Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Secure Communication with RFID tags in the Internet of Things

View through CrossRef
ABSTRACTThe functional capabilities of radio‐frequency identification (RFID) tags are rapidly increasing. Therefore, they can no longer be treated as pure bar‐code substitute, but they should be considered as computing devices. Modern tags are able to store and compute data, or even hold sensors. To draw full advantage from the increased functionality of the tags, it will become important to integrate these tags into the Internet of Things (IoT), that is, enable two‐way end‐to‐end communication over the Internet. Powerful application scenarios can be developed when communication with tags can be established via the network.We introduce the concept of Mobile‐IPv6‐enabled RFID tags to enable a two‐way communication via IPv6. Mobile IPv6 allows integration of passive low‐cost RFID tags into the IoT in a transparent and compatible way. Like the “traditional” Internet, many applications can only be built upon secure communication. Therefore, it is essential to provide securing mechanisms. For the Internet, Internet Protocol Security (IPsec) is used to secure the connection between two nodes. In this paper, we want to define security services analog to IPsec for communication with RFID tags. We analyze the cryptographic capabilities of current RFID tags and build a security layer to enable a secure end‐to‐end connection between tags and other nodes in the net. Copyright © 2011 John Wiley & Sons, Ltd.
Title: Secure Communication with RFID tags in the Internet of Things
Description:
ABSTRACTThe functional capabilities of radio‐frequency identification (RFID) tags are rapidly increasing.
Therefore, they can no longer be treated as pure bar‐code substitute, but they should be considered as computing devices.
Modern tags are able to store and compute data, or even hold sensors.
To draw full advantage from the increased functionality of the tags, it will become important to integrate these tags into the Internet of Things (IoT), that is, enable two‐way end‐to‐end communication over the Internet.
Powerful application scenarios can be developed when communication with tags can be established via the network.
We introduce the concept of Mobile‐IPv6‐enabled RFID tags to enable a two‐way communication via IPv6.
Mobile IPv6 allows integration of passive low‐cost RFID tags into the IoT in a transparent and compatible way.
Like the “traditional” Internet, many applications can only be built upon secure communication.
Therefore, it is essential to provide securing mechanisms.
For the Internet, Internet Protocol Security (IPsec) is used to secure the connection between two nodes.
In this paper, we want to define security services analog to IPsec for communication with RFID tags.
We analyze the cryptographic capabilities of current RFID tags and build a security layer to enable a secure end‐to‐end connection between tags and other nodes in the net.
Copyright © 2011 John Wiley & Sons, Ltd.

Related Results

Design of a UAV for Autonomous RFID-Based Dynamic Inventories Using Stigmergy for Mapless Indoor Environments
Design of a UAV for Autonomous RFID-Based Dynamic Inventories Using Stigmergy for Mapless Indoor Environments
Unmanned aerial vehicles (UAVs) and radio frequency identification (RFID) technology are becoming very popular in the era of Industry 4.0, especially for retail, logistics, and war...
Security and collision in RFID systems
Security and collision in RFID systems
Abstract Radio Frequency Identification (RFID) is a promising technology to provide automated contactless identification of objects, people and animals. The identification process ...
Security and collision in RFID systems
Security and collision in RFID systems
Abstract Radio Frequency Identification (RFID) is a promising technology to provide automated contactless identification of objects, people and animals. The identification process ...
Implementation of RFID for Verification of PC Usage in the UMSIDA’s Electrical Engineering Laboratory Based on the Internet of Things
Implementation of RFID for Verification of PC Usage in the UMSIDA’s Electrical Engineering Laboratory Based on the Internet of Things
Every day visitors to the UMSIDA electrical engineering laboratory have different goals. The main function of the laboratory is as a practicum for electrical engineering students a...
Enhancing RFID system configuration through semantic modelling
Enhancing RFID system configuration through semantic modelling
Abstract Radio-Frequency Identification (RFID) system technology is a key element for the realization of the Industry 4.0 vision, as it is vital for tasks such as entity trackin...
The Geography of Cyberspace
The Geography of Cyberspace
The Virtual and the Physical The structure of virtual space is a product of the Internet’s geography and technology. Debates around the nature of the virtual — culture, s...
Erratum
Erratum
Bach MP, Zoroja J and Loupis M. RFID usage in European enterprises and its relation to competitiveness: Cluster analysis approach. International Journal of Engineering Business Man...
RFID-GPS Enabled Project Material Control
RFID-GPS Enabled Project Material Control
Abstract Material control plays a vital role in the success of any construction linked Project. Any deviation in material identification and traceability due to huma...

Back to Top