Icons / Logo / Facebook Created with Sketch. Icons / Logo / Google Created with Sketch. Icons / Logo / ORCID Created with Sketch. Branding/Logomark minus Citation Combined Shape Icon/Bookmark-empty Icon/Copy Icon/Collection Icon/Close Copy 7 no author result Created with Sketch. Icon/Back Created with Sketch. Match!

Security Framework for RFID-based Applications in Smart Home Environment

Published on Mar 31, 2011in Journal of Information Processing Systems
· DOI :10.3745/JIPS.2011.7.1.111
Divyan M. Konidala7
Estimated H-index: 7
(KAIST),
Daeyoung Kim25
Estimated H-index: 25
(KAIST)
+ 1 AuthorsByoungcheon Lee18
Estimated H-index: 18
Cite
Abstract
The concept of Smart-Homes is becoming more and more popular. It is anticipated that Radio Frequency IDentification (RFID) technology will play a major role in such environments. We can find many previously proposed schemes that focus solely on: authentication between the RFID tags and readers, and user privacy protection from malicious readers. There has also been much talk of a very popular RFID application: a refrigerator/bookshelf that can scan and list out the details of its items on its display screen. Realizing such an application is not as straight forward as it seems to be, especially in securely deploying such RFID-based applications in a smart home environment. Therefore this paper describes some of the RFID-based applications that are applicable to smart home environments. We then identify their related privacy and security threats and security requirements and also propose a secure approach, where RFID-tagged consumer items, RFID-reader enabled appliances (e.g., refrigerators), and RFID-based applications would securely interact among one another. At the moment our approach is just a conceptual idea, but it sheds light on very important security issues related to RFID-based applications that are beneficial for consumers.
  • References (4)
  • Citations (19)
Cite
References4
Newest
Published on Feb 1, 2006in IEEE Journal on Selected Areas in Communications 9.30
Ari Juels53
Estimated H-index: 53
This paper surveys recent technical research on the problems of privacy and security for radio frequency identification (RFID). RFID tags are small, wireless devices that help identify objects and people. Thanks to dropping cost, they are likely to proliferate into the billions in the next several years-and eventually into the trillions. RFID tags track objects in supply chains, and are working their way into the pockets, belongings, and even the bodies of consumers. This survey examines approac...
Published on May 23, 2003
Klaus Finkenzeller1
Estimated H-index: 1
RFID (Radio Frequency Identification) is used in all areas of automatic data capture allowing contactless identification of objects using RF. With applications ranging from secure internet payment systems to industrial automation and access control, RFID technology solutions are receiving much attention in the research and development departments of large corporations. RFID is a major growth are in auto ID, allowing emergency vehicles to safely trip traffic signals, and providing the technology ...
Published on May 1, 2000
Eric Rescorla18
Estimated H-index: 18
This memo describes how to use TLS to secure HTTP connections over the Internet. Current practice is to layer HTTP over SSL (the predecessor to TLS), distinguishing secured traffic from insecure traffic by the use of a different server port. This document documents that practice using TLS. A companion document describes a method for using HTTP/TLS over the same port as normal HTTP [RFC2817].
Cited By19
Newest
Published on Jul 26, 2019 in INTERACT (International Conference on Human-Computer Interaction)
Mahsa Keshavarz , Mohd Anwar11
Estimated H-index: 11
Smart homes are increasingly becoming popular because they make living comfortable, enjoyable, and secure. People can remotely control various aspects of their smart home environments. However, smart home appliances can pose threats to privacy. The reason is that smart appliances collect and store sensitive information, and if hackers gain access to this information, user privacy may be breached. It is difficult for users to constantly monitor and determine which data is sensitive to them and wh...
Published on Jul 1, 2017in IEEE Sensors Journal 3.08
Arun Cyril Jose3
Estimated H-index: 3
(University of Pretoria),
Reza Malekian14
Estimated H-index: 14
(University of Pretoria)
This paper explains various security issues in the existing home automation systems and proposes the use of logic-based security algorithms to improve home security. This paper classifies natural access points to a home as primary and secondary access points depending on their use. Logic-based sensing is implemented by identifying normal user behavior at these access points and requesting user verification when necessary. User position is also considered when various access points changed states...
