Skip to main content
Top
Published in: The Journal of Supercomputing 1/2024

06-07-2023

UPSRVNet: Ultralightweight, Privacy preserved, and Secure RFID-based authentication protocol for VIoT Networks

Authors: Rakesh Kumar, Sunil K. Singh, D. K. Lobiyal

Published in: The Journal of Supercomputing | Issue 1/2024

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Vehicular Internet of Things (VIoT) refers to integrating Internet of Things (IoT) technology into the transportation sector, specifically vehicles. It aims to enhance transportation safety, efficiency, and sustainability by using connected devices and real-time data exchange between vehicles, road infrastructure, and transportation management systems. RFID can provide valuable insights into the functioning and performance of vehicles, enabling the development of intelligent transportation systems and contributing to the growth of the VIoT. To secure essential driving data tag location, data privacy, and road safety are the primary concerns in the VIoT system. An attacker can perform a variety of attacks on the tag and compromise its privacy through the wireless channel between it and the reader. To ensure secure communication for the various application of the VIoT system, An RFID-based protocol is proposed, which is referred to as UPSRVNet (Ultralightweight, Privacy preserved, and Secure RFID-based authentication protocol for VIoT Networks). The proposed protocol guarantees secure authentication in VIoT networks using ultralightweight, privacy-preserving RFID tags by substituting bit formation and right-shift rotation for high-computing operations like hash functions and encryption/decryption algorithms. It also reduces RFID tags' storage and communication overhead and aims to secure the driver’s location, personal information, and resistance from known attacks. As per the experiment result, the proposed UPSRVNet protocol showed a significant reduction in communication overhead between tag and reader, that is 50%, and the storage cost on the tag is also reduced by 33.33% compared to existing protocols. Due to this, the certification and authentication processes may be performed quickly. The protocol ensured the security requirements by informal analysis using the Scyther tool. A comprehensive analysis of the proposed protocol reveals its substantial advantages over the existing protocol concerning computation complexity, communication efficacy, and storage expenditure.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Shariq M, Singh K, Maurya PK, Ahmadian A, Taniar D (2022) AnonSURP: an anonymous and secure ultralightweight RFID protocol for deployment on the internet of vehicle systems. J Supercomput, pp 1–26 Shariq M, Singh K, Maurya PK, Ahmadian A, Taniar D (2022) AnonSURP: an anonymous and secure ultralightweight RFID protocol for deployment on the internet of vehicle systems. J Supercomput, pp 1–26
2.
go back to reference Shariq M, Singh K, Maurya PK, Ahmadian A, Ariffin MRK (2021) Urasp: an ultralightweight RFID authentication scheme using permutation operation. Peer-to-Peer Netw Appl pp 1–21 Shariq M, Singh K, Maurya PK, Ahmadian A, Ariffin MRK (2021) Urasp: an ultralightweight RFID authentication scheme using permutation operation. Peer-to-Peer Netw Appl pp 1–21
3.
go back to reference Adeli M, Bagheri N (2021) Mdsbsp: a search protocol based on mds codes for RFID-based internet of vehicle. The J Supercomput 77(2):1094–1113CrossRef Adeli M, Bagheri N (2021) Mdsbsp: a search protocol based on mds codes for RFID-based internet of vehicle. The J Supercomput 77(2):1094–1113CrossRef
4.
go back to reference Fan K, Jiang W, Luo Q, Li H, Yang Y (2019) Cloud-based RFID mutual authentication scheme for efficient privacy-preserving in iov. J Franklin Inst Fan K, Jiang W, Luo Q, Li H, Yang Y (2019) Cloud-based RFID mutual authentication scheme for efficient privacy-preserving in iov. J Franklin Inst
5.
go back to reference Fan K, Kang J, Zhu S, Li H, Yang Y (2019) Permutation matrix encryption-based ultralightweight secure RFID scheme in the internet of vehicles. Sensors 19(1):152CrossRef Fan K, Kang J, Zhu S, Li H, Yang Y (2019) Permutation matrix encryption-based ultralightweight secure RFID scheme in the internet of vehicles. Sensors 19(1):152CrossRef
6.
go back to reference Fan K, Wang W, Jiang W, Li H, Yang Y (2018) Secure ultra-lightweight RFID mutual authentication protocol based on transparent computing for iov. Peer-to-Peer Netw Appl 11(4):723–734CrossRef Fan K, Wang W, Jiang W, Li H, Yang Y (2018) Secure ultra-lightweight RFID mutual authentication protocol based on transparent computing for iov. Peer-to-Peer Netw Appl 11(4):723–734CrossRef
7.
