UPSRVNet: Ultralightweight, Privacy preserved, and Secure RFID-based authentication protocol for VIoT Networks

Rakesh Kumar1, Sunil K. Singh1, D. K. Lobiyal2
1Department of Computer Science & Engineering, CCET, Panjab University, Chandigarh, India
2School of Computer & Systems Sciences, Jawaharlal Nehru University, New Delhi, India

Tóm tắt

Vehicular Internet of Things (VIoT) refers to integrating Internet of Things (IoT) technology into the transportation sector, specifically vehicles. It aims to enhance transportation safety, efficiency, and sustainability by using connected devices and real-time data exchange between vehicles, road infrastructure, and transportation management systems. RFID can provide valuable insights into the functioning and performance of vehicles, enabling the development of intelligent transportation systems and contributing to the growth of the VIoT. To secure essential driving data tag location, data privacy, and road safety are the primary concerns in the VIoT system. An attacker can perform a variety of attacks on the tag and compromise its privacy through the wireless channel between it and the reader. To ensure secure communication for the various application of the VIoT system, An RFID-based protocol is proposed, which is referred to as UPSRVNet (Ultralightweight, Privacy preserved, and Secure RFID-based authentication protocol for VIoT Networks). The proposed protocol guarantees secure authentication in VIoT networks using ultralightweight, privacy-preserving RFID tags by substituting bit formation and right-shift rotation for high-computing operations like hash functions and encryption/decryption algorithms. It also reduces RFID tags' storage and communication overhead and aims to secure the driver’s location, personal information, and resistance from known attacks. As per the experiment result, the proposed UPSRVNet protocol showed a significant reduction in communication overhead between tag and reader, that is 50%, and the storage cost on the tag is also reduced by 33.33% compared to existing protocols. Due to this, the certification and authentication processes may be performed quickly. The protocol ensured the security requirements by informal analysis using the Scyther tool. A comprehensive analysis of the proposed protocol reveals its substantial advantages over the existing protocol concerning computation complexity, communication efficacy, and storage expenditure.

Tài liệu tham khảo