IoT Applications On Secure Smart Shopping System
IoT Applications On Secure Smart Shopping System
fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2017.2706698, IEEE Internet of
Things Journal
Abstract—The Internet of Things (IoT) is changing human all stocked items and send item status updates to the server.
lives by connecting everyday objects together. For example, in When items become sold out, the server can notify employees
a grocery store all items can be connected with each other, to restock. 3) It becomes easy for the store to do inventory
forming a smart shopping system. In such an IoT system, an
inexpensive RFID tag can be attached to each product which, management as all items can be automatically read and easily
when placed into a smart shopping cart, can be automatically logged.
read by a cart equipped with an RFID reader. As a result, We propose the use of ultra high frequency (UHF) RFID
billing can be conducted from the shopping cart itself, preventing technology [6] in the smart shopping system, as UHF passive
customers from waiting in a long queue at checkout. Additionally,
smart shelving can be added into this system, equipped with tags have a longer range, from 1 to 12 meters. Previous
RFID readers, and can monitor stock, perhaps also updating research on the design of smart shopping systems mainly
a central server. Another benefit of this kind of system is that focused on using low/high frequency RFID [7]–[14], which
inventory management becomes much easier, as all items can have inadequate ranges, and leave customers to manually scan
be automatically read by an RFID reader instead of manually items with a RFID scanner. In our proposed system, each smart
scanned by a laborer. To validate the feasibility of such a
system, in this work we identify the design requirements of cart is equipped with a UHF RFID reader, a micro controller,
a smart shopping system, build a prototype system to test an LCD touchscreen, a Zig-Bee adapter, and a weight sensor.
functionality, and design a secure communication protocol to The smart cart is able to automatically read the items put into a
make the system practical. To the best of our knowledge, this is cart via the RFID reader. A micro controller is installed on the
the first time a smart shopping system is proposed with security cart for data processing and a LCD touchscreen is equipped as
under consideration.
Index Terms—IoT; Smart Shopping; Smart Cart; Security. the user interface. In order for the smart cart to communicate
with the server, we have chosen Zig-Bee technology as it is
I. I NTRODUCTION low-power and inexpensive. We also have a weight scanner
installed on the smart cart for weighting items. The weight
In the era of the Internet of Things (IoT), interactions among scanner can also help do a security check, for example, if
physical objects have become a reality. Everyday objects can a malicious user peels off one item’s RFID tag and puts it
now be equipped with computing power and communication into the cart, extra unaccounted weight will be added. When
functionalities, allowing objects everywhere to be connected. a customer finishes shopping, they pay at the checkout point
This has brought a new revolution in industrial, financial, and using the generated billing information on the smart cart. We
environmental systems, and triggered great challenges in data also set a RFID reader before the exit door to check that all
management, wireless communications, and real-time decision the items in the cart have been paid for.
making [1]. Additionally, many security and privacy issues
We consider security and privacy issues related to smart
have emerged and lightweight cryptographic methods are in
shopping systems as no previous research has tackled it. In
high demand to fit in with IoT applications.
such a system, wireless communications among the server,
There has been a great deal of IoT research on different
smart carts, and items are vulnerable to various attacks; an
applications, such as smart homes, e-health systems, wearable
adversary is able to interfere with the communications if no
devices, etc. [2]–[4]. In this paper, we focus on a smart
proper security method is applied. Privacy issues also exist
shopping system based on Radio Frequency Identification
in such a system: the competitor of a store might get easy
(RFID) technology [5], which has not been well-studied in the
access to the circulation of commodities for financial strategy;
past. In such a system, all items for sale are attached with an
and customer preferences can be inferred by easily collecting
RFID tag, so that they can be tracked by any device equipped
the product information in shoppers’ shopping carts. There has
with an RFID reader in the store - for example, a smart shelf.
been much related work on security and privacy in other areas
Intuitively this brings the following benefits: 1). Items put into
[15]–[24], but none exists in the context of a smart shopping
a smart shopping cart (with RFID reading capability) can be
system.