go back to reference Fan K, Jiang W, Li H, Yang Y (2018) Lightweight RFID protocol for medical privacy protection in IoT. IEEE Trans Industr Inf 14(4):1656–1665CrossRef Fan K, Jiang W, Li H, Yang Y (2018) Lightweight RFID protocol for medical privacy protection in IoT. IEEE Trans Industr Inf 14(4):1656–1665CrossRef
8.
go back to reference Wu F, Xu L, Kumari S, Li X, Das AK, Shen J (2018) A lightweight and anonymous RFID tag authentication protocol with cloud assistance for e-healthcare applications. J Ambient Intell Humaniz Comput 9(4):919–930CrossRef Wu F, Xu L, Kumari S, Li X, Das AK, Shen J (2018) A lightweight and anonymous RFID tag authentication protocol with cloud assistance for e-healthcare applications. J Ambient Intell Humaniz Comput 9(4):919–930CrossRef
9.
go back to reference Benssalah M, Djeddou M, Drouiche K (2017) A provably secure RFID authentication protocol based on elliptic curve signature with message recovery suitable for m-Health environments. Trans Emerg Telecommun Technol 28(11):e3166CrossRef Benssalah M, Djeddou M, Drouiche K (2017) A provably secure RFID authentication protocol based on elliptic curve signature with message recovery suitable for m-Health environments. Trans Emerg Telecommun Technol 28(11):e3166CrossRef
10.
go back to reference Xiao H, Alshehri AA, Christianson B (2016) A cloud-based RFID authentication protocol with insecure communication channels. In: 2016 IEEE Trustcom/BigDataSE/ISPA, pp 332–339. IEEE Xiao H, Alshehri AA, Christianson B (2016) A cloud-based RFID authentication protocol with insecure communication channels. In: 2016 IEEE Trustcom/BigDataSE/ISPA, pp 332–339. IEEE
11.
go back to reference Surekha B, Narayana KL, Jayaprakash P, Vorugunti CS (2016) A realistic lightweight authentication protocol for securing cloud-based RFID system. In: 2016 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM), pp. 54–60. IEEE Surekha B, Narayana KL, Jayaprakash P, Vorugunti CS (2016) A realistic lightweight authentication protocol for securing cloud-based RFID system. In: 2016 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM), pp. 54–60. IEEE
12.
go back to reference Abughazalah S, Markantonakis K, Mayes K (2014) Secure improved cloud-based RFID authentication protocol. In: data privacy management, autonomous spontaneous security, and security assurance, pp. 147–164. Springer Abughazalah S, Markantonakis K, Mayes K (2014) Secure improved cloud-based RFID authentication protocol. In: data privacy management, autonomous spontaneous security, and security assurance, pp. 147–164. Springer
13.
go back to reference Xie W, Xie L, Zhang C, Zhang Q, Tang C (2013) Cloud-based Rfid authentication. In: 2013 IEEE International Conference on RFID (RFID), pp. 168–175. IEEE Xie W, Xie L, Zhang C, Zhang Q, Tang C (2013) Cloud-based Rfid authentication. In: 2013 IEEE International Conference on RFID (RFID), pp. 168–175. IEEE
14.
go back to reference Bilal Z, Masood A, Kausar F (2009) Security analysis of ultra-lightweight cryptographic protocol for low-cost RFID tags: gossamer protocol. In: 2009 International Conference on Network-Based Information Systems, pp. 260–267. IEEE Bilal Z, Masood A, Kausar F (2009) Security analysis of ultra-lightweight cryptographic protocol for low-cost RFID tags: gossamer protocol. In: 2009 International Conference on Network-Based Information Systems, pp. 260–267. IEEE
15.
go back to reference Peris-Lopez P, Hernandez-Castro JC, Tapiador JM, Ribagorda A (2008) Advances in ultralightweight cryptography for low-cost RFID tags: gossamer protocol. In: International workshop on information security applications, pp. 56–68. Springer Peris-Lopez P, Hernandez-Castro JC, Tapiador JM, Ribagorda A (2008) Advances in ultralightweight cryptography for low-cost RFID tags: gossamer protocol. In: International workshop on information security applications, pp. 56–68. Springer
16.
go back to reference Phan RCW (2008) Cryptanalysis of a new ultralightweight RFID authentication protocol-sasi. IEEE Trans Depend Secure Comput 6(4):316–320CrossRef Phan RCW (2008) Cryptanalysis of a new ultralightweight RFID authentication protocol-sasi. IEEE Trans Depend Secure Comput 6(4):316–320CrossRef
17.
go back to reference Chien HY (2007) Sasi: a new ultralightweight RFID authentication protocol providing strong authentication and strong integrity. IEEE Trans Depend Secure Comput 4(4):337–340CrossRef Chien HY (2007) Sasi: a new ultralightweight RFID authentication protocol providing strong authentication and strong integrity. IEEE Trans Depend Secure Comput 4(4):337–340CrossRef
18.
go back to reference Li T, Wang G (2007) Security Analysis of Two Ultra-Lightweight RFID Authentication Protocols. In: IFIP International Information Security Conference