A Tree-Based Authentication Scheme for a Cloud Toll/traffic RFID System

被引:0
|
作者
Alabrah, Amerah [1 ]
Bassiouni, Mostafa
机构
[1] King Saud Univ, Dept Informat Syst, Coll Comp & Informat Sci, Riyadh, Saudi Arabia
关键词
RFID; Toll; Merkle Hash Trees; Authentication; PROTOCOL; TAG;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Existing RFID schemes targeting traffic management contexts are mainly conceptual and prototypical. Little attention has been given to the important issue of authentication. With the rapid migration to cloud-based technology, there is a pressing urgency for addressing authentication in toll/traffic RFID solutions. This paper presents a toll/traffic RFID authentication scheme which benefits from the well-known Merkle Hash Trees. The main benefit of MHTs is its scalability compared to traditional schemes. In order to increase scalability, we propose a scheme that significantly lowers the computation complexity of the traditional MHTs. In our proposed scheme, we achieve better performance and improve traditional MHTs by a simple division mechanism. Initial evaluation results demonstrate these benefits and show promising direction for further research.
引用
收藏
页码:108 / 111
页数:4
相关论文
共 50 条
  • [1] A tree-based authentication scheme for a cloud toll/traffic RFID system
    20161402195715
    [J]. (1) Department of Information Systems, College of Computer and Information Sciences, King Saud University, Riyadh, Saudi Arabia; (2) Department of Computer Science, University of Central Florida, Orlando; FL, United States, 1600, (IEEE Computer Society):
  • [2] Tree-Based RFID Authentication Protocols Are Definitively Not Privacy-Friendly
    Avoine, Gildas
    Martin, Benjamin
    Martin, Tania
    [J]. RADIO FREQUENCY IDENTIFICATION: SECURITY AND PRIVACY ISSUES, 2010, 6370 : 103 - 122
  • [3] A Novel Authentication Protocol with Tree-based Signature for Green Cloud Computing
    Shen, Jian
    Liu, Dengzhi
    Liu, Qi
    Xia, Zhihua
    Zhou, Tianqi
    [J]. 2018 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2018, : 843 - 848
  • [4] Tree-based HB protocols for privacy-preserving authentication of RFID tags
    Halevi, Tzipora
    Saxena, Nitesh
    Halevi, Shai
    [J]. JOURNAL OF COMPUTER SECURITY, 2011, 19 (02) : 343 - 363
  • [5] A Lightweight Authentication Scheme for Cloud-Based RFID Healthcare Systems
    Fan, Kai
    Zhu, Shanshan
    Zhang, Kuan
    Li, Hui
    Yang, Yintang
    [J]. IEEE NETWORK, 2019, 33 (02): : 44 - 49
  • [6] Tree-Based RFID Yoking Proof
    Chien, Hung-Yu
    Liu, Shih-Bin
    [J]. NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 1, PROCEEDINGS, 2009, : 550 - 553
  • [7] Cloud-based RFID Authentication
    Xie, Wei
    Xie, Lei
    Zhang, Chen
    Zhang, Quan
    Tang, Chaojing
    [J]. 2013 IEEE INTERNATIONAL CONFERENCE ON RFID (RFID), 2013, : 168 - 175
  • [8] PHY Assisted Tree-based RFID Identification
    Hou, Yuxiao
    Zheng, Yuanqing
    [J]. IEEE INFOCOM 2017 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, 2017,
  • [9] A Tree-Based Signature Scheme for VANETs
    Jiang, Yixin
    Shi, Minghui
    Shen, Xuemin
    Lin, Chuang
    [J]. GLOBECOM 2008 - 2008 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2008,
  • [10] A Realistic Lightweight Authentication Protocol for Securing Cloud based RFID System
    Surekha, B.
    Narayana, K. Lakshmi
    Jayaprakash, P.
    Vorugunti, Chandra Sekhar
    [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING IN EMERGING MARKETS (CCEM), 2016, : 54 - 60