automatically read and the billing information can also be
generated on the smart cart. As a result, customers do not There are a few restrictions in choosing a practical security
need to wait in long queues at checkout. 2). Smart shelves method for a smart shopping system. As an IoT application,
that are also equipped with RFID readers are able to monitor the power consumption must be low. In regards to the client-
server communication: if the smart cart needs to send a
*Corresponding Author. message to the server after reading an item in the cart, it needs
2327-4662 (c) 2016 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2017.2706698, IEEE Internet of
Things Journal
2327-4662 (c) 2016 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2017.2706698, IEEE Internet of
Things Journal
2327-4662 (c) 2016 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2017.2706698, IEEE Internet of
Things Journal
In Section VI, we give a standard regarding how the tags 3) Smart Shelves: Installed with RFID readers that monitor
can be designed for secure use. the status of the items.
2) Reading Collision: Intuitively, the reading range of the 4) Smart Checkout Point: The checkout point is installed
RFID reader should be carefully set to avoid collisions with a Point of Sale (POS) for the customer to make a
with other carts. purchase. After making the payment, a customer has to
3) Communication Security: The communication in the go through a lane, where a RFID reader can read all the
smart shopping system needs to be protected. For ex- items in the cart, and check with the server if all the
ample, to guarantee the confidentiality and integrity of items have been purchased. Any overpay or underpay
a transaction, lightweight cryptographic systems need to will trigger an alert.
be utilized to prevent an attacker from eavesdropping
data or modifying data sent between the carts and the D. Building a Functional Smart Cart
server. We built a prototype to test our design and functionality.
Fig. 3 shows the components of our designed smart cart and
C. Components
the specific descriptions of each component can be found in
Our proposed smart shopping system consists of the follow- Table II. The workflow of our smart cart is illustrated through
ing components: Fig. 4. According to our tests, when putting an item into the
1) Server: All items are registered to the server before smart cart or removing an item from the cart, the smart cart
moved to the shelves. The server stores all items’ is able to accurately read it. One surprising result is that, the
information, such as location and price, in a database. metal outside the cart blocks the signal to a pretty high extent
The server communicates with all the other entities in that, when the reader is inside the cart, no item outside the
the smart shopping system through Zig-Bee. cart can be read. This clearly indicates that an item put into
2) Smart Cart: As shown in Fig. 2, the following compo- a smart cart will not be read by a nearby cart accidently. We
nents are equipped on the smart cart. are also able to test how to set a RFID reader at the checkout
point so that the items in the cart can be accurately read.
LCD Touchscreen
2327-4662 (c) 2016 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2017.2706698, IEEE Internet of
Things Journal
TABLE II
S PECIFICATIONS OF THE COMPONENTS
The smart shelves are able to monitor the items on the shelves Tag Information(TI)
by reading the RFID signals from the tags; the smart carts are
able to read and retrieve information of the items inside the Producer Number Product Number Product Name Weight Expire Date … HMAC(TI)
RFID Reader
Server
ZigBee To prevent a malicious user from rewriting a tag, we create
RFID Signal
a HMAC appended to the tag for each item. After reading an
RFID Tags
item, the smart cart needs to first check the HMAC of the item
Smart Shelf Checkout Point
Smart Cart to make sure it has not been modified maliciously. The key
s used for the HMAC is stored in each smart cart, and the
allocation can be done at back-end.
We insist that the tags must be tamper-proof, so that any
action on taking off a tag or switching tags between items will
lead to a failure. Finally, we utilize the weight scanner on the
Fig. 5. System Model
cart to prevent a dishonest customer from underpaying. If the
weight of the items in the cart is greater than they should be,
We adopt a combination of symmetric and asymmetric
an alarm is triggered. Traditional markets use hidden secure
cryptographic systems. The server is assigned with a pair
tags such as the Electronic Article Surveillance tags to prevent
of asymmetric keys Ps and Ss . Each smart cart is assigned
shoplifting. This idea can also be incorporated into our system.
a unique ID i and a pair of asymmetric keys Pi and Si .
