Next Article in Journal
Resonant Energy Carrier Base Active Charge-Balancing Algorithm
Next Article in Special Issue
A Survey on Applications of Reinforcement Learning in Flying Ad-Hoc Networks
Previous Article in Journal
Energy-Efficient and Reliable Internet of Things for 5G: A Framework for Interference Control
Previous Article in Special Issue
Practical Homomorphic Authentication in Cloud-Assisted VANETs with Blockchain-Based Healthcare Monitoring for Pandemic Control
Article

An Anonymous Mutual Authentication Scheme for RFID-Based Transportation System

by 1,2, 1, 1, 1 and 1,3,*
1
School of Computer and Software, Nanjing University of Information Science and Technology, Nanjing 211800, China
2
School of Information Engineering, Suqian College, Suqian 223800, China
3
Cyberspace Security Research Center, Peng Cheng Laboratory, Shenzhen 518000, China
*
Author to whom correspondence should be addressed.
Electronics 2020, 9(12), 2167; https://doi.org/10.3390/electronics9122167
Received: 29 September 2020 / Revised: 24 November 2020 / Accepted: 7 December 2020 / Published: 17 December 2020
(This article belongs to the Special Issue Wireless Sensor Networks in Intelligent Transportation Systems)
In traditional transportation, each driver usually relies on their experience to determine an appropriate route, which may shorten the driving time and transport cost. However, this may also lead to a waste of time in traffic jams or due to other problems. In recent years, by introducing Internet of Things technology into the transportation system, traffic condition data can be collected and analyzed in real-time, which makes it easier for drivers to choose appropriate routes. However, the transmitted data may be intercepted or falsified, especially in untrusted public communication channels. Some schemes have been proposed to protect personal data, while they are vulnerable to some known attacks. Therefore, we propose a mutual authentication scheme for session key agreement and information encryption before transmitting personal data. This scheme can correctly identify vehicles and information. The Burrows–Abadi–Needham logic proof and our security discussion demonstrate that this authentication scheme can resist the various known attacks, including de-synchronization, the replay attack and the reader lost attack, which is solved for the first time in this field. Compared with some typical schemes, the performance analysis shows that this new scheme realizes a balance between security and computing costs. View Full-Text
Keywords: anonymous; RFID; authentication; WSN; vehicle anonymous; RFID; authentication; WSN; vehicle
Show Figures

Figure 1

MDPI and ACS Style

Ji, S.; Liu, S.; Wang, C.; Qi, R.; Shen, J. An Anonymous Mutual Authentication Scheme for RFID-Based Transportation System. Electronics 2020, 9, 2167. https://doi.org/10.3390/electronics9122167

AMA Style

Ji S, Liu S, Wang C, Qi R, Shen J. An Anonymous Mutual Authentication Scheme for RFID-Based Transportation System. Electronics. 2020; 9(12):2167. https://doi.org/10.3390/electronics9122167

Chicago/Turabian Style

Ji, Sai, Shuai Liu, Chen Wang, Rongxin Qi, and Jian Shen. 2020. "An Anonymous Mutual Authentication Scheme for RFID-Based Transportation System" Electronics 9, no. 12: 2167. https://doi.org/10.3390/electronics9122167

Find Other Styles
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Back to TopTop