Font Size: a A A

RFID Based Secure Internet Of Vehicles Authentication Protocol

Posted on:2020-08-23Degree:MasterType:Thesis
Country:ChinaCandidate:Q LuoFull Text:PDF
GTID:2392330602951385Subject:Information security
Abstract/Summary:PDF Full Text Request
The birth of Internet of vehicles(IOV)technology has brought significant changes to people's travel.As a solution to many traffic problems,its emergence has become the focus of attention.Radio Frequency Identification(RFID),as one of the key technologies in the Internet of vehicles system,can not only collect data,but also authenticate the identity of users in IOV.With the rapid development of IOV,the security and privacy issues must be effectively addressed,otherwise its application will be hindered.Therefore,the RFID security authentication protocol is particularly crucial in the Internet of vehicles environment.In this thesis,the security threats faced by RFID technology in the Internet of vehicles environment are studied.Then the security attributes that must be satisfied by the secure RFID authentication scheme are proposed.Next,we study the Internet of vehicles scenarios that need to use RFID.According to the characteristics and requirements of these scenarios,we divide them into two categories and propose two compatible RFID authentication schemes.Due to the short authentication time of the first scenario,we proposed an RFID authentication scheme based on roadside nodes.In order to reduce the communication delay between reader and server in the RFID system,we introduced roadside nodes with certain computing and storage capacity in this scheme.When the reader authenticates a tag,it only needs to communicate with a nearby roadside node.In order to reduce the data storage of roadside nodes,we grouped the tags and numbered them.Roadside nodes only stored the tag groups that frequently appeared in the current area.During authentication,the tag sends its group number to shorten the query time of roadside node database.In order to reduce the computation cost and authentication time of tags,we abandoned the hash function and pseudo-random number generator commonly used on tags and replaced them with Permutation operation and timestamp.Aiming at the characteristics of sufficient authentication time and high security requirements for the second IOV scenario,we proposed a lightweight RFID authentication scheme based on cloud.In this scheme,we also use timestamps instead of pseudo-random number generator,and the combined operation of Permutation and Rotation instead of hash function to reduce the computation cost of tags.In order to ensure the anonymity of tags,the tag information stored in the cloud is encrypted by symmetric encryption algorithm.Only a legitimate reader can decrypt.To prevent the cloud server from being out of sync with the tags when updating,the cloud stores multiple indexes for each tag.We also suffix these indexes to facilitate the removal of asynchronous information from the cloud.We have carried out detailed security analysis and BAN logic proof for the two proposed schemes respectively,so as to demonstrate that the proposed scheme can achieve higher security.In addition,Vivado software was used to simulate the calculation of Permutation and Rotation,so as to verify the lightness of the proposed scheme.Compared with the traditional schemes,the proposed two schemes have advantages in security and efficiency.
Keywords/Search Tags:IOV, RFID, Mutual Authentication, Security and Privacy, Lightweight
PDF Full Text Request
Related items