Each checkout point is assigned a unique ID j and a pair of VII. S ECURITY M ODEL
asymmetric keys Pj and Sj . For asymmetric encryption and
To make our security model practical, we do not assume the
decryption, we denote the encryption to ciphertext c of data d
existence of a secure channel. The communications should be
with public key P by c = EP (d), and decryption of ciphertext
resistant to any eavesdropper who actively monitors the traffic.
c with private key S by d = DS (c). For symmetric encryption
The security of the system is based on the difficulty of solving
and decryption, we denote the encryption to ciphertext c of
the ECDLP, which can not be done in a feasible amount of
data d with key s by c = Es (d), and decryption of ciphertext
time.
c with key s by d = Ds (c).
VIII. B ILLING G ENERATION ON S MART C ARTS
VI. R EGISTRATION
As an IoT application, a smart shopping system should
Before moving all items to the shelves, the store needs to involve lightweight cryptographic methods due to limited
register all of them. We give a design of the RFID tags here computational power. We combine symmetric and asymmetric
shown in Fig. 6. encryption to tackle this issue. When an item is put into a
In our design, information such as price, location, and smart cart, the RFID reader on the smart cart should read
coupon are stored in a database of the server, rather than in the tag and then send the tag information to the micro-
the tags, because such information might change over time, controller that will then communicate with the server via Zig-
and it is more convenient for the server to manage them. Bee to request product information. We adopt ECDSA to sign
2327-4662 (c) 2016 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2017.2706698, IEEE Internet of
Things Journal
the message and Elgamal encryption on Elliptic Curves to returning back different information: for smart cart, the server
encrypt the message. At this point, the smart cart needs to is returning price-related information and for the exit door, the
perform the encryption and signing of the message, which are server is returning the status of the items. In short of space,
computationally lightweight. To prevent the smart cart from we are not giving the algorithms here.
performing the heavy-load, asymmetric decryption work, we We carefully test the reading range of the smart cart in this
let the smart cart randomly generate two symmetric keys s1 system. We have found that the metal around the cart is able
and s2 and send both to the server with its requests. The server to block the signals from outside, which is to say, a RFID
then uses s1 to encrypt the requested information and creates a reader is not able to read the items in a shopping cart unless
message authentication code (MAC) with s2 . Therefore, upon it is set inside the cart or at the top of the cart. Therefore, the
receiving a message from the server, the smart cart only needs RFID reader on the exit door is suggested to be installed on
to perform symmetric decryptions and MAC checking. a high spot in order to read the items in the cart passing by
We propose the following three algorithms to complete the below.
billing generation process. Here we use T to denote the current Fig. 7 depicts the checkout point. The user should first pay
system time. bill at the PoS. The PoS can either read the billing information
In Algorithm 1, the smart cart reads an item, and checks the from the smart cart via Zig-Bee or a physical cable. After
validation of the HMAC. If the verification passes, the smart making the payment, the user then walks through the lane to
cart randomly generates two symmetric keys s1 and s2 : s1 the exit door, where a RFID reader on the top will read all the
will be used for encryption and s2 will be used for creating items in the cart, and verify with the server that everything has
the message authentication code. The smart cart will then sign been paid for. The exit door will open and let the customer
the tag information together with its own ID i, a time stamp, pass if the verification has been passed.
and the two session keys s1 and s2 , encrypts the message, and
sends it to the server. RFID Reader
Server
In Algorithm 2, upon receiving a request from a smart ZigBee
cart, the server decrypts the message and verifies the signature RFID Signal
and the time stamp. If the message is valid, the server looks RFID Tags
Exit Door
for the requested information Inf o(T I) for the item in the Smart Cart
database, concatenates it with a new time stamp, then encrypts
the message using s1 obtained from the cart. The server also Point of Sale
creates a message authentication code using s2 and sends it
together with the encrypted message to the smart cart.
In Algorithm 3, upon receiving the response from the server,
the smart cart first checks the MAC using s2 . If MAC is valid,
the smart cart decrypts the message using s1 and checks if the Fig. 7. Checkout Point
time stamp is valid. If the verification passes, the smart cart
will update the billing information on the LCD display.
X. S ECURITY A NALYSIS
IX. C HECKOUT AND V ERIFICATION
We analyze the security of the communication between the
Even though the smart cart can generate a billing statement, smart cart and the server. The communication between the
we insist that a checkout point be equipped with a Point of checkout point and the server are the same.
