4.7 Article

Cloud-based RFID mutual authentication scheme for efficient privacy preserving in IoV

Publisher

PERGAMON-ELSEVIER SCIENCE LTD
DOI: 10.1016/j.jfranklin.2019.02.023

Keywords

-

Funding

  1. National Key R&D Program of China [2017YFB0802300]
  2. National Natural Science Foundation of China [61,772,403, U1401251]
  3. Natural Science Basic Research Plan in Shaanxi Province of China [2017JM6004]
  4. National 111 Program of China [B16037, B08038]

Ask authors/readers for more resources

The article focuses on privacy protection issues in the Internet of Vehicles (IoV) field, proposing a cloud-based mutual authentication protocol to ensure efficient privacy preservation.
With the continuous development of comprehensive technologies in various fields, the cyber-physical systems has been successfully applied in many fields in a large scale. The privacy and security issues in the system have gradually become the focus of attention. This article focuses on privacy protection issues in the area of Internet of Vehicles (IoV). IoV has developed rapidly and come into public consciousness quickly. Radio Frequency Identification (RFID) technology is a safe and reliable sensor data processing system, which is widely used in IoV. However, RFID system often suffers some risks of privacy disclosure. For example the owners are reluctant to disclose their private information such as their precise location information to the public network. Faced with those security risks, it is of great importance for the RFID system applied to IoV to protect private information. In this paper, we propose a cloud-based mutual authentication protocol aiming at ensuring efficient privacy preserving in IoV system, which enables people the efficiently and intelligently travel mode while protecting their privacy from divulging. Moreover, that the anonymity of tag is implemented not only protects the privacy data of the owners, but also prevents the malicious tracking from outside attackers. As to the proposed scheme, the proof based on BAN logic indicates it is of logic security. Security analysis and performance evaluation show that the scheme can be a good security solution for IoV with the feature of good safety and reliability. (C) 2019 The Franklin Institute. Published by Elsevier Ltd. All rights reserved.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available