Logo
  • Home
  • About Us
    • Aim and Scope
    • Research Area
    • Impact Factor
    • Indexing
  • For Authors
    • Authors Guidelines
    • How to publish paper?
    • Download Paper format
    • Submit Manuscript
    • Processing Charges
    • Download Copyrights Form
    • Submit Payment-Copyrights
  • Archives
    • Current Issues
    • Past Issues
    • Conference Issues
    • Special Issues
    • Advance Search
  • IJARIIE Board
    • Join as IJARIIE Board
    • Advisory Board
    • Editorial Board
    • Sr. Reviewer Board
    • Jr. Reviewer Board
  • Proposal
    • Conferece Proposal
    • Special Proposal
    • Faqs
  • Contact Us
  • Payment Detail

Call for Papers:Vol.8 Issue.3

Submission
Last date
30-Jun-2022
Acceptance Status In One Day
Paper Publish In Two Days
Submit ManuScript

News & Updates

Submit Article

Dear Authors, Article publish in our journal for Volume-8,Issue-3. For article submission on below link: Submit Manuscript


Join As Board

Dear Reviewer, You can join our Reviewer team without given any charges in our journal. Submit Details on below link: Join As Board


Paper Publication Charges

IJARIIE APP
Download Android App

For Authors

  • How to Publish Paper
  • Submit Manuscript
  • Processing Charges
  • Submit Payment

Archives

  • Current Issue
  • Past Issue

IJARIIE Board

  • Member Of Board
  • Join As Board

Downloads

  • Authors Guidelines
  • Manuscript Template
  • Copyrights Form

Android App

Download IJARIIE APP
  • Authors
  • Abstract
  • Citations
  • Downloads
  • Similar-Paper

Authors

Title: :  An analysis of RFID authentication schemes with Secure Object Tracking Protocol for the Internet of Things.
PaperId: :  3600
Published in:   International Journal Of Advance Research And Innovative Ideas In Education
Publisher:   IJARIIE
e-ISSN:   2395-4396
Volume/Issue:    Volume 3 Issue 1 2017
DUI:    16.0415/IJARIIE-3600
Licence: :   IJARIIE is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

Author NameAuthor Institute
Ashwini Ashok BhoreJSPM’S Bhivrabai Sawant Institute of Technology & Research Wagholi, Pune-421207,Maharashtra,India
Dr. Gayatri BhandariJSPM’S Bhivrabai Sawant Institute of Technology & Research Wagholi, Pune-421207,Maharashtra,India

Abstract

Computer Engineering
Internet of Things (IoT), secure object tracking ,radio frequency identification (RFID).
Most of the existing tracking protocol aims to increase the visibility of an object in a specific networked RFID system . A “path checker” object tracing and tracking protocol which stores state information to tag and uses key-based hash to perform the information exchange between the tag and the reader. This protocol uses many readers to authenticate and update a tag. Protocol assumes that tags are tamper resistant and capable of anticounterfeit mechanisms but which is invalid for RFID tags and thus it is only secure on a weak advisory model. Also, the path of an object can be checked at the end of the destination .So, we propose a secure object tracking protocol to ensure the visibility and traceability of an object along the travel path to support the Internet of Things (IoT). This protocol is based on radio frequency identification (RFID) system for global unique identification of IoT objects. To ensure secure object tracking, physically unclonable functions are used by the proposed protocol. Here, we modeled the protocol using security protocol description language (SPDL) and simulated SPDL model using automated claim verification tool Scyther. The results show that the proposed protocol is more secure and requires less computation compared to existing similar protocols

Citations

Copy and paste a formatted citation or use one of the links to import into a bibliography manager and reference.