Sale (PoS) before the store exit. This is to prevent physical 1) Confidentiality: In each communication between the
attacks on the smart cart’s PoS which can be easily moved to smart cart and the server, the message sent from the smart
areas out of the sights of a store’s employees. cart to the server is encrypted using the smart cart’s public
To verify that a customer has made a valid purchase for all key. The security is based on ECDLP, which is known to be
the items in the smart cart before leaving the store, a RFID computationally infeasible to break. The message sent back
reader with a micorcontroller will be installed before the exit to the smart cart is encrypted using a session key, which is
door. This RFID reader will read all the items in the smart cart only known to the server and the client. Therefore, no outside
and check with the server if a valid purchase has been made. adversary is able to figure out the data in the communications.
This can be done by giving all the items two statuses - “for This also indicates that the privacy in the smart shopping
sale” and “sold” - in the server’s database, and when an item system is well-protected.
is paid, the server will be informed immediately to change 2) Integrity: The message sent from the smart cart to the
the item’s status from “for sale” to “sold”. Therefore, only an server is signed with the smart cart’s private key Ss , thus
honest customer who has paid all the items in the smart cart integrity is protected. When the server sends a message back
can pass the verification and the exit door will open for him. to the smart cart, it creates a MAC using the secret shared with
Algorithms for the communication between the RFID reader the smart cart s2 , and no outside adversary is able to modify
at the exit door are similar to the one between the smart cart the message while passing the check of MAC. Therefore, data
and the server; the only difference here is that, the server is integrity is well-protected.
2327-4662 (c) 2016 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2017.2706698, IEEE Internet of
Things Journal
3) Replay Attack Resistance: In our proposed system, all keys are generated for each request and are unrelated to the
communication messages include a time stamp T , making it previous keys. By adopting the session keys, the data sent from
hard for an attacker to perform a replay attack. If a malicious the server to the smart carts is well-protected.
customer replays a message from a server that contains an
item’s price lower than current price, the smart cart can detect 5) Tag Security: Based on our design, the security of the
that the message is replayed immediately by checking the time RFID tags is well-protected. First, physically destroying the
stamp: If T in the message is not consistent with the system tags or blocking the RFID signal from a tag can be detected
time, the message will be discarded. If a malicious customer by the scales on the smart cart. A small camera can also be
would like to pass the verification of the server, he must be installed on the smart cart to cooperate with the scale for this
able to change the value of the times stamp T included in the function: if the smart cart fails to read a tag and the scale
ciphertext, which is not possible. Therefore, replay attacks are or camera detects that a new item is put into the cart, it
not practical. will send an alarm. Second, any rewriting to the RFID tags
4) One-Time Key: Each time a smart cart requests infor- will be detected by checking the HMAC, which can not be
mation from the server, it randomly creates a pair of session counterfeited by an outside adversary without the secret key.
keys and sends them to the server. The server uses one key Finally, switching the tags on different items does not work
to encrypt data and the other to create a MAC. The session because peeling off the tamper-proof tags will break them.
2327-4662 (c) 2016 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2017.2706698, IEEE Internet of
Things Journal
TABLE III
T HE C OMPUTATION C OMPLEXITIES
Computational Overhead scheme with asymmetric and symmetric operations scheme with only asymmetric operations
Sever R d + R e + R s + Cm 2Rd + 2Re
Smart Cart Gs + Re + Rd + Rs + 2Cm 2Rd + 2Re + Cm
2327-4662 (c) 2016 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2017.2706698, IEEE Internet of
Things Journal
between the server and the smart cart. The communication [14] A. Yewatkar, F. Inamdar, R. Singh, A. Bandal et al., “Smart cart with
overhead between the checkout point and the server is the automatic billing, product information, product recommendation using
rfid & zigbee with anti-theft,” Procedia Computer Science, vol. 79, pp.
same, as the communication patterns are identical. 793–800, 2016.
[15] Z. Cai, Z. He, X. Guan, and Y. Li, “Collective data-sanitization for
XII. C ONCLUSION AND F UTURE R ESEARCH preventing sensitive information inference attacks in social networks,”
IEEE Transactions on Dependable and Secure Computing, 2016.
