DocumentCode
568485
Title
A Light-Weight Commodity Integrity Detection Algorithm Based on Chinese Remainder Theorem
Author
Li, Chaoliang ; Wang, Guojun
Author_Institution
Sch. of Inf. Sci. & Eng., Central South Univ., Changsha, China
fYear
2012
fDate
25-27 June 2012
Firstpage
1018
Lastpage
1023
Abstract
Internet of things (IOT), which is based on radio frequency identifier (RFID) technology, has many important applications, especially in warehouse management. In a modern company, there are a huge amount of commodities that get in or get out of a warehouse. In order to make sure that every transaction in warehouse management is right, it is necessary to design a fast and light-weight commodity integrity detection algorithm. In this paper, we propose a commodity integrity detection algorithm (CIDA) based on Chinese remainder theorem (CRT), which compares the hash value of each commodity identifier and the product of these values with those values that have been stored in a database in advance. Then, we conduct experiments to compare the proposed algorithm with a typical commodity detection protocol, called trusted reader protocol (TRP). Experimental results show that the proposed algorithm has better properties: (1) it can detect the integrity of commodities very fast; (2) it can provide efficient security and privacy protection.
Keywords
data integrity; data privacy; data warehouses; protocols; radiofrequency identification; trusted computing; CIDA; CRT; Chinese remainder theorem; IOT; Internet of things; RFID technology; TRP; commodity detection protocol; hash value; light-weight commodity integrity detection algorithm; privacy protection; radiofrequency identifier technology; security protection; trusted reader protocol; warehouse management; Algorithm design and analysis; Databases; Detection algorithms; Educational institutions; Privacy; Radiofrequency identification; Security; Chinese Remainder Theorem (CRT); Internet of Things (IoT); Privacy; RFID; Security;
fLanguage
English
Publisher
ieee
Conference_Titel
Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on
Conference_Location
Liverpool
Print_ISBN
978-1-4673-2172-3
Type
conf
DOI
10.1109/TrustCom.2012.37
Filename
6296085
Link To Document