skip to main content
10.1145/1374699.1374711acmconferencesArticle/Chapter ViewAbstractPublication PagesmobihocConference Proceedingsconference-collections
research-article

Public key based authentication for secure integration of sensor data and RFID

Published: 30 May 2008 Publication History

Abstract

The incorporation of sensor readings into RFID tags creates a significant potential for applications which require environment monitoring as well as asset management and tracking, such as blood storage and management, and on-board aircraft part maintenance. On one hand, the environment history is essential in evaluating health and integrity of objects to be protected, such as blood and aircraft part. On the other hand, the periodic sensing information stored in RFID enables identifying the events of displacing and removal of the objects. However, the benefits of integrating RFID with sensor data are achieved only when the authenticity and integrity of data written to and stored at RFID are ensured. In this paper, we present challenges on secure integration of sensor readings and RFID, and compare security solutions of data integrity and authenticity for resource-constrained RFID tags. For mutual authentication between RFID tags and sensors (or readers), the public key based approaches proves efficient and feasible. We further evaluate different public key based approaches in terms of storage and communication efficiency.

References

[1]
R. Falk, F. Kohlmayer, A. Koepf, M. Li, High-assured SDR-based avionics RFID system, In Proceedings of SDR forum Technical conference, (Denver, Colorado, November 6-9), 2007
[2]
L. Ho, M. Moh, Z. Walker, T. Hamada, and C. F. Su, A prototype on RFID and sensor networks for elder healthcare: progress report, In Proceedings of SIGCOMM'05 workshops, (Philadelphia, PA, August 22-26), 2005
[3]
H. Chan, A. Perrig, and D. Song, Random key pre-distribution schemes for sensor networks, In Proceedings of IEEE Symposium on Security and Privacy, (Berkeley, California, May 11-14), 2003
[4]
A. D. Wood and J. A. Stankovic, Denial of Service in sensor networks, IEEE Computer, vol. 35, no. 10, pp. 54--62, 2002
[5]
A. Wander, N. Gura, H. Eberle, V. Gupta, and S. Shantz, Energy analysis of public--key cryptography on small wireless devices, IEEE PerCom, March 2005
[6]
R. Falk, F. Kohlmayer, A. Koepf, M. Braun, H. Seuschek, M. Li, Application of passive asymmetric RFID tags in high assurance avionics multi-domain RFID processing system, in submission to European RFID workshop 2008
[7]
R. Robinson, M. Li, S. Lintelman, K. Sampigethaya, R. Poovendran, D. von Oheimb, and J.-U. Bußer, Impact of public key enabled application on the operation and maintenance of commercial airplanes, In Proceedings of AIAA ATIO Conference, (Belfast, Northern Ireland, September 18-20), 2007
[8]
IETF Draft 2560: X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP, 1999. http://tools.ietf.org/html/rfc2560
[9]
K. Ren, W. Lou and Y. Zhang, Multi-user broadcast authentication in wireless sensor networks, In Proceedings of IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (IEEE SECON) (San Diego, CA, June 18-21), 2007
[10]
S. Micali, NOVOMODO - Scalable Certificate validation and simplified PKI management, In Proceedings of the 1st Annual PKI Research Workshop, 2002.

Cited By

View all
  • (2016)Technical Requirements of the e-Waybill ServiceInternational Journal of Computer and Communication Engineering10.17706/IJCCE.2016.5.2.130-1405:2(130-140)Online publication date: 2016
  • (2013)Secure and Efficient Control Transfer for IoT DevicesInternational Journal of Distributed Sensor Networks10.1155/2013/5034049:11(503404)Online publication date: Jan-2013

Index Terms

  1. Public key based authentication for secure integration of sensor data and RFID

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    HeterSanet '08: Proceedings of the 1st ACM international workshop on Heterogeneous sensor and actor networks
    May 2008
    108 pages
    ISBN:9781605581132
    DOI:10.1145/1374699
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 30 May 2008

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. RFID
    2. authentication
    3. certificate
    4. public key
    5. sensor
    6. tag
    7. workflow

    Qualifiers

    • Research-article

    Conference

    MobiHoc08
    Sponsor:

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)1
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 05 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2016)Technical Requirements of the e-Waybill ServiceInternational Journal of Computer and Communication Engineering10.17706/IJCCE.2016.5.2.130-1405:2(130-140)Online publication date: 2016
    • (2013)Secure and Efficient Control Transfer for IoT DevicesInternational Journal of Distributed Sensor Networks10.1155/2013/5034049:11(503404)Online publication date: Jan-2013

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media