VASERP: An Adaptive, Lightweight, Secure, and Efficient RFID-Based Authentication Scheme for IoV

被引:5
|
作者
Gong, Yinyan [1 ,2 ]
Li, Kuanching [1 ,2 ]
Xiao, Lijun [3 ]
Cai, Jiahong [1 ,2 ]
Xiao, Jiahong [1 ,2 ]
Liang, Wei [1 ,2 ]
Khan, Muhammad Khurram [4 ]
机构
[1] Hunan Univ Sci & Technol, Sch Comp Sci & Engn, Xiangtan 411201, Peoples R China
[2] Hunan Key Lab Serv Comp & Novel Software Technol, Xiangtan 411201, Peoples R China
[3] Shanghai Maritime Univ, Coll Informat Engn, Shanghai 201306, Peoples R China
[4] King Saud Univ, Ctr Excellence Informat Assurance, Riyadh 11653, Saudi Arabia
基金
中国国家自然科学基金;
关键词
authentication; ECC; RFID; Scyther; IoV; PROTOCOL; INTERNET; LOCALIZATION; VEHICLES; CLOUD;
D O I
10.3390/s23115198
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
With the rapid growth in wireless communication and IoT technologies, Radio Frequency Identification (RFID) is applied to the Internet of Vehicles (IoV) to ensure the security of private data and the accuracy of identification and tracking. However, in traffic congestion scenarios, frequent mutual authentication increases the overall computing and communication overhead of the network. For this reason, in this work, we propose a lightweight RFID security fast authentication protocol for traffic congestion scenarios, designing an ownership transfer protocol to transfer access rights to vehicle tags in non-congestion scenarios. The edge server is used for authentication, and the elliptic curve cryptography (ECC) algorithm and the hash function are combined to ensure the security of vehicles' private data. The Scyther tool is used for the formal analysis of the proposed scheme, and this analysis shows that the proposed scheme can resist typical attacks in mobile communication of the IoV. Experimental results show that, compared to other RFID authentication protocols, the calculation and communication overheads of the tags proposed in this work are reduced by 66.35% in congested scenarios and 66.67% in non-congested scenarios, while the lowest are reduced by 32.71% and 50%, respectively. The results of this study demonstrate a significant reduction in the computational and communication overhead of tags while ensuring security.
引用
收藏
页数:19
相关论文
共 50 条
  • [21] LIAS: A Lightweight Incentive Authentication Scheme for Forensic Services in IoV
    Zhang, Mingyue
    Zhou, Junlong
    Cong, Peijin
    Zhang, Gongxuan
    Zhuo, Cheng
    Hu, Shiyan
    IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING, 2023, 20 (02) : 805 - 820
  • [22] Lightweight Hardware Based Secure Authentication Scheme for Fog Computing
    Huang, Baiyi
    Cheng, Xiuzhen
    Cao, Yuan
    Zhang, Le
    2018 THIRD IEEE/ACM SYMPOSIUM ON EDGE COMPUTING (SEC), 2018, : 433 - 439
  • [23] A lightweight, efficient, and secure identity-based authentication scheme for underwater green transport systems
    Yaduvanshi, Ritika
    Mishra, Shivendu
    Yadav, Nimisha
    Rajpoot, Prince
    ANNALS OF TELECOMMUNICATIONS, 2024, 79 (5-6) : 415 - 436
  • [24] An energy-efficient and secure identity based RFID authentication scheme for vehicular cloud computing
    Akram, Waseem
    Mahmood, Khalid
    Li, Xiong
    Sadiq, Mazhar
    Lv, Zhihan
    Chaudhry, Shehzad Ashraf
    COMPUTER NETWORKS, 2022, 217
  • [25] A Secure and Efficient RFID Authentication Protocol
    Yang, Xin
    Yang, Rui-ke
    INTERNATIONAL CONFERENCE ON COMPUTER, NETWORK SECURITY AND COMMUNICATION ENGINEERING (CNSCE 2014), 2014, : 417 - 421
  • [26] A Lightweight Authentication Protocol Scheme for RFID Security
    WEI Guoheng
    ZHANG Huanguo
    Wuhan University Journal of Natural Sciences, 2013, 18 (06) : 504 - 510
  • [27] A Lightweight Authentication Scheme for RFID Using ECC
    Kumar, Atul
    Jain, Ankit Kumar
    4TH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS AND CONNECTED TECHNOLOGIES (ICIOTCT), 2019: INTERNET OF THINGS AND CONNECTED TECHNOLOGIES, 2020, 1122 : 177 - 183
  • [28] An Efficient Ultra lightweight Mutual Authentication Scheme for RFID Systems: Airy Protocol
    Yeh, Kuo-Hui
    Lo, N. W.
    Winata, Enrico
    JOURNAL OF INTERNET TECHNOLOGY, 2011, 12 (06): : 887 - 897
  • [29] A rfid-based macro-payment scheme with security and authentication for retailing services
    Li, Chun-Ta
    Lee, Cheng-Chi
    Weng, Chi-Yao
    Fan, Chun-I
    ICIC Express Letters, 2012, 6 (12): : 3163 - 3170
  • [30] Enhance Safety of Telecare Medicine Information System With A RFID-based Authentication Scheme
    He Jialiang
    Xu Zhiqiang
    Xu Xiaoke
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (08): : 165 - 174