Published on Oct 10, 2016
Biplob R. Ray5
Estimated H-index: 5
(Central Queensland University),
Morshed U. Chowdhury14
Estimated H-index: 14
(Deakin University),
Jemal H. Abawajy26
Estimated H-index: 26
(Deakin University)
In this paper we are proposing a multi-protocol security framework for sensors and actuators used in Internet of Things (IoT). This is to make sure that IoT security framework is capable of accommodating a number of secure communication protocols to support diverse need of IoT systems. The proposed framework will extend scope of combining common security functionalities like mutual authentication, malware injection of all integrated secure communication protocols and will make these services uni...
Published on Sep 1, 2016
Sayidul Morsalin4
Estimated H-index: 4
(Chittagong University of Engineering & Technology),
A. M. Jahirul Islam1
Estimated H-index: 1
(Chittagong University of Engineering & Technology)
+ 3 AuthorsA. B. Siddiqe1
Estimated H-index: 1
(Chittagong University of Engineering & Technology)
The rapid growth of burglary and theft over the last few years has been threatening to the vulnerability of traditional home security systems. In this research, this hazardous circumstance persuades the authors to develop a machine-to-machine (M2M) communication based smart home security system. Here a multi-layer home security system (HSS) has been developed which maintains six levels of security and necessary control responses against unwanted burglars and intruders. As a part of this developm...
Published on Jan 1, 2015
NFC is one of the recent wireless communication technologies. Near field communication is technology for contactless short-range communication based on RFID (Radio Frequency Identification). So there is possibility of eavesdropping, data modification, data corruption, man-in-middle attacks. Solution on these threats is creating a secure channel. The proposed system protocols consider three different factor (Touch, Angle and Time) of user behavior to know the authenticity or authorization of user...
Published on Oct 1, 2014in Security and Communication Networks 1.38
Yi-Jun He3
Estimated H-index: 3
(HKU: University of Hong Kong),
Patrick P. F. Chan7
Estimated H-index: 7
(HKU: University of Hong Kong)
+ 1 AuthorsSiu-Ming Yiu42
Estimated H-index: 42
(HKU: University of Hong Kong)
Leakage of sensitive data stored on lost or stolen portable devices has been an open problem in the data security community. Clumsiness of existing solutions hinders them from being deployed. We propose a user-friendly location-free encryption system for mobile users UFLE to improve the solution Mobile User Location-specific Encryption MULE from Studer and Perrig on both the security and usability. In particular, we solve the problem of i enhancing the convenience and security of MULE, ii access...
Published on Oct 1, 2014in Security and Communication Networks 1.38
Jianwei Niu23
Estimated H-index: 23
(Beihang University),
Xiong Li23
Estimated H-index: 23
(Hunan University of Science and Technology)
User authentication and privacy protection are important issues for wireless and mobile communication systems such as GSM, 3G, and 4G wireless networks. Recently, Yoon et al. proposed a user-friendly authentication scheme with anonymity for wireless communications. However, in this paper, we show that user anonymity of their scheme is not achieved under the eavesdropping attack and their scheme is not fair in the key agreement. In order to ensure security authentication and protect user anonymit...
Published on Jun 1, 2014in International Journal of Communication Systems 1.28
Mino Ku3
Estimated H-index: 3
(Konkuk University),
Eunmi Choi10
Estimated H-index: 10
(Kookmin University),
Dugki Min9
Estimated H-index: 9
(Konkuk University)
To process big data in a cloud computing environment, a large scale of stream big data is one of the challenging issues. In particular, complex event processing is an emerging technology to handle massive events from multiple sources and process them in a near real time. In this paper, we analyze four performance-influencing factors on a virtualized event processing system: the number of query statements, garbage collection intervals, the quantity of virtual machine resources, and virtual CPU as...
Published on Feb 1, 2014
Gurudatt Kulkarni5
Estimated H-index: 5
,
Ramesh Sutar2
Estimated H-index: 2
,
Sangita Mohite3
Estimated H-index: 3
Published on Jan 1, 2014in Journal of Applied Mathematics
Lun-Ping Hung6
Estimated H-index: 6
,
Hsin-Ke Lu1
Estimated H-index: 1
+ 1 AuthorsDing-Jung Chiang4
Estimated H-index: 4
(Aletheia University)
Due to the information technology advancement, the feasibility for the establishment of mobile medical environments has been strengthened. Using RFID to facilitate the tracing of patients’ mobile position in hospital has attracted more attentions from researchers due to the demand on advanced features. Traditionally, the management of surgical treatment is generally manually operated and there is no consistent operating procedure for patients transferring among wards, surgery waiting rooms, oper...