Skip to main content
Log in

Secure ultra-lightweight RFID mutual authentication protocol based on transparent computing for IoV

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

Transparent Computing (TC) has become a promising paradigm in the network computing era, the appearance of Transparent Computing have a real impact on the industry. A growing number of cars on the road, in order to reduce road congestion, improve efficiency, and increase travelers satisfaction, IoV (Internet of Vehicles) arises at the proper time. RFID as an excellent sensing equipment is widely used in the IoV. Tags can collect information separately. The surrounding readers transmit the information to the central processing unit by using the Transparent Computing technique. Data sharing is the premise of IoV, drivers can share their information, in the meantime, they do not want to expose their own privacy information, so anonymity and untraceability is very important. Unfortunately, current applicable or proposed protocols fail to satisfy the security, efficiency and usability. In this paper, we propose a mutual authentication protocol to protect driver’s privacy, TC is used in our protocol, so we can make full use of client hardware, improve the quality of user experience. The last but not least, because the existence of OS-level monitoring and attack tracing, system security increase greatly.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

Reference

  1. Li L, Liu J, Yang Y (2012) Research and development of intelligent motor test system. Journal of Computers 7(9):2192–2199

    Google Scholar 

  2. Ying Lu, Wenqiang Chen, Xingmin Wei, Fuquan Zhao (2012) “On the application development of 3G technology in automobiles,” Proceedings of the FISITA 2012 World Automotive Congress, 311–325

  3. Liu W (2012) Research on cloud computing security problem and strategy. Proceedings of CECNet 2012:1216–1219

    Google Scholar 

  4. Z. Wei, Y. Zhang, and J. Yang (2013) “Private assets protection system based on RFID and cloud computing,” Proceedings of CECNet ‘13, 196–198

  5. Li T (2005) An immunity based network security risk estimation. Science in China 48(5):557–578

    MathSciNet  MATH  Google Scholar 

  6. Shi H, Bai X, Ren C, Zhao C (1848-1853) Development of internet of Vehicle's information system based on cloud. Journal of Software 9(7):2014

    Google Scholar 

  7. Y. C. Lee, Y. C. Hsieh, P. S. You, et al (2009) “A new ultra-lightweight RFID protocol with mutual authentication,” Proceedings of Information Engineering-volume, 58–61

  8. Catteddu D (2010) Cloud computing: benefits, risks and recommendations for information security. Web Application Security:17–17

  9. Auto-ID Center (2002) “860MHz–960MHz Class I radio frequency identification tag radio frequency & logical communication interface specification proposed recommendation Version 1.0.0,” Technical Report MIT-AUTOID-TR-007

  10. Lee S-M, Hwang YJ, Lee DH, Lim JI (2005) Efficient authentication for low-cost RFID systems. Proceedings of ICCSA 2005:619–627

    Google Scholar 

  11. Lee S, Asano T, Kim K (2006) RFID mutual authentication scheme based on synchronized secret information. Proceedings of SCIS 2006:98–98

    Google Scholar 

  12. Gildas Avoine and Philippe Oechslin (2005) “RFID traceability: a mulilayer problem,” Proceedings of Financial Cryptography-FC, 125–140

  13. T. Li and G. Wang (2007) “Security analysis of two ultralightweight RFID authentication protocols,” Proceedings of the 22nd IFIP TC-11 International Information Security Conference, pp. 109–120

  14. P. Peris-Lopez, J. C. Hernandez-Castro, J. M. Estevez-Tapiador, and A. Ribagorda (2006) “LMAP: a real Lightweight mutual authentication protocol for low-cost RFID tags,” Proceedings of RFID’06

  15. P. Peris-Lopez, J. C. Hernandez-Castro, J. M. Estevez-Tapiador, and A. Ribagorda (2006) “EMAP: an efficient mutual authentication protocol for low cost RFID tags”, Proceedings of IS’06, 352–361

  16. Y. Zhou (2012) “Transparent computing: From concept to implementation,” Proceedings of Information Technology in Medicine and Education, 5–5

  17. Zhang Y, Zhou Y (2012) Trans OS: a transparent computing-based operating system for the cloud. International Journal of Cloud Computing 1(4):287–301

    Article  Google Scholar 

  18. Y. Zhang, Y. Zhou (2006) “Transparent computing: a new paradigm for pervasive computing,” Proceedings of Ubiquitous Intelligence and Computing, pp. 1–11

  19. Huang S, Wu M, Xiong Y (2014) Mobile transparent computing to enable ubiquitous operating systems and applications. Journal of Advanced Computational Intelligence & Intelligent Informatics 18(1):32–39