In this paper, we propose a secure smart shopping system [16] Z. He, Z. Cai, Q. Han, W. Tong, L. Sun, and Y. Li, “An energy efficient
utilizing RFID technology. This is the first time that UHF privacy-preserving content sharing scheme in mobile social networks,”
RFID is employed in enhancing shopping experiences and Personal and Ubiquitous Computing, vol. 20, no. 5, pp. 833–846, 2016.
[17] L. Zhang, Z. Cai, and X. Wang, “Fakemask: A novel privacy preserving
security issues are discussed in the context of a smart shopping approach for smartphones,” IEEE Transactions on Network and Service
system. We detail the design of a complete system and build Management, vol. 13, no. 2, pp. 335–348, 2016.
a prototype to test its functions. We also design a secure [18] Y. Wang, Z. Cai, G. Yin, Y. Gao, X. Tong, and G. Wu, “An incentive
mechanism with privacy protection in mobile crowdsourcing systems,”
communication protocol and present security analysis and Computer Networks, vol. 102, pp. 157–171, 2016.
performance evaluations. [19] X. Jin, M. Zhang, N. Zhang, and G. Das, “Versatile publishing for
We believe that future stores will be covered with RFID privacy preservation,” in Proceedings of the 16th ACM SIGKDD inter-
national conference on Knowledge discovery and data mining. ACM,
technology and our research is a pioneering one in the de- 2010, pp. 353–362.
velopment of a smart shopping system. Our future research [20] C. Hu, R. Li, W. Li, J. Yu, Z. Tian, and R. Bie, “Efficient privacy-
will focus on improving the current system, for example, by preserving schemes for dot-product computation in mobile computing,”
in Proceedings of the 2st ACM Workshop on Privacy-Aware Mobile
reducing the computational overhead at the smart cart side Computing. ACM, 2016, pp. 51–59.
for higher efficiency, and how to improve the communication [21] A. Dasgupta, N. Zhang, G. Das, and S. Chaudhuri, “Privacy preservation
efficiency while preserving security properties. of aggregates in hidden databases: why and how?” in Proceedings of the
2009 ACM SIGMOD International Conference on Management of data.
ACKNOWLEDGMENT ACM, 2009, pp. 153–164.
[22] M. Larson, R. Li, C. Hu, W. Li, X. Cheng, and R. Bie, “A bidder-oriented
This research was partially supported by the National Sci- privacy-preserving vcg auction scheme,” in International Conference on
Wireless Algorithms, Systems, and Applications. Springer, 2015, pp.
ence Foundation of the US under grants CCF-1442642 and 284–294.
CNS-1318872, and the National Natural Science Foundation [23] N. Zhang and W. Zhao, “Privacy-preserving data mining systems,”
of China under grants 61672321 and 61373027. Computer, vol. 40, no. 4, pp. 52–58, 2007.
[24] W. Li, M. Larson, C. Hu, R. Li, X. Cheng, and R. Bie, “Secure multi-unit
R EFERENCES sealed first-price auction mechanisms,” Security and Communication
Networks, vol. 9, no. 16, pp. 3833–3843, 2016.
[1] F. Xia, L. T. Yang, L. Wang, and A. Vinel, “Internet of things,” [25] W. Dai. (2009) Crypto++ 5.6. 0 benchmarks.
International Journal of Communication Systems, vol. 25, no. 9, p. 1101, http://www.cryptopp.com/benchmarks.html.
2012. [26] N. Jansma and B. Arrendondo, “Performance comparison of elliptic
[2] P. Castillejo, J.-F. Martinez, J. Rodriguez-Molina, and A. Cuerva, curve and rsa digital signatures,” nicj. net/files, 2004.
“Integration of wearable devices in a wireless sensor network for an [27] L. Tan and N. Wang, “Future internet: The internet of things,” in
e-health application,” IEEE Wireless Communications, vol. 20, no. 4, 2010 3rd International Conference on Advanced Computer Theory and
pp. 38–49, 2013. Engineering (ICACTE), vol. 5. IEEE, 2010, pp. V5–376.
[3] N. Mitton, S. Papavassiliou, A. Puliafito, and K. S. Trivedi, “Combining [28] J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, “Internet of things
cloud and sensors in a smart city environment,” EURASIP journal on (iot): A vision, architectural elements, and future directions,” Future
Wireless Communications and Networking, vol. 2012, no. 1, p. 1, 2012. Generation Computer Systems, vol. 29, no. 7, pp. 1645–1660, 2013.
