Permutation Matrix Encryption Based Ultralightweight Secure RFID Scheme in Internet of Vehicles

被引:14
|
作者
Fan, Kai [1 ]
Kang, Junbin [1 ]
Zhu, Shanshan [1 ]
Li, Hui [1 ]
Yang, Yintang [2 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Shaanxi, Peoples R China
[2] Xidian Univ, Key Lab, Minist Educ Wide Band Gap Semicond Mat & Devices, Xian 710071, Shaanxi, Peoples R China
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
RFID; internet of vehicles; matrix encryption; ultralightweight; security and privacy; AUTHENTICATION;
D O I
10.3390/s19010152
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Radio frequency identification (RFID) is a kind of non-contact automatic identification technology. The Internet of Vehicles (IoV) is a derivative of the Internet of Things (IoT), and RFID technology has become one of the key technologies of IoV. Due to the open wireless communication environment in RFID system, the RFID system is easy to be exposed to various malicious attacks, which may result in privacy disclosure. The provision of privacy protection for users is a prerequisite for the wide acceptance of the IoV. In this paper, we discuss the privacy problem of the RFID system in the IoV and present a lightweight RFID authentication scheme based on permutation matrix encryption, which can resist some typical attacks and ensure the user's personal privacy and location privacy. The fast certification speed of the scheme and the low cost of the tag is in line with the high-speed certification requirement in the Internet of vehicles. In this thesis, the specific application scenarios of the proposed RFID authentication scheme in the IoV is also discussed.
引用
收藏
页数:12
相关论文
共 50 条
  • [21] Secure Cloud Internet of Vehicles Based on Blockchain and Data Transmission Scheme of Map/Reduce
    Lin, Hua-Yi
    [J]. COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2023, 20 (01) : 137 - 156
  • [22] Secure authentication and session key management scheme for Internet of Vehicles
    Sharma, Nishant
    Chauhan, Naveen
    Chand, Narottam
    Awasthi, Lalit Kumar
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (05):
  • [23] High-Security Transmission Scheme of Secure Key Generation and Distribution Based on Polling-Permutation Encryption
    Xia, Wenchao
    Liu, Bo
    Ren, Jianxin
    Mao, Yaya
    Wu, Xiangyu
    Ullah, Rahat
    Zhao, Lilong
    Chen, Shuaidong
    Wan, Yibin
    Ma, Yiming
    Li, Ying
    Qi, Zhipeng
    Wu, Yongfong
    Guo, Xuzhou
    [J]. JOURNAL OF LIGHTWAVE TECHNOLOGY, 2024, 42 (01) : 149 - 157
  • [24] UPSRVNet: Ultralightweight, Privacy preserved, and Secure RFID-based authentication protocol for VIoT Networks
    Rakesh Kumar
    Sunil K. Singh
    D. K. Lobiyal
    [J]. The Journal of Supercomputing, 2024, 80 : 942 - 969
  • [25] UPSRVNet: Ultralightweight, Privacy preserved, and Secure RFID-based authentication protocol for VIoT Networks
    Kumar, Rakesh
    Singh, Sunil K.
    Lobiyal, D. K.
    [J]. JOURNAL OF SUPERCOMPUTING, 2024, 80 (01): : 942 - 969
  • [26] Secure Implementation for Video Streams Based on Fully and Permutation Encryption Techniques
    Elshamy, Ahmed M.
    Hamed, Hesham F. A.
    Kelash, Hamdy M.
    Hussein, Aziza I.
    Abdelghany, M. A.
    Alhamad, Ahmad Q.
    [J]. 2017 INTERNATIONAL CONFERENCE ON COMPUTER AND APPLICATIONS (ICCA), 2017, : 50 - 55
  • [27] Colour Image Encryption Scheme Based on Permutation and Substitution Techniques
    Pareek, Narendra K.
    Patidar, Vinod
    Sud, Krishan K.
    [J]. ADVANCES IN COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, PT I, 2011, 131 : 413 - +
  • [28] ArMTFr: a new permutation-based image encryption scheme
    Elkamchouchi, Hassan
    Salama, Wessam M.
    Abouelseoud, Yasmine
    [J]. INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2019, 11 (01) : 1 - 28
  • [29] Chaotic Encryption Scheme Based on a Fast Permutation and Diffusion Structure
    Nkapkop, Jean De Dieu
    Effa, Joseph
    Borda, Monica
    Bitjoka, Laurent
    Mohamadou, Alidou
    [J]. INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2017, 14 (06) : 812 - 819
  • [30] An image encryption scheme with a pseudorandom permutation based on chaotic maps
    Yoon, Ji Won
    Kim, Hyoungshick
    [J]. COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2010, 15 (12) : 3998 - 4006