    Article  Google Scholar 

  20. Zhang Y, Yang L, Zhou Y et al (2010) Information security underlying transparent computing: impacts, visions and challenges. Web Intelligence & Agent Systems 8(2):203–217

    Google Scholar 

  21. G. Li, P. Yang, H. Zhang (2015) “Application of internet of vehicle (IoV) in the Smart City,” Office Informatization

    Google Scholar 

  22. Gebremeskel G, Chai Y, Yang Z (2014) The paradigm of big data for augmenting internet of vehicle into the intelligent cloud computing systems. Internet of Vehicles – Technologies and Services 247-261. doi:10.1007/978-3-319-11167-4_25

  23. H. Lin, X. Huang (2014) “Survey on internet of vehicle technology,” Journal of Mechanical & Electrical Engineering

    Google Scholar 

  24. Duan X, Wang X, Duan X et al (2012) Design of school bus safety regulation system based on the internet of vehicle technology. Applied Mechanics & Materials 263:2911–2914

    Article  Google Scholar 

  25. Xie W, Xie L, Zhang C et al (2013) Cloud-based RFID authentication. Proceedings of RFID 2013:168–175

    Google Scholar 

  26. Lin I, Hsu H, Cheng C (2015) A cloud-based authentication protocol for RFID supply chain systems. Journal of Network & Systems Management 23(4):978–997

    Article  Google Scholar 

  27. Fan K, Li J, Li H, Liang X, Shen X, Yang Y (2014) RSEL: revocable secure efficient lightweight RFID authentication scheme. Concurrency and Computation: Practice and Experience 26(5):1084–1096

    Article  Google Scholar 

  28. Li H, Lin X, Yang H, Liang X, Lu R, Shen X (2053-2064) EPPDR: an efficient privacy-preserving demand response scheme with adaptive key evolution in smart grid. IEEE Transactions on Parallel and Distributed Systems 25(8):2014

    Google Scholar 

  29. Chu L, Wu S (2011) An integrated building fire evacuation system with RFID and cloud computing. Proceedings of IIHMSP 2011:17–20

    Google Scholar 

  30. Fan K, Gong Y, Liang C, Li H, Yang Y (2015) Lightweight and ultralightweight RFID mutual authentication protocol with cache in the reader for IoT in 5G. Security and Communication Networks. doi:10.1002/sec.1314

    Google Scholar 

  31. Ma D, Prasad A (2011) A context-aware approach for enhanced security and privacy in RFID electronic toll collection systems. Proceedings of ICCCN 2011:1–6

    Google Scholar 

  32. S. Abughazalah, K. Markantonakis, K. Mayes (2015) “Secure improved cloud-based RFID authentication protocol”. Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance, 147–164. doi:10.1007/978-3-319-17016-9_10

  33. Bhaskar P, Ahamed S (2007) Privacy in pervasive computing and open issues. Proceedings of Ares 2007:147–154

    Google Scholar 

  34. Li H, Liu D, Dai Y, Luan T (2015) Engineering searchable encryption of mobile cloud networks: when QoE meets QoP. IEEE Wirel Commun 22(4):74–80

    Article  Google Scholar 

  35. Li H, Yang Y, Luan T, Liang X, Zhou L, Shen X (2016) Enabling fine-grained multi-keyword search supporting classified sub-dictionaries over encrypted cloud data. IEEE Transactions on Dependable and Secure Computing 13(3):312–325

    Article  Google Scholar 

  36. Chien H, Chen C (2007) Mutual authentication protocol for RFID conforming to EPC class 1 generation 2 standards. Computer Standards and Interfaces 29:254–259

    Article  Google Scholar 

  37. Tan C et al (2008) Secure and serverless RFID authentication and search protocols. IEEE Trans Wirel Commun 7:1400–1407

    Article  Google Scholar 

  38. Z. Shen, Sh. Liu, (2012) “Security threats and security policy in wireless sensor networks,” Advances in Information Sciences & Service Sciences, 4, 10, 166.

Download references

Acknowledgements

This work has been financially supported by the National Natural Science Foundation of China (No. 61303216, No. 61272457, No. U1401251, and No. 61373172), the National High Technology Research and Development Program of China (863 Program) (No. 2012AA013102), and National 111 Program of China B16037 and B08038.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kai Fan.

Additional information

This article is part of the Topical Collection: Special Issue on Transparent Computing

Guest Editors: Jiannong Cao, Jingde Cheng, Jianhua Ma, and Ju Ren

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Fan, K., Wang, W., Jiang, W. et al. Secure ultra-lightweight RFID mutual authentication protocol based on transparent computing for IoV. Peer-to-Peer Netw. Appl. 11, 723–734 (2018). https://doi.org/10.1007/s12083-017-0553-9

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-017-0553-9

Keywords

Navigation