IJARIIE Ashwini Ashok Bhore, and Dr. Gayatri Bhandari. "An analysis of RFID authentication schemes with Secure Object Tracking Protocol for the Internet of Things." International Journal Of Advance Research And Innovative Ideas In Education Volume 3 Issue 1 2017 Page 5-8
MLA Ashwini Ashok Bhore, and Dr. Gayatri Bhandari. "An analysis of RFID authentication schemes with Secure Object Tracking Protocol for the Internet of Things.." International Journal Of Advance Research And Innovative Ideas In Education 3.1(2017) : 5-8.
APA Ashwini Ashok Bhore, & Dr. Gayatri Bhandari. (2017). An analysis of RFID authentication schemes with Secure Object Tracking Protocol for the Internet of Things.. International Journal Of Advance Research And Innovative Ideas In Education, 3(1), 5-8.
Chicago Ashwini Ashok Bhore, and Dr. Gayatri Bhandari. "An analysis of RFID authentication schemes with Secure Object Tracking Protocol for the Internet of Things.." International Journal Of Advance Research And Innovative Ideas In Education 3, no. 1 (2017) : 5-8.
Oxford Ashwini Ashok Bhore, and Dr. Gayatri Bhandari. 'An analysis of RFID authentication schemes with Secure Object Tracking Protocol for the Internet of Things.', International Journal Of Advance Research And Innovative Ideas In Education, vol. 3, no. 1, 2017, p. 5-8. Available from IJARIIE, http://ijariie.com/AdminUploadPdf/An_analysis_of_RFID_authentication_schemes_with_Secure_Object_Tracking_Protocol_for_the_Internet_of_Things__ijariie3600.pdf (Accessed : 08 January 2018).
Harvard Ashwini Ashok Bhore, and Dr. Gayatri Bhandari. (2017) 'An analysis of RFID authentication schemes with Secure Object Tracking Protocol for the Internet of Things.', International Journal Of Advance Research And Innovative Ideas In Education, 3(1), pp. 5-8IJARIIE [Online]. Available at: http://ijariie.com/AdminUploadPdf/An_analysis_of_RFID_authentication_schemes_with_Secure_Object_Tracking_Protocol_for_the_Internet_of_Things__ijariie3600.pdf (Accessed : 08 January 2018)
IEEE Ashwini Ashok Bhore, and Dr. Gayatri Bhandari, "An analysis of RFID authentication schemes with Secure Object Tracking Protocol for the Internet of Things.," International Journal Of Advance Research And Innovative Ideas In Education, vol. 3, no. 1, pp. 5-8, Jan-Feb 2017. [Online]. Available: http://ijariie.com/AdminUploadPdf/An_analysis_of_RFID_authentication_schemes_with_Secure_Object_Tracking_Protocol_for_the_Internet_of_Things__ijariie3600.pdf [Accessed : 08 January 2018].
Turabian Ashwini Ashok Bhore, and Dr. Gayatri Bhandari. "An analysis of RFID authentication schemes with Secure Object Tracking Protocol for the Internet of Things.." International Journal Of Advance Research And Innovative Ideas In Education [Online]. volume 3 number 1 (08 January 2018).
Vancouver Ashwini Ashok Bhore, and Dr. Gayatri Bhandari. An analysis of RFID authentication schemes with Secure Object Tracking Protocol for the Internet of Things.. International Journal Of Advance Research And Innovative Ideas In Education [Internet]. 2017 [Cited : 08 January 2018]; 3(1) : 5-8. Available from: http://ijariie.com/AdminUploadPdf/An_analysis_of_RFID_authentication_schemes_with_Secure_Object_Tracking_Protocol_for_the_Internet_of_Things__ijariie3600.pdf
BibTex EndNote RefMan RefWorks

Number Of Downloads


Last download on 1/8/2018 11:19:07 PM

Save in Google Drive

Similar-Paper

TitleArea of ResearchAuther NameAction
Image Colourization (using Machine Learning)Computer Science & EngineeringAkash Download
Real-Time Age, Sex and Emotion Detection (Using Deep Learning)Computer Science & EngineeringRitesh Kumar Dubey Download
Public Opinion analysis using NLPComputer Science and EngineeringVikas Maurya Download
An Approach to Quantify the COVID-19 Content in Online Health Opinion ConflictsComputer Science & EngineeringVarada Akash Download
Digital Content Editor with Markdown SupportComputer Science and EngineeringSourodeep Ghosh Roy Download
A Literature Review On Algorithm VisualizersComputer ScienceKush Gupta Download
SECURE ATM TRANSACTION USING FACE RECOGNITION AND OTPComputer Science and EngineeringPrakash Hongal Download
Cryptocurrency- An Era Of Digital CurrencyComputer Engineering Vatan Mishra Download
FAKE IMAGE DETECTION USING MACHINE LEARNINGComputer Science EngineeringVaibhav Kishore Download
SPEECH EMOTION RECOGNITION USING DEEP LEARNINGComputer Science EngineeringVandana Singh Download
AIR COMPONENT ANALYSIS USING SARIMA MODELComputer Science and EngineeringArvind Chaudhary Download
A METHOD OF MODELING SLABComputer science and engineeringVu Thi Tham Download
AN IOT BASED APPROCH FOR MEASURING AIR POLLUTION LEVELComputer Science And EngineeringShital Patil Download
Genuine Product Verification System using Blockchain TechnologyComputer ScienceDr N V Shibu Download
A Critical Review of Data WarehouseComputer Science EngineeringMohd Faizan Siddiqui Download
12
For Authors
  • Submit Paper
  • Processing Charges
  • Submit Payment
Archive
  • Current Issue
  • Past Issue
IJARIIE Board
  • Member Of Board
  • Join As Board
Privacy and Policy
Follow us

Contact Info
  • +91-8401209201 (India)
  • +86-15636082010 (China)
  • ijariiejournal@gmail.com
  • M-20/234 Ami Appt,
    Nr.Naranpura Tele-Exch,
    Naranpura,
    Ahemdabad-380063
    Gujarat,India.
Copyright © 2022. IJARIIE. All Rights Reserved.