Internet of Things: Security-Based Application Level Lookup Protocol

Article Preview

Abstract:

In the emerging Internet of Things (IOT), lookup service or discovery service plays a critical role, however, current lookup services and discovery services of IoT have not been widely adopted due to some drawbacks or bottlenecks, as well as the item-level lookup service is still missing, moreover, enhancing security and privacy protection does not get enough attention. Therefore, based on the object discovery service architecture (ODSA) a distributed serial number level object discovery service architecture using Chord for the IOT, a security-based application level lookup protocol was provided to enhance the overall security and privacy protection for ODSA. Additionally, some analysis and discussion were given to validate and evaluate our solution. The results show that our solution is available.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

625-628

Citation:

Online since:

September 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] GS1: The GS1 EPCglobal Architecture Framework – Version1. 5 (2013).

Google Scholar

[2] GS1: GS1 Object Name Service (ONS) 2. 0. 1. Ratified Standard (2013).

Google Scholar

[3] University of Cambridge, AT4 wireless, BT Research, SAP Research: High Level design for Discovery Services (2007).

Google Scholar

[4] Afilias, Afilias Discovery Services: Enabling Secure, Selective Visibility in Global Supply Chains (2008).

Google Scholar

[5] S. Evdokimov, B. Fabian, S. Kunz, N. Schoenemann: Proc. of IEEE SUTC (2010), pp.237-244.

Google Scholar

[6] University of Cambridge, AT4 wireless, BT Research and SAP Research: BRIDGE WP02 - Working Prototype of Serial-level Lookup Service (2008).

Google Scholar

[7] D. Huang, M. Verma, A. Ramachandran, Z. Zhou: Proc. of IEEE FTDCS (2007), pp.220-230.

Google Scholar

[8] I. Stoica, R. Morris, D. Karger, M. F. Kaashoek, H. Balakrishnan: Proc. of SIGCOMM (2001), pp.149-160.

Google Scholar

[9] D.G. Xu, L.H. Qin, J.H. Park, J.L. Zhou: Wireless Personal Communications (2013).

Google Scholar

[10] GS1 EPCglobal: EPC Information Service (EPCIS) 1. 0. 1 (2007).

Google Scholar

[11] Auto-ID Center: Auto-ID Savant Specification 1. 0 (2003).

Google Scholar

[12] R. H. Weber: Computer Law and Security Review Vol. 26 (2010), pp.23-30.

Google Scholar

[13] B. Fabian and O. Gunther: Proc. Of IEEE ICC'07 (2007), pp.1223-1228.

Google Scholar

[14] E. Grummt and M. Müller: The Internet of Things (2008), pp.35-49.

Google Scholar