• 1
    International Telecommunication Union. ITU Internet Reports 2005. The Internet of Things, November 2005,
  • 2
    Yum DH, Kim JS, Hong SJ, Lee PJ. Distance bounding protocol for mutual authentication. IEEE Transactions on Wireless Communications 2011; 10(2): 592601.
  • 3
    Piramuthu S. RFID mutual authentication protocols. Decision Support Systems, Elsevier (in press), 2010.
  • 4
    Armknecht F, Sadeghi A-R, Scafuro A, Visconti I, Wachsmann C. Impossibility results for RFID privacy notions. Transaction on Computational Science XI (6480) 2010; 3963.
  • 5
    Alomair B, Poovendran R. Privacy versus scalability in radio frequency identification systems. Computer Communications, 2010; 33(18): 21552163.
  • 6
    Peris-Lopez P, Hernandez-Castro JC, Estevez-Tapiador JM, Palomar E, van der Lubbe JCA. Cryptographic puzzles and distance-bounding protocols: practical tools for RFID security. IEEE International Conference on RFID—IEEE RFID 2010, IEEE, IEEE Computer Society, Orlando, Florida, USA, 2010; 4552.
  • 7
    Kavun EB, Yalcin T. A lightweight implementation of Keccak hash function for radio-frequency identification applications. In Workshop on RFID Security—RFIDSec‘10’, Yalcin SO (ed). Springer: Istanbul, Turkey, 2010; 258269.
  • 8
    Anggraeni PN, Prasad NR, Prasad R. Secure personal network, IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications, 2008. PIMRC 2008; 15.
  • 9
    Malohat Ibrohimovna, Sonia Heemstra de Groot, Jinglong Zhou. Secure and Dynamic Cooperation of Personal Networks in a Fednet, 6th IEEE Consumer Communications and Networking Conference, 2009. CCNC 2009. 2009; 814.
  • 10
    Project IST-FP6-IP-027396, Magnet Beyond., last accessed: March 2012.
  • 11
    Anggorjati B, Çetin K, Mihovska A, Prasad N. RFID added value sensing capabilities: European advances in integrated RFID-WSN middleware. 2010 7th Annual IEEE Communications Society Conference on Sensor Mesh and Ad Hoc Communications and Networks (SECON), 2010; 13.
  • 12
    Xiaoguang Z, Wei L. The research of network architecture in warehouse management system based on RFID and WSN integration. IEEE International Conference on Automation and Logistics, ICAL 2008; 25562560.
  • 13
    Tolentino RS, Lee K, Kim Y-T, Park G-C. Next generation RFID-based medical service management system architecture in wireless sensor network. In Communication and Networking, Kim T-h, Chang AC-C, Li M, Rong C, Patrikakis CZ, Slezak D (eds). Springer Berlin: Heidelberg, 2010; 147154. 10.1007/978-3-642-17587-9_17
  • 14
    Najera P, Roman R, Lopez J. Secure architecture for the integration of RFID and sensors in personal networks. 7th International Workshop on Security and Trust Management (STM11), Springer, Copenhagen, Denmark, In Press.
  • 15
    Ecma International. Technical Report TR/102, Personal Networks—Overview and Standardization Needs. 1st Edition, December 2010.
  • 16
    RFID Security and Privacy Lounge., last accessed: March 2012.
  • 17
    Najera P, Moyano F, Lopez J. Security Mechanisms and Access Control Infrastructure for e-Passports and General Purpose e-Documents. Journal of Universal Computer Science 2009; 15(5): 970991.
  • 18
    Aigner M. Security in the Internet of Things. Workshop on RFID Security—RFIDSec Asia'10. IOS Press: Singapore, Republic of Singapore, 2010.
  • 19
    Dominikus S, Gross H, Aigner M, Kraxberger S. Low-cost RFID Tags as IPv6 Nodes in the Internet of Things. Workshop on RFID Security—RFIDSec Asia'11. IOS Press: Wuxi, China, 2011; 114128.
  • 20
    Google Nexus., last accessed: March 2012.
  • 21
    Blackberry Bold 9900., last accessed: March 2012.
  • 22
    Dominikus S, Schmidt J-M. Connecting passive RFID tags to the Internet of Things. Interconnecting Smart Objects with the Internet Workshop, Prague, Czech Republic, 2011.
  • 23
    Yu Ng C, Susilo W, Mu Y, Safavi-Naini R. Practical RFID ownership transfer scheme. Journal of Computer Security—Special Issue on RFID System Security 2011; 19(2): 319341.
  • 24
    Song B, Mitchell CJ. Scalable RFID security protocols supporting tag ownership transfer. Computer Communications, 2011; 34(4): 556566.
  • 25
    Kapoor G, Piramuthu S. Single RFID tag ownership transfer protocols. IEEE Transactions on Systems, Man, and Cybernetics 2011; 42(2): 110.
  • 26
    Mulligan G. The 6LoWPAN architecture. Proceedings of the 4th Workshop on Embedded Networked Sensors, ACM, New York, NY, USA, 2007; 7882.
  • 27
    Di Pietro R, Oligeri G, Soriente C, Tsudik G. Securing Mobile Unattended WSNs against a Mobile Adversary. 2010 29th IEEE Symposium on Reliable Distributed Systems, IEEE Computer Society, Washington, DC, USA, 2010; 1120.
