2022
DOI: 10.1155/2022/8998339
|View full text |Cite
|
Sign up to set email alerts
|

An Enhanced RFID-Based Authentication Protocol using PUF for Vehicular Cloud Computing

Abstract: RFID (radio frequency identification) is an Internet of Things (IoT) enabling technology. All physical devices can be connected to the Internet of Things thanks to RFID. When RFID is extensively utilized and fast increasing, security and privacy concerns are unavoidable. Interception, manipulation, and replay of the wireless broadcast channel between the tag and the reader are all possible security threats. Unverified tags or readers provide untrustworthy messages. IoT requires a safe and consistent RFID authe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 12 publications
(6 citation statements)
references
References 28 publications
0
4
0
Order By: Relevance
“…The ETC data were collected by more than 1000 ETC gantries deployed in the whole road network of the Fujian Provincial Expressway. Specifically, as the world’s largest IoV system, the ETC system uses radio frequency identification (RFID) technology to enable mobile vehicles equipped with an onboard unit (OBU) to communicate with roadside units (RSU) for data collection [ 37 ]. The collection period was from 3 to 10 September 2020.…”
Section: Methodsmentioning
confidence: 99%
“…The ETC data were collected by more than 1000 ETC gantries deployed in the whole road network of the Fujian Provincial Expressway. Specifically, as the world’s largest IoV system, the ETC system uses radio frequency identification (RFID) technology to enable mobile vehicles equipped with an onboard unit (OBU) to communicate with roadside units (RSU) for data collection [ 37 ]. The collection period was from 3 to 10 September 2020.…”
Section: Methodsmentioning
confidence: 99%
“…However, this approach is inefficient due to extensive hashing operations [101]. Based on physically unclonable function (PUF), a cloud-based RFID scheme is presented in [102]. Similarly, PUF-based protocols are developed in [103], [104], [105], [106].…”
Section: Security Schemes For Cloud Environmentmentioning
confidence: 99%
“…Similarly, PUF-based protocols are developed in [103], [104], [105], [106]. Although the scheme in [102] is efficient and trustworthy, PUF-based schemes have stability challenges. Similarly, the approach in [107] is susceptible to password guessing and impersonation attacks [108].…”
Section: Security Schemes For Cloud Environmentmentioning
confidence: 99%
“…Kumar et al in [130] focused on IoT solutions for vehicles. The authors proposed an authentication protocol based on RFID and PUF technologies.…”
Section: Mirsaraei Et Al Inmentioning
confidence: 99%