Secured access control for vehicles in RFID systems on roads

Abstract Vehicle access control systems exist everywhere in our daily life. However, the simple permit-based verification method is not sufficient for the critical departments such as banks and courts, which need to check not only the identity of the vehicles, but also the vehicle route before reaching the restricted area, as the vehicles can have the access permit if and only if they have traveled along the pre-defined routes. To meet the route-tracking requirement, we proposed a novel access control systems based on the radio frequency identification systems on roads. Particularly, we designed a key cloaking method and a route encryption algorithm so that the access control system can be protected against the attackers from both outside and inside. The analytical results demonstrate that our proposed algorithm can successfully reduce the threat of some malicious attack, such as side-channel attack.

[1]  M.A. Ibarra-Manzano,et al.  Design and implementation of a vehicular access control using RFID , 2006, 2006 Multiconference on Electronics and Photonics.

[2]  Ying Cai,et al.  Exploring Historical Location Data for Anonymity Preservation in Location-Based Services , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[3]  Benjamin C. M. Fung,et al.  Walking in the crowd: anonymizing trajectory data for pattern analysis , 2009, CIKM.

[4]  Dong Hwi Lee,et al.  A Study About Security Awareness Program Based on RFID Access Control System , 2012, ICITCS.

[5]  Yücel Saygin,et al.  Towards trajectory anonymization: a generalization-based approach , 2008, SPRINGL '08.

[6]  Nikos Mamoulis,et al.  Privacy Preservation in the Publication of Trajectories , 2008, The Ninth International Conference on Mobile Data Management (mdm 2008).

[7]  Torben Bach Pedersen,et al.  Privacy-Preserving Data Mining on Moving Object Trajectories , 2007, 2007 International Conference on Mobile Data Management.

[8]  Francesco Bonchi,et al.  Never Walk Alone: Uncertainty for Anonymity in Moving Objects Databases , 2008, 2008 IEEE 24th International Conference on Data Engineering.

[9]  Pan Xiang Research and Implementation of Access Control System Based on RFID and FNN-Face Recognition , 2012, 2012 Second International Conference on Intelligent System Design and Engineering Application.

[10]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[11]  Marc Joye,et al.  Hessian Elliptic Curves and Side-Channel Attacks , 2001, CHES.

[12]  Jiming Chen,et al.  Sensory-data-enhanced authentication for RFID-based access control systems , 2012, 2012 IEEE 9th International Conference on Mobile Ad-Hoc and Sensor Systems (MASS 2012).

[13]  Wei Cheng,et al.  On the Design and Deployment of RFID Assisted Navigation Systems for VANETs , 2012, IEEE Transactions on Parallel and Distributed Systems.

[14]  Xiang Pan Research and Implementation of Access Control System Based on RFID and FNN-Face Recognition , 2012 .

[15]  Laks V. S. Lakshmanan,et al.  Anonymizing moving objects: how to hide a MOB in a crowd? , 2009, EDBT '09.

[16]  Yulin Zhang,et al.  A design of bi-verification vehicle access intelligent control system based on RFID , 2009, 2009 9th International Conference on Electronic Measurement & Instruments.

[17]  Helen J. Wang,et al.  User-Driven Access Control: Rethinking Permission Granting in Modern Operating Systems , 2012, 2012 IEEE Symposium on Security and Privacy.

[18]  Marco Gruteser,et al.  Protecting privacy, in continuous location-tracking applications , 2004, IEEE Security & Privacy Magazine.

[19]  M. Deriche,et al.  A hybrid RFID-LPR system for vehicle access control during Pilgrimage season in Saudi Arabia , 2012, International Multi-Conference on Systems, Sygnals & Devices.

[20]  Ao Chen,et al.  ZigBee-based Vehicle Access Control System , 2010, 2010 Third International Symposium on Intelligent Information Technology and Security Informatics.