A provably secure authentication scheme for RFID-enabled UAV applications

被引:34
|
作者
Gope, Prosanta [1 ]
Millwood, Owen [1 ]
Saxena, Neetesh [2 ]
机构
[1] Univ Sheffield, Dept Comp Sci, 211 Portobello, Sheffield S1 4DP, S Yorkshire, England
[2] Cardiff Univ, Sch Comp Sci & Informat, Cardiff, Wales
关键词
Unmanned aerial vehicle; PHysically Uncloneable Functions; Fuzzy extractor; Realistic anonymous authentication; FUZZY EXTRACTORS;
D O I
10.1016/j.comcom.2020.11.009
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Advantages of Physically Uncloneable Functions (PUFs) have led to appearing a substantial number of novel identification and authentication based systems such as Radio frequency identification (RFID), which is expected to replace the conventional bar-code identification system due to its advantages such as real-time recognition of a considerable number of objects. For example, RFID can be used to identify an unmanned aerial vehicle (UAV) when it is attached with a tag. In this article, we propose a novel anonymous authentication scheme for RFID-enabled UAV applications using Physically Unclonable Functions. Security and the performance analyses demonstrate that our proposed scheme is secure and efficient. Hence, it can be useful for several RFID-based secure application systems.
引用
收藏
页码:19 / 25
页数:7
相关论文
共 50 条
  • [1] An intelligent RFID-enabled authentication scheme for healthcare applications in vehicular mobile cloud
    Kumar, Neeraj
    Kaur, Kuljeet
    Misra, Subhas C.
    Iqbal, Rahat
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2016, 9 (05) : 824 - 840
  • [2] An intelligent RFID-enabled authentication scheme for healthcare applications in vehicular mobile cloud
    Neeraj Kumar
    Kuljeet Kaur
    Subhas C. Misra
    Rahat Iqbal
    Peer-to-Peer Networking and Applications, 2016, 9 : 824 - 840
  • [3] A provably secure delegated authentication scheme and its applications
    Lin, Qun
    Li, Jianzhong
    Ren, Xuechang
    INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2019, 11 (02) : 139 - 146
  • [4] A secure RFID authentication scheme for medicine applications
    Wu, Zhen-Yu
    Chen, Tzer-Long
    Lin, Sung-Chiang
    Wang, Charlotte
    2013 SEVENTH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING (IMIS 2013), 2013, : 175 - 181
  • [5] An Improved IoT/RFID-Enabled Object Tracking and Authentication Scheme for Smart Logistics
    Alzahrani, Bander A.
    Irshad, Azeem
    WIRELESS PERSONAL COMMUNICATIONS, 2023, 129 (01) : 399 - 422
  • [6] An Intelligent RFID-Enabled Authentication Protocol in VANET
    Shabani, Fateme
    Gharaee, Hossein
    Ghaffari, Fariba
    2018 9TH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), 2018, : 587 - 591
  • [7] An Improved IoT/RFID-Enabled Object Tracking and Authentication Scheme for Smart Logistics
    Bander A. Alzahrani
    Azeem Irshad
    Wireless Personal Communications, 2023, 129 : 399 - 422
  • [8] Continuous RFID-Enabled Authentication: Privacy Implications
    Kurkovsky, Stan
    Syta, Ewa
    Casano, Bernardo
    IEEE TECHNOLOGY AND SOCIETY MAGAZINE, 2011, 30 (03) : 34 - 41
  • [9] Cryptanalysis of an RFID-Enabled Authentication Protocol for Healthcare
    Ghosh, Haradhan
    Maurya, Pramod Kumar
    Bagchi, Satya
    Wireless Personal Communications, 2024, 138 (04) : 2613 - 2635
  • [10] Anonymous and reliable ultralightweight RFID-enabled authentication scheme for IoT systems in cloud computing
    Shariq, Mohd
    Conti, Mauro
    Singh, Karan
    Lal, Chhagan
    Das, Ashok Kumar
    Chaudhry, Shehzad Ashraf
    Masud, Mehedi
    COMPUTER NETWORKS, 2024, 252