An Enhanced RFID-Based Authentication Protocol using PUF for Vehicular Cloud Computing

被引:5
|
作者
Kumar, Vikas [1 ]
Kumar, Rahul [1 ]
Jangirala, Srinivas [2 ]
Kumari, Saru [3 ]
Kumar, Sachin [4 ]
Chen, Chien-Ming [5 ]
机构
[1] SSV Coll Hapur, Dept Math, Hapur, Uttar Pradesh, India
[2] OP Jindal Global Univ, Jindal Global Business Sch, Sonipat 131001, Haryana, India
[3] Ch Charm Singh Univ, Dept Math, Meerut, Uttar Pradesh, India
[4] Ajay Kumar Garg Engn Coll, Dept Comp Engn, Ghaziabad 201009, India
[5] Shandong Univ Sci & Technol, Coll Comp Sci & Engn, Qingdao, Shandong, Peoples R China
关键词
MUTUAL AUTHENTICATION; INTERNET;
D O I
10.1155/2022/8998339
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
RFID (radio frequency identification) is an Internet of Things (IoT) enabling technology. All physical devices can be connected to the Internet of Things thanks to RFID. When RFID is extensively utilized and fast increasing, security and privacy concerns are unavoidable. Interception, manipulation, and replay of the wireless broadcast channel between the tag and the reader are all possible security threats. Unverified tags or readers provide untrustworthy messages. IoT requires a safe and consistent RFID authentication system. PUFs are also physical one-way functions made up of the unique nanoscopic structure of physical things and their reactivity to random occurrences. PUF includes an unclonable feature that takes advantage of physical characteristics to boost security and resistance to physical attacks. We analyze the security of the RSEAP2 authentication protocol that has been recently proposed by Safkhani et al., a hash-based protocol, and elliptic curve cryptosystem-based protocol. Our security analysis clearly shows important security pitfalls in RSEAP2 such as mutual authentication, session key agreement, and denial-of-service attack. In our proposed work, we improved their scheme and enhanced their version using physically unclonable function (PUF), which are used by the proposed protocol in tags. This research proposes a cloud-based RFID authentication technique that is both efficient and trustworthy. To decrease the RFID tag's overhead, the suggested authentication approach not only resists the aforementioned typical assaults and preserves the tag's privacy, but also incorporates the cloud server into the RFID system. According to simulation results, our approach is efficient. Moreover, according to our security study, our protocol can withstand a variety of attacks, including tracking, replay, and desynchronization assaults. Our scheme withstands all the 18 security features and further consumes the computation cost as 14.7088 ms which is comparable with the other schemes. Similarly, our scheme consumes the communication cost as 672 bits during the sending mode and 512 bits during the receiving mode. Overall, the performance of our proposed method is equivalent to that of related schemes and provides additional security features than existing protocols. Mutual authentication, session key generation, and ephemeral session security are all achieved. Using the real-or-random concept, we formalize the security of the proposed protocol.
引用
收藏
页数:18
相关论文
共 50 条
  • [1] RAVCC: Robust Authentication Protocol for RFID based Vehicular Cloud Computing
    Kumar, Vikas
    Kumar, Rahul
    Kumar, Vinod
    Kumari, Adesh
    Kumari, Saru
    [J]. Journal of Network Intelligence, 2022, 7 (03): : 526 - 543
  • [2] RSEAP2: An enhanced version of RSEAP, an RFID based authentication protocol for vehicular cloud computing
    Safkhani, Masoumeh
    Camara, Carmen
    Peris-Lopez, Pedro
    Bagheri, Nasour
    [J]. VEHICULAR COMMUNICATIONS, 2021, 28
  • [3] RSEAP: RFID based secure and efficient authentication protocol for vehicular cloud computing
    Kumar, Vinod
    Ahmad, Musheer
    Mishra, Dheerendra
    Kumari, Saru
    Khan, Muhammad Khurram
    [J]. VEHICULAR COMMUNICATIONS, 2020, 22
  • [4] Lightweight RFID Authentication Protocol for Cloud Services using PUF Encryption
    Ye Qiao
    Sun ZiWen
    [J]. PROCEEDINGS OF THE 33RD CHINESE CONTROL AND DECISION CONFERENCE (CCDC 2021), 2021, : 5629 - 5634
  • [5] Secure RFID-Assisted Authentication Protocol for Vehicular Cloud Computing Environment
    Saleem, Muhammad Asad
    Li, Xiong
    Mahmood, Khalid
    Tariq, Tayyaba
    Alenazi, Mohammed J. F.
    Das, Ashok Kumar
    [J]. IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2024, : 1 - 10
  • [6] Lightweight RFID dual-tag authentication protocol using cloud and PUF
    Ai, Lulin
    Chang, Zhengtai
    Fan, Wenbing
    Kong, Dehan
    [J]. Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2023, 50 (01): : 177 - 191
  • [7] A Lightweight Authentication and Communication Protocol in Vehicular Cloud Computing
    Vasudev, Harsha
    Das, Debasis
    [J]. 33RD INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN 2019), 2019, : 72 - 77
  • [8] Lightweight Cloud Computing-Based RFID Authentication Protocols Using PUF for e-Healthcare Systems
    Lee, Tian-Fu
    Lin, Kun-Wei
    Hsieh, Yi-Pei
    Lee, Kuo-Chang
    [J]. IEEE SENSORS JOURNAL, 2023, 23 (06) : 6338 - 6349
  • [9] An Improved RFID-based Authentication Protocol for Rail Transit
    Zhu, Rong
    He, Xiaoxi
    Xie, Jiahong
    Zhang, Zongjie
    Wang, Ping
    [J]. 2020 IEEE 14TH INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (BIGDATASE 2020), 2020, : 65 - 72
  • [10] HRP : A HMAC-based RFID mutual authentication protocol using PUF
    Jung, Seung Wook
    Jung, Souhwan
    [J]. 2013 INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2013,