Call for Paper - September 2020 Edition
IJCA solicits original research papers for the September 2020 Edition. Last date of manuscript submission is August 20, 2020. Read More

A Lightweight Secure Object Tracking Protocol for Internet of Things

Print
PDF
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2017
Authors:
R. Veni, K. A. Selvaradjou
10.5120/ijca2017914415

R Veni and K A Selvaradjou. A Lightweight Secure Object Tracking Protocol for Internet of Things. International Journal of Computer Applications 168(5):29-34, June 2017. BibTeX

@article{10.5120/ijca2017914415,
	author = {R. Veni and K. A. Selvaradjou},
	title = {A Lightweight Secure Object Tracking Protocol for Internet of Things},
	journal = {International Journal of Computer Applications},
	issue_date = {June 2017},
	volume = {168},
	number = {5},
	month = {Jun},
	year = {2017},
	issn = {0975-8887},
	pages = {29-34},
	numpages = {6},
	url = {http://www.ijcaonline.org/archives/volume168/number5/27873-2017914415},
	doi = {10.5120/ijca2017914415},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}
}

Abstract

The Internet of Things (IoT) raises to the ever-rising system of physical objects that feature an IPv6 address for internet connectivity and the message that takes place between these objects and other internet-enabled devices and systems. It is provided with unique identifiers and the ability to transmit data over a net. Among several issues, the tracking and tracing of the path travelled by objects is an important problem. Though, there exist many techniques to track the moving objects, many of them are unsafe. Hence, there is a need for secure tracking of the objects. A secure object tracking protocol should ensure the visibility and traceability of an object along the travel path to support the Internet of Things (IoT). The existing protocol is based on Radio Frequency Identification (RFID) system for global unique identification of IoT objects. The existing does not provide authentication of objects, leads to injection of fake objects. The energy consumption is high. The proposed protocol enhances secure object tracking using lightweight cryptographic primitives and modelled the protocol using Security Protocol Description Language (SPDL). The proposed protocol is intended to provide authentication, integrity, confidentiality and encryption. For ensuring secure object tracking, the proposed protocol uses the lightweight cryptographic primitives which uses the concept of Hash Message Authentication Code (HMAC) which is used to verify the authenticity of an object. The protocol is also based on Cooperative Message Authentication Code (CMAC) which is used to reduce energy consumption with less overhead. Through network simulation, the performance of the protocol is evaluated and found to be more secure and require less computation when compared with existing protocols.

References

  1. Stankovic, J. A. “Research directions for the internet of things” IEEE Internet of Things Journal, vol. 1, no.1, pp.3-9, February,2014.
  2. Kumar, Hemant, and Archana Singh. "Internet of Things: A Comprehensive Analysis and Security Implementation through Elliptic Curve Cryptography", In International Journal of Current Engineering and Technology (IJCET), March ,2016.
  3. Ray, B., Howdhury, M., Abawajy, J., and Jesmin, M. “Secure object tracking protocol for Networked RFID Systems” In the Proceedings of 16th IEEE/ACIS International Conference of the IEEE on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD), pp. 1-7, June,2015.
  4. Sankaran, S “Lightweight security framework for IoTs using identity based cryptography” In the Proceedings of IEEE International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 880-886, September,2016.
  5. Jiang, S., Zhu, X., and Wang, L.“An Efficient Anonymous Batch Authentication Scheme Based on HMAC for VANETs” IEEE Transactions on Intelligent Transportation Systems, vol. 17, no. 8, pp. 2193-2204, August,2016.
  6. Elkhiyaoui, K., Blass, E. O., and Molva, R. “CHECKER: On-site checking in RFID-based supply chains” In the Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks, pp. 173-184, April,2012.
  7. Blass, E. O., Elkhiyaoui, K., Molva, R., and Antipolis, E. S. “Tracker: Security and privacy for RFID-based supply chains” In the Proceedings of 18th Annual Network and Distributed System Security Symposium, pp. 6-9, February,2011.
  8. Burbridge, T., and Soppera, A. “Supply chain control using a RFID proxy re-signature scheme”, In the Proceedings of IEEE International Conference on RFID, pp. 29-36, April,2010.
  9. Ouafi, K., and Vaudenay, S. “Pathchecker: An RFID application for tracing products in supply-chains”, In the Proceedings of RFID Sec, July,2009.
  10. Ray, B. R., Chowdhury, M. U., and Abawajy, J. H. “Secure Object Tracking Protocol for the Internet of Things”, IEEE Internet of Things Journal, vol. 3 no. 4, pp. 544-553, August,2016.

Keywords

Internet of Things(IoT), Hash Message Authentication Code (HMAC), Cooperative Message Authentication Code (CMAC), Security Protocol Description Language (SPDL), Lightweight Secure Object Tracking Protocol (LSOTP), Secure Object Tracking Protocol (SOTP), Radio Frequency Identification (RFID).