[4] T. Song, R. Li, X. Xing, J. Yu, and X. Cheng, “A privacy preserving [29] R. Khan, S. U. Khan, R. Zaheer, and S. Khan, “Future internet: the
communication protocol for iot applications in smart homes,” in to internet of things architecture, possible applications and key challenges,”
appear in International Conference on Identification, Information and in Frontiers of Information Technology (FIT), 2012 10th International
Knowledge in the Internet of Things (IIKI) 2016, 2016. Conference on. IEEE, 2012, pp. 257–260.
[5] S. Shepard, RFID: radio frequency identification. McGraw Hill [30] S. Amendola, R. Lodato, S. Manzari, C. Occhiuzzi, and G. Marrocco,
Professional, 2005. “Rfid technology for iot-based personal healthcare in smart spaces,”
[6] D. M. Dobkin, The rf in RFID: uhf RFID in practice. Newnes, 2012. IEEE Internet of things journal, vol. 1, no. 2, pp. 144–152, 2014.
[7] D. Klabjan and J. Pei, “In-store one-to-one marketing,” Journal of [31] E. Welbourne, L. Battle, G. Cole, K. Gould, K. Rector, S. Raymer,
Retailing and Consumer Services, vol. 18, no. 1, pp. 64–73, 2011. M. Balazinska, and G. Borriello, “Building the internet of things using
[8] T. Shanmugapriyan, “Smart cart to recognize objects based on user rfid: the rfid ecosystem experience,” IEEE Internet Computing, vol. 13,
intention,” International Journal of Advanced Research in Computer no. 3, pp. 48–55, 2009.
and Communication Engineering, vol. 2, no. 5, 2013. [32] N. Koblitz, “Elliptic curve cryptosystems,” Mathematics of computation,
[9] R. Kumar, K. Gopalakrishna, and K. Ramesha, “Intelligent shopping vol. 48, no. 177, pp. 203–209, 1987.
cart,” International Journal of Engineering Science and Innovative [33] V. S. Miller, “Use of elliptic curves in cryptography,” in Conference on
Technology, vol. 2, no. 4, pp. 499–507, 2013. the Theory and Application of Cryptographic Techniques. Springer,
[10] S. Gupta, A. Kaur, A. Garg, A. Verma, A. Bansal, and A. Singh, 1985, pp. 417–426.
“Arduino based smart cart,” International Journal of Advanced Research [34] D. Hankerson, A. J. Menezes, and S. Vanstone, Guide to elliptic curve
in Computer Engineering & Technology, vol. 2, no. 12, 2013. cryptography. Springer Science & Business Media, 2006.
[11] Z. Ali and R. Sonkusare, “Rfid based smart shopping and billing,” [35] R. L. Rivest, M. E. Hellman, J. C. Anderson, and J. W. Lyons,
International Journal of Advanced Research in Computer and Com- “Responses to nist’s proposal,” Communications of the ACM, vol. 35,
munication Engineering, vol. 2, no. 12, pp. 4696–4699, 2013. no. 7, pp. 41–54, 1992.
[12] P. Chandrasekar and T. Sangeetha, “Smart shopping cart with automatic [36] Z. Fang, Z. Zhao, X. Cui, D. Geng, L. Du, and C. Pang, “Localization
billing system through rfid and zigbee,” in Information Communication in wireless sensor networks with known coordinate database,” EURASIP
and Embedded Systems (ICICES), 2014 International Conference on. Journal on Wireless Communications and Networking, vol. 2010, no. 1,
IEEE, 2014, pp. 1–4. pp. 1–17, 2010.
[13] M. R. Sawant, K. Krishnan, S. Bhokre, and P. Bhosale, “The rfid based [37] P. Kinney et al., “Zigbee technology: Wireless control that simply
smart shopping cart,” International Journal of Engineering Research and works,” in Communications design conference, vol. 2, 2003, pp. 1–7.
General Science, vol. 3, no. 2, pp. 275–280, 2015.
2327-4662 (c) 2016 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.