Skip to main navigation Skip to search Skip to main content

Distributed Key Management Authentication algorithm in Internet of Things (IOT)

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Radio frequency identification system (RFID) is a wireless technology based on radio waves. These radio waves transmit data from the tag to a reader, which then transmits the information to a server. RFID tags have several advantages, they can be used in merchandise, to track vehicles, and even patients. Connecting RFID tags to internet terminal or server it called Internet of Things (IoT). Many people have shown interest in connected objects or the Internet of Things (IoT). The IoT is composed of many complementary elements each having their own specificities. The RFID is often seen as a prerequisite for the IoT. The main challenge of RFID is the security issues. Connecting RFID with IoT poses security threats and challenges which are needed to be discussed properly before deployment. In this paper, we proposed a new distributed encryption algorithm to be used in the IoT structure in order to reduce the security risks that are confronted in RFID technology.

Original languageEnglish
Title of host publication2020 6th International Conference on Mobile and Secure Services, MOBISECSERV 2020
EditorsPascal Urien, Selwyn Piramuthu
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781728157979
DOIs
Publication statusPublished - 1 Feb 2020
Event6th International Conference on Mobile and Secure Services, MOBISECSERV 2020 - Miami, United States
Duration: 22 Feb 202023 Feb 2020

Publication series

Name2020 6th International Conference on Mobile and Secure Services, MOBISECSERV 2020

Conference

Conference6th International Conference on Mobile and Secure Services, MOBISECSERV 2020
Country/TerritoryUnited States
CityMiami
Period22/02/2023/02/20

Keywords

  • IoT
  • RFID
  • authentication algorithm
  • distributed algorithm
  • security

Fingerprint

Dive into the research topics of 'Distributed Key Management Authentication algorithm in Internet of Things (IOT)'. Together they form a unique fingerprint.

Cite this