  • 28
    Jara A, Zamora M, Skarmeta A. An architecture based on Internet of Things to support mobility and security in medical environments. Consumer Communications and Networking Conference (CCNC), 2010 7th IEEE, 2010; 15.
  • 29
    Sklavos N. On the hardware implementation cost of crypto-processors architectures, information systems security. The official journal of (ISC)2, A Taylor & Francis Group Publication 2010; 19(2): 5360.
  • 30
    Oren Y, Feldhofer M. A low-resource public-key identification scheme for RFID tags and sensor nodes. Proceedings of the second ACM conference on Wireless network security, ACM, New York, NY, USA, 2009; 5968.
  • 31
    Plos T, Groß H, Feldhofer M. Implementation of symmetric algorithms on a synthesizable 8-bit microcontroller targeting passive RFID tags. In Selected Areas in Cryptography, Biryukov A, Gong G, Stinson D (eds). Springer Berlin: Heidelberg, 2011; 114129. 10.1007/978-3-642-19574-7_8,
  • 32
    Maimut D, Ouafi K. Lightweight cryptography for RFID tags. Security Privacy IEEE 2012; (10:2):7679.
  • 33
    Kitsos P, Sklavos N, Parousi M, Skodras AN. A comparative study of hardware architectures for lightweight block ciphers. Computers and Electrical Engineering 2012; 10(2):148160.
  • 34
    Arbit A, Oren Y, Wool A. Toward practical public key anti-counterfeiting for low-cost EPC tags. 2011 IEEE International Conference on RFID, 2011; 38(1)184191.
  • 35
    Seshabhattar S, Jagannatha S, Engels D. Security implementation within GEN2 protocol. 2011 IEEE International Conference on RFID-Technologies and Applications (RFID-TA), 2011; 402407. DOI: 10.1109/RFID.2011.5764620.
  • 36
    Rolfes C, Poschmann A, Leander G, Paar C. Ultra-lightweight implementations for smart devices—security for 1000 gate equivalents. Proceedings of the 8th IFIP WG 8.8/11.2 International Conference on Smart Card Research and Advanced Applications, Springer-Verlag, Berlin, Heidelberg, 2008; 89103.
  • 37
    Wenger E, Hutter M. A hardware processor supporting elliptic curve cryptography for less than 9 kGEs. In Smart Card Research and Advanced Applications, Prouff E (ed). Springer Berlin: Heidelberg, 2011; 182198. 10.1007/978-3-642-27257-8_12
  • 38
    den Hartog FTH, Blom MA, Peeters ME, et al. First experiences with personal networks as an enabling platform for service providers. Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, pp. 1–8, Philadelphia, August 2007.
  • 39
    Open Mobile Alliance, On the definition and architectural needs of Personal Networks. 2008.
  • 40
    Open Mobile Alliance, OMA-TP-CPNS-2008-0027-INP-CPNS: CPNS Scope. 2008.
  • 41
    Mirzadeh S, Armknecht F, Pallares JJ, et al. CPFP: an efficient key management scheme for large scale personal networks. International Symposium on Wireless Pervasive Computing 2008 (ISWPC 2008).
  • 42
    Matsunaka T, Warabino T, Kishi Y, Nakauchi K, Umezawa T, Inoue M. Device authentication and registration method assisted by a cellular system for user-driven service creation architecture. 2009 6th IEEE Consumer Communications and Networking Conference. CCNC 2009; 15.
  • 43
    Fujino S, Motoyoshi G. Authentication procedure and terminal switching scheme for PAN services. In Asia-Pacific Conference on Communications (APCC'06), 2006; 15.
  • 44
    Guerra-Casanova J, Sánchez-Ávila C, Bailador G, de Santos Sierra A. Authentication in mobile devices through hand gesture recognition. International Journal of Information Security 2012:119.
  • 45
    Clarke N, Furnell S. Authenticating mobile phone users using keystroke analysis. International Journal of Information Security 2007; (6):114.
  • 46
    Jehangir A, de Groot SH. Evaluating secure cluster formation in personal networks. Wireless Communications and Networking Conference, 2007. WCNC 2007. IEEE Wireless Communications and Networking Conference, 2007. WCNC 2007. IEEE, 2007; 31343140.
  • 47
    Nithyanand R, Tsudik G, Uzun E. Readers behaving badly. In Computer Security ESORICS 2010, Lecture Notes in Computer Science, Gritzalis D, Preneel B, Theoharidou M (eds). Springer Berlin: Heidelberg, 2010; 1936.
  • 48
    Sarma A, Matos A, Girão J, Aguiar RL. Virtual identity framework for telecom infrastructures. Wireless Personal Communications 2008; 45(4):521543.
  • 49
    Chaabane A, Louati W, Jmaiel M. A framework for managing composed multimedia delivery in personal networks. Multimedia Computing and Systems (ICMCS), 2011 International Conference on, 2011; 16.
  • 50
    Jacobsson M, Niemegeers I, Groot SH. Personal Networks: Wireless Networking for Personal Devices. Wiley Publishing: 2010. ISBN: 9780470681732
  • 51
    Prasad R. My Personal Adaptive Global NET (MAGNET). Springer, 2010. ISBN: 9048134366
  • 52
    Ibrohimovna M, Groot SH. Reputation-based service management and reward mechanisms in fednets to improve the quality of cooperation between personal networks. 2010 Fifth International Conference on Digital Telecommunications (ICDT) 2010; 98103.