany: Springer
    • R. Patel et al., "Comparative analysis of formal model checking tools for security protocol verification," in Recent Trends in Network Security and Applications, vol. 89, N. Meghanathan, S. Boumerdassi, N. Chaki, and D. Nagamalai, Eds. Heidelberg, Germany: Springer, 2010, pp. 152-163.
    • (2010) Recent Trends in Network Security and Applications , vol.89 , pp. 152-163
    • Patel, R.1
  • 26
    • 67650664414 scopus 로고    scopus 로고
    • Dept. Comput. Sci., Univ. Oxford, Oxford, U.K., Tech. Rep.
    • C. Cremers, "The Scyther tool," Dept. Comput. Sci., Univ. Oxford, Oxford, U.K., Tech. Rep., 2013.
    • (2013) The Scyther Tool
    • Cremers, C.1
  • 27
    • 84982939694 scopus 로고    scopus 로고
    • Complexity theory
    • E. K. Blum and A. V. Aho, Eds. New York, NY, USA: Springer
    • A. V. Aho, "Complexity theory," in Computer Science: The Hardware, Software and Heart of IT, E. K. Blum and A. V. Aho, Eds. New York, NY, USA: Springer, 2011, pp. 241-267, doi: 10.1007/978-1-4614-1168-0-12.
    • (2011) Computer Science: The Hardware, Software and Heart of IT , pp. 241-267
    • Aho, A.V.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.