Performance analysis of an RFID Key Management scheme for vehicular networks

In this paper we analyze the performance of an RFID Key Management scheme to be applied in VANETs. As often being considered as a precondition for the realization of the Internet of Things (IoT) RFID can be utilized in the vehicles, so as to make the vehicles identifiable and inventoriable by computers as long as they are fitted out with radio tags. One of the public concerns is likely to focus on a certain large number of security and privacy issues. Various light symmetric key management schemes will be proposed for different RFID scenarios. In order to perform a reliable and trusted authentication, one prerequisite is to ensure the credibility of RFIDs by means of digital certificate validation. We propose a certificate revocation status validation scheme called EKA2, using the concept of clustering from data mining to evaluate the trustiness of digital certificates.

[1]  Guang Gong,et al.  Physical layer assisted authentication for distributed ad hoc wireless sensor networks , 2010, IET Inf. Secur..

[2]  Azzedine Boukerche,et al.  An efficient k-Means authentication scheme for digital certificates revocation validation in vehicular ad hoc networks , 2014, Wirel. Commun. Mob. Comput..

[3]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[4]  Xiaohui Liang,et al.  HealthShare: Achieving secure and privacy-preserving health information sharing through health social networks , 2012, Comput. Commun..

[5]  Prasant Mohapatra,et al.  Non-cryptographic authentication and identification in wireless networks [Security and Privacy in Emerging Wireless Networks] , 2010, IEEE Wireless Communications.

[6]  Daniel Krajzewicz,et al.  SUMO - Simulation of Urban MObility An Overview , 2011 .

[7]  Myung-Ki Shin,et al.  EPC vs. IPv6 mapping mechanism , 2007, The 9th International Conference on Advanced Communication Technology.

[8]  Sandra Dominikus,et al.  Strong Authentication for RFID Systems Using the AES Algorithm , 2004, CHES.

[9]  Chin-Chen Chang,et al.  An Anonymous and Self-Verified Mobile Authentication with Authenticated Key Agreement for Large-Scale Wireless Networks , 2010, IEEE Transactions on Wireless Communications.

[10]  Jiann-Liang Chen,et al.  Mobile RFID with IPv6 for phone services , 2009, 2009 IEEE 13th International Symposium on Consumer Electronics.

[11]  Azzedine Boukerche,et al.  An Efficient Trust-Based Reputation Protocol for Wireless and Mobile Ad Hoc Networks: Proof and Correctness , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.