RSEAP: RFID based secure and efficient authentication protocol for vehicular cloud computing

Abstract Vehicular cloud computing (VCC) is an emerging research area, which comprises cloud, vehicular networking and Internet of Things (IoT) technologies. VCC presents vehicle-to-vehicle, vehicle-to-infrastructure or vehicle-to-device communication, where vehicles are equipped with communication sensing capacities. VCC is utilizing vehicle resources, cloud infrastructure and IoT environment. However, maintaining the security of communication and privacy of communicators are two major challenges in VCC. To achieve the goal of secure communication along with anonymity, we propose an elliptic curve cryptography (ECC) based authentication framework for VCC, which is equipped with a radio frequency identification (RFID). We prove the claim of secure communication using formal security analysis in the random oracle model and information analysis. Moreover, we prove the proposed protocol security against a replay attack and man-in-the-middle attack using the simulation tool “AVISPA”. We discuss and evaluate the performance of the proposed framework and compare it with related schemes on desirable performance parameters. Our analysis indicates that the proposed framework achieves all desirable security attributes and supports efficient communication.

[1]  Elif Uysal-Biyikoglu,et al.  Energy efficient wireless unicast routing alternatives for machine-to-machine networks , 2011, J. Netw. Comput. Appl..

[2]  Nursyarizal Mohd Nor,et al.  Limitation and Solution for Healthcare Network Using RFID Technology: A Review☆ , 2013 .

[3]  Ingrid Verbauwhede,et al.  Elliptic-Curve-Based Security Processor for RFID , 2008, IEEE Transactions on Computers.

[4]  Adesh Kumari,et al.  A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers , 2017, The Journal of Supercomputing.

[5]  Adesh Kumari,et al.  A secure user authentication protocol using elliptic curve cryptography , 2019 .

[6]  Gongjun Yan,et al.  Towards Secure Vehicular Clouds , 2012, 2012 Sixth International Conference on Complex, Intelligent, and Software Intensive Systems.

[7]  Rajkumar Buyya,et al.  A survey on vehicular cloud computing , 2014, J. Netw. Comput. Appl..

[8]  Jian Shen,et al.  A lightweight and anonymous RFID tag authentication protocol with cloud assistance for e-healthcare applications , 2018, J. Ambient Intell. Humaniz. Comput..

[9]  Jianfeng Ma,et al.  Security analysis of two recently proposed RFID authentication protocols , 2011, Frontiers of Computer Science in China.

[10]  Lemuria Carter,et al.  literature review of RFID-enabled healthcare applications and issues amuel , 2013 .

[11]  Hamid Barati,et al.  An efficient and secure RFID authentication protocol using elliptic curve cryptography , 2019, Wirel. Networks.

[12]  Musheer Ahmad,et al.  A secure elliptic curve cryptography based mutual authentication protocol for cloud-assisted TMIS , 2019, Telematics Informatics.

[13]  Vinod Kumar,et al.  A Pairing-Free Identity Based Authentication Framework for Cloud Computing , 2013, NSS.

[14]  Jue-Sam Chou An efficient mutual authentication RFID scheme based on elliptic curve cryptography , 2013, The Journal of Supercomputing.

[15]  Subhas C. Misra,et al.  An intelligent RFID-enabled authentication scheme for healthcare applications in vehicular mobile cloud , 2016, Peer-to-Peer Netw. Appl..

[16]  Hari Om,et al.  Authentication protocol for wireless sensor networks applications like safety monitoring in coal mines , 2016, Comput. Networks.

[17]  Yanbing Liu,et al.  Efficient Privacy-Preserving Dual Authentication and Key Agreement Scheme for Secure V2V Communications in an IoV Paradigm , 2017, IEEE Transactions on Intelligent Transportation Systems.

[18]  Xin Liu,et al.  A Temporal Credential-Based Mutual Authentication with Multiple-Password Scheme for Wireless Sensor Networks , 2017, PloS one.

[19]  Hung-Min Sun,et al.  Design and implementation of wearable RFID tag for real-time ubiquitous medical care , 2014, 2014 IEEE Topical Conference on Biomedical Wireless Technologies, Networks, and Sensing Systems (BioWireleSS).

[20]  Jianfeng Ma,et al.  Integrated Authentication and Key Agreement Framework for Vehicular Cloud Computing , 2018, IEEE Network.

[21]  Sherali Zeadally,et al.  Vehicular ad hoc networks (VANETS): status, results, and challenges , 2010, Telecommunication Systems.

[22]  Young-Sik Jeong,et al.  A survey on cloud computing security: Issues, threats, and solutions , 2016, J. Netw. Comput. Appl..

[23]  Jia-Lun Tsai,et al.  A Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services , 2015, IEEE Systems Journal.

[24]  Xiaojun Zhang,et al.  A Secure ECC-based RFID Mutual Authentication Protocol to Enhance Patient Medication Safety , 2015, Journal of Medical Systems.

[25]  Cheng-Chi Lee,et al.  A Secure RFID Tag Authentication Protocol with Privacy Preserving in Telecare Medicine Information System , 2015, Journal of Medical Systems.

[26]  Tatsuo Nakajima,et al.  Secure and efficient tag searching in RFID systems using serverless search protocol , 2008 .

[27]  R. C. Mittal,et al.  A Hash Based Mutual RFID Tag Authentication Protocol in Telecare Medicine Information System , 2014, Journal of Medical Systems.

[28]  Jian Shen,et al.  Efficient Privacy-Aware Authentication Scheme for Mobile Cloud Computing Services , 2018, IEEE Systems Journal.

[29]  Ruhul Amin,et al.  A Secure Three-Factor User Authentication and Key Agreement Protocol for TMIS With User Anonymity , 2015, Journal of Medical Systems.

[30]  Muhammad Khurram Khan,et al.  A robust and anonymous patient monitoring system using wireless medical sensor networks , 2018, Future Gener. Comput. Syst..

[31]  Sheikh Iqbal Ahamed,et al.  ERAP: ECC Based RFID Authentication Protocol , 2008, 2008 12th IEEE International Workshop on Future Trends of Distributed Computing Systems.

[32]  Peng Gong,et al.  A New User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography , 2013, Int. J. Distributed Sens. Networks.

[33]  W. B. Lee,et al.  Critical Elements and Lessons Learnt from the Implementation of an RFID-enabled Healthcare Management System in a Medical Organization , 2011, Journal of Medical Systems.

[34]  Roel Peeters,et al.  Attack on Liao and Hsiao's Secure ECC-based RFID Authentication Scheme integrated with ID-Verifier Transfer Protocol , 2013, IACR Cryptol. ePrint Arch..

[35]  Zhian Zhu,et al.  An Efficient Authentication Scheme for Telecare Medicine Information Systems , 2012, Journal of Medical Systems.

[36]  Arvinder Kaur,et al.  Dyanimc key based authentication scheme for Vehicular Cloud Computing , 2015, 2015 International Conference on Green Computing and Internet of Things (ICGCIoT).

[37]  Yu-Yi Chen,et al.  A Low-cost RFID Authentication Protocol with Location Privacy Protection , 2009, 2009 Fifth International Conference on Information Assurance and Security.

[38]  David Pointcheval,et al.  Anonymous and Transparent Gateway-Based Password-Authenticated Key Exchange , 2008, CANS.

[39]  Yang Xiao,et al.  Security and privacy in RFID and applications in telemedicine , 2006, IEEE Commun. Mag..

[40]  Y. Zhang,et al.  Scalable and distributed key array authentication protocol in radio frequency identification-based sensor systems , 2011, IET Commun..

[41]  Musheer Ahmad,et al.  An Efficient Mutual Authentication Framework for Healthcare System in Cloud Computing , 2018, Journal of Medical Systems.

[42]  Yanheng Liu,et al.  Building a trusted route in a mobile ad hoc network considering communication reliability and path length , 2011, J. Netw. Comput. Appl..

[43]  Yalin Chen,et al.  ECC-based untraceable authentication for large-scale active-tag RFID systems , 2015, Electron. Commer. Res..

[44]  Chih-Ming Hsiao,et al.  A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol , 2014, Ad Hoc Networks.

[45]  Donghoon Lee,et al.  Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography , 2014, Sensors.

[46]  Vinod Kumar,et al.  An Identity-Based Authentication Framework for Big Data Security , 2019 .

[47]  Hari Om,et al.  A secure and robust anonymous three-factor remote user authentication scheme for multi-server environment using ECC , 2017, Comput. Commun..

[48]  Xiong Li,et al.  A new and secure authentication scheme for wireless sensor networks with formal proof , 2017, Peer-to-Peer Netw. Appl..

[49]  Mohammad Sabzinejad Farash Cryptanalysis and improvement of an efficient mutual authentication RFID scheme based on elliptic curve cryptography , 2014, The Journal of Supercomputing.

[50]  Arputharaj Kannan,et al.  Dual Authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks , 2016, IEEE Transactions on Intelligent Transportation Systems.

[51]  Musheer Ahmad,et al.  An elliptic curve cryptography based mutual authentication scheme for smart grid communications using biometric approach , 2019, Journal of King Saud University - Computer and Information Sciences.

[52]  Liehuang Zhu,et al.  2FLIP: A Two-Factor Lightweight Privacy-Preserving Authentication Scheme for VANET , 2016, IEEE Transactions on Vehicular Technology.

[53]  Stephan Olariu,et al.  Taking VANET to the clouds , 2011, Int. J. Pervasive Comput. Commun..

[54]  Feng Quan-yuan,et al.  A Security RFID Authentication Protocol Based on Hash Function , 2009, 2009 International Symposium on Information Engineering and Electronic Commerce.

[55]  YoungHo Park,et al.  Secure Authentication Protocol for Wireless Sensor Networks in Vehicular Communications , 2018, Sensors.

[56]  Sherali Zeadally,et al.  An Analysis of RFID Authentication Schemes for Internet of Things in Healthcare Environment Using Elliptic Curve Cryptography , 2015, IEEE Internet of Things Journal.

[57]  Gaetano Marrocco,et al.  RFID Technology for IoT-Based Personal Healthcare in Smart Spaces , 2014, IEEE Internet of Things Journal.

[58]  Adesh Kumari,et al.  SEBAP:  A secure and efficient biometric‐assisted authentication protocol using ECC for vehicular cloud computing , 2019, Int. J. Commun. Syst..