Thanks to the rapid development in mobile vehicles and wireless technologies, the Internet of Vehicles (IoV) has become an attractive application that can provide a large number of mobile services for drivers. Vehicles can be informed of the mobile position, direction, speed, and other real-time information of nearby vehicles to avoid traffic jams and accidents. However, the environments of IoV could be dangerous in the absence of security protections. Due to the openness and self-organization of IoV, there are enormous malicious attackers. To guarantee the safety of mobile services, we propose an effective decentralized authentication mechanism for IoV on the basis of the consensus algorithm of blockchain technology. The simulation under the veins framework is carried out to verify the feasibility of the scheme in reducing the selfish behavior and malicious attacks in IoV.INDEX TERMS Blockchain, Internet of Vehicles, security and privacy, consensus algorithm.
Several grouping proof protocols for RFID systems have been proposed over the years but they are either found to be vulnerable to certain attacks or do not comply with the EPC class-1 gen-2 (C1G2) standard because they use hash functions or other complex encryption schemes. Among other requirements, synchronization of keys, simultaneity, dependence, detecting illegitimate tags, eliminating unwanted tag processing, and denial-of-proof attacks have not been fully addressed by many. Our protocol addresses these important gaps by taking a holistic approach to grouping proofs and provides forward security, which is an open research issue. The protocol is based on simple (XOR) encryption and 128-bit pseudorandom number generators, operations that can be easily implemented on lowcost passive tags. Thus, our protocol enables large-scale implementations and achieves EPC C1G2 compliance while meeting the security requirements.
Product counterfeiting and theft are ongoing problems in supply chains and retail environments, but not a lot of work has been done to address these problems through the cost-effective use of auto-identification technologies such as bar-codes, near-field communication (NFC), or radio-frequency identification (RFID). In this paper, we propose an RFID-based anti-counterfeiting and anti-theft scheme that can be used to detect counterfeit items at the point of purchase by a consumer. The proposed system is lightweight and suited for deployment in large-scale retail environments using low-cost passive tags. We also undertake an analysis of a recent scheme proposed by Tran and Hong to highlight some of the weaknesses of their scheme. A detailed security analysis of the proposed scheme shows that it satisfies the formal requirements of security correctness and is resistant to compromise through security attacks.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.