An Enhanced RFID-Based Authentication Protocol using PUF for Vehicular Cloud Computing

Author:

Kumar Vikas1ORCID,Kumar Rahul1ORCID,Jangirala Srinivas2ORCID,Kumari Saru3ORCID,Kumar Sachin4ORCID,Chen Chien-Ming5ORCID

Affiliation:

1. Department of Mathematics, SSV College Hapur, Hapur, Uttar Pradesh, India

2. Jindal Global Business School, O. P. Jindal Global University, Sonipat, Haryana 131001, India

3. Department of Mathematics, Ch. Charan Singh University, Meerut, U P, India

4. Department of Computer Engineering, Ajay Kumar Garg Engineering College, Ghaziabad 201009, India

5. College of Computer Science and Engineering, Shandong University of Science and Technology, Qingdao, Shandong, China

Abstract

RFID (radio frequency identification) is an Internet of Things (IoT) enabling technology. All physical devices can be connected to the Internet of Things thanks to RFID. When RFID is extensively utilized and fast increasing, security and privacy concerns are unavoidable. Interception, manipulation, and replay of the wireless broadcast channel between the tag and the reader are all possible security threats. Unverified tags or readers provide untrustworthy messages. IoT requires a safe and consistent RFID authentication system. PUFs are also physical one-way functions made up of the unique nanoscopic structure of physical things and their reactivity to random occurrences. PUF includes an unclonable feature that takes advantage of physical characteristics to boost security and resistance to physical attacks. We analyze the security of the RSEAP2 authentication protocol that has been recently proposed by Safkhani et al., a hash-based protocol, and elliptic curve cryptosystem-based protocol. Our security analysis clearly shows important security pitfalls in RSEAP2 such as mutual authentication, session key agreement, and denial-of-service attack. In our proposed work, we improved their scheme and enhanced their version using physically unclonable function (PUF), which are used by the proposed protocol in tags. This research proposes a cloud-based RFID authentication technique that is both efficient and trustworthy. To decrease the RFID tag’s overhead, the suggested authentication approach not only resists the aforementioned typical assaults and preserves the tag’s privacy, but also incorporates the cloud server into the RFID system. According to simulation results, our approach is efficient. Moreover, according to our security study, our protocol can withstand a variety of attacks, including tracking, replay, and desynchronization assaults. Our scheme withstands all the 18 security features and further consumes the computation cost as 14.7088 ms which is comparable with the other schemes. Similarly, our scheme consumes the communication cost as 672 bits during the sending mode and 512 bits during the receiving mode. Overall, the performance of our proposed method is equivalent to that of related schemes and provides additional security features than existing protocols. Mutual authentication, session key generation, and ephemeral session security are all achieved. Using the real-or-random concept, we formalize the security of the proposed protocol.

Publisher

Hindawi Limited

Subject

Computer Networks and Communications,Information Systems

Cited by 11 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. PULRAS: A Novel PUF-based Lightweight Robust Authentication Scheme;2024 20th International Conference on Distributed Computing in Smart Systems and the Internet of Things (DCOSS-IoT);2024-04-29

2. A PUF-based IoT Authentication Model in Edge Computing Environment;2023 9th International Conference on Computer and Communications (ICCC);2023-12-08

3. A Practical Data Audit Scheme With Retrievability and Indistinguishable Privacy-Preserving for Vehicular Cloud Computing;IEEE Transactions on Vehicular Technology;2023-12

4. Monitoring Hospital Activity Through Petri Nets;2023 IEEE 29th International Symposium for Design and Technology in Electronic Packaging (SIITME);2023-10-18

5. Scalable RFID authentication protocol based on physically unclonable functions;Computer Networks;2023-07

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3