Secure ultra-lightweight RFID mutual authentication protocol based on transparent computing for IoV

Transparent Computing (TC) has become a promising paradigm in the network computing era, the appearance of Transparent Computing have a real impact on the industry. A growing number of cars on the road, in order to reduce road congestion, improve efficiency, and increase travelers satisfaction, IoV (Internet of Vehicles) arises at the proper time. RFID as an excellent sensing equipment is widely used in the IoV. Tags can collect information separately. The surrounding readers transmit the information to the central processing unit by using the Transparent Computing technique. Data sharing is the premise of IoV, drivers can share their information, in the meantime, they do not want to expose their own privacy information, so anonymity and untraceability is very important. Unfortunately, current applicable or proposed protocols fail to satisfy the security, efficiency and usability. In this paper, we propose a mutual authentication protocol to protect driver’s privacy, TC is used in our protocol, so we can make full use of client hardware, improve the quality of user experience. The last but not least, because the existence of OS-level monitoring and attack tracing, system security increase greatly.

[1]  Jie Li,et al.  RSEL: revocable secure efficient lightweight RFID authentication scheme , 2014, Concurr. Comput. Pract. Exp..

[2]  Philippe Oechslin,et al.  RFID Traceability: A Multilayer Problem , 2005, Financial Cryptography.

[3]  Yuezhi Zhou Transparent computing: From concept to implementation , 2012, 2012 International Symposium on Information Technologies in Medicine and Education.

[4]  Bo Sheng,et al.  Secure and Serverless RFID Authentication and Search Protocols , 2008, IEEE Transactions on Wireless Communications.

[5]  Dong Hoon Lee,et al.  Efficient Authentication for Low-Cost RFID Systems , 2005, ICCSA.

[6]  Juan E. Tapiador,et al.  M2AP: A Minimalist Mutual-Authentication Protocol for Low-Cost RFID Tags , 2006, UIC.

[7]  Di Ma,et al.  A Context-Aware Approach for Enhanced Security and Privacy in RFID Electronic Toll Collection Systems , 2011, 2011 Proceedings of 20th International Conference on Computer Communications and Networks (ICCCN).

[8]  Tao Li,et al.  An immunity based network security risk estimation , 2005, Science in China Series F: Information Sciences.

[9]  Laurence T. Yang,et al.  Information security underlying transparent computing: Impacts, visions and challenges , 2010, Web Intell. Agent Syst..

[10]  Tieyan Li,et al.  Security Analysis of Two Ultra-Lightweight RFID Authentication Protocols , 2007, SEC.

[11]  Liu Shufen,et al.  Security Threats And Security Policy In Wireless Sensor Networks , 2012 .

[12]  Daniele Catteddu,et al.  Cloud Computing: Benefits, Risks and Recommendations for Information Security , 2009 .

[13]  Jian Liu,et al.  Research and Development of Intelligent Motor Test System , 2012, J. Comput..

[14]  Xun Wang,et al.  Design of School Bus Safety Regulation System Based on the Internet of Vehicle Technology , 2012 .

[15]  Iuon-Chang Lin,et al.  A Cloud-Based Authentication Protocol for RFID Supply Chain Systems , 2014, Journal of Network and Systems Management.

[16]  Kwangjo Kim,et al.  RFID mutual Authentication Scheme based on Synchronized Secret Information , 2006 .

[17]  Shih-Jung Wu,et al.  An Integrated Building Fire Evacuation System with RFID and Cloud Computing , 2011, 2011 Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[18]  Yi Yang,et al.  Enabling Fine-Grained Multi-Keyword Search Supporting Classified Sub-Dictionaries over Encrypted Cloud Data , 2016, IEEE Transactions on Dependable and Secure Computing.

[19]  Hengliang Shi,et al.  Development of Internet of Vehicle's Information System based on Cloud , 2014, J. Softw..

[20]  Yonghua Xiong,et al.  Mobile Transparent Computing to Enable Ubiquitous Operating Systems and Applications , 2014, J. Adv. Comput. Intell. Intell. Informatics.

[21]  Sheikh Iqbal Ahamed,et al.  Privacy in Pervasive Computing and Open Issues , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).

[22]  Chen Liang,et al.  Lightweight and ultralightweight RFID mutual authentication protocol with cache in the reader for IoT in 5G , 2016, Secur. Commun. Networks.

[23]  Hongwei Li,et al.  Engineering searchable encryption of mobile cloud networks: when QoE meets QoP , 2015, IEEE Wireless Communications.

[24]  Yuezhi Zhou,et al.  Transparent Computing: A New Paradigm for Pervasive Computing , 2006, UIC.

[25]  Hung-Yu Chien,et al.  Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards , 2007, Comput. Stand. Interfaces.

[26]  Lin Hong-lian Survey on Internet of vehicle technology , 2014 .

[27]  Yaoxue Zhang,et al.  TransOS: a transparent computing-based operating system for the cloud , 2012, Int. J. Cloud Comput..

[28]  Xiaohui Liang,et al.  EPPDR: An Efficient Privacy-Preserving Demand Response Scheme with Adaptive Key Evolution in Smart Grid , 2014, IEEE Transactions on Parallel and Distributed Systems.

[29]  Keith Mayes,et al.  Secure Improved Cloud-Based RFID Authentication Protocol , 2014, DPM/SETOP/QASA.

[30]  Chen Zhang,et al.  Cloud-based RFID authentication , 2013, 2013 IEEE International Conference on RFID (RFID).

[31]  Juan E. Tapiador,et al.  EMAP: An Efficient Mutual-Authentication Protocol for Low-Cost RFID Tags , 2006, OTM Workshops.

[32]  Wentao Liu,et al.  Research on cloud computing security problem and strategy , 2012, 2012 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet).

[33]  Yi Chai,et al.  The Paradigm of Big Data for Augmenting Internet of Vehicle into the Intelligent Cloud Computing Systems , 2014, IOV.

[34]  Fuquan Zhao,et al.  On the Application Development of 3G Technology in Automobiles , 2013 .