A provably secure authentication scheme for RFID-enabled UAV applications

被引:34
|
作者
Gope, Prosanta [1 ]
Millwood, Owen [1 ]
Saxena, Neetesh [2 ]
机构
[1] Univ Sheffield, Dept Comp Sci, 211 Portobello, Sheffield S1 4DP, S Yorkshire, England
[2] Cardiff Univ, Sch Comp Sci & Informat, Cardiff, Wales
关键词
Unmanned aerial vehicle; PHysically Uncloneable Functions; Fuzzy extractor; Realistic anonymous authentication; FUZZY EXTRACTORS;
D O I
10.1016/j.comcom.2020.11.009
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Advantages of Physically Uncloneable Functions (PUFs) have led to appearing a substantial number of novel identification and authentication based systems such as Radio frequency identification (RFID), which is expected to replace the conventional bar-code identification system due to its advantages such as real-time recognition of a considerable number of objects. For example, RFID can be used to identify an unmanned aerial vehicle (UAV) when it is attached with a tag. In this article, we propose a novel anonymous authentication scheme for RFID-enabled UAV applications using Physically Unclonable Functions. Security and the performance analyses demonstrate that our proposed scheme is secure and efficient. Hence, it can be useful for several RFID-based secure application systems.
引用
收藏
页码:19 / 25
页数:7
相关论文
共 50 条
  • [21] A secure authentication scheme for RFID systems
    Dass, Prajnamaya
    Om, Hari
    1ST INTERNATIONAL CONFERENCE ON INFORMATION SECURITY & PRIVACY 2015, 2016, 78 : 100 - 106
  • [22] An Efficient and Provably Secure Identity Authentication Scheme for VANET
    Zhou, Yanwei
    Wang, Zhaolong
    Qiao, Zirui
    Yang, Bo
    Zhang, Mingwu
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (19) : 17170 - 17183
  • [23] An anonymous and provably secure authentication scheme for mobile user
    Islam, S. K. Hafizul
    Obaidat, Mohammad S.
    Amin, Ruhul
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2016, 29 (09) : 1529 - 1544
  • [24] A Practical and Provably Secure Authentication and Key Agreement Scheme for UAV-Assisted VANETs for Emergency Rescue
    Cui, Jie
    Liu, Xinzhong
    Zhong, Hong
    Zhang, Jing
    Wei, Lu
    Bolodurina, Irina
    He, Debiao
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2024, 11 (02): : 1454 - 1468
  • [25] Wearable RFID-enabled sensor nodes for biomedical applications
    Yang, Li
    Vyas, Rushi
    Rida, Amin
    Pan, Jonathan
    Tentzeris, Manos M.
    58TH ELECTRONIC COMPONENTS & TECHNOLOGY CONFERENCE, PROCEEDINGS, 2008, : 2156 - 2159
  • [26] A literature review of RFID-enabled healthcare applications and issues
    Wamba, Samuel Fosso
    Anand, Abhijith
    Carter, Lemuria
    INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 2013, 33 (05) : 875 - 891
  • [27] Provably secure ubiquitous systems: Universally composable RFID authentication protocols
    Burmester, Mike
    van Le, Tri
    de Medeiros, Breno
    2006 SECURECOMM AND WORKSHOPS, 2006, : 332 - +
  • [29] SecTTS: A secure track & trace system for RFID-enabled supply chains
    Shi, Jie
    Li, Yingjiu
    He, Wei
    Sim, Darren
    COMPUTERS IN INDUSTRY, 2012, 63 (06) : 574 - 585
  • [30] A Provably Secure User Authentication Scheme Over Unreliable Networks
    Toan-Thinh Truong
    Minh-Triet Tran
    Anh-Duc Duong
    Anh-Duy Tran
    ADVANCED INFORMATION NETWORKING AND APPLICATIONS, AINA-2022, VOL 1, 2022, 449 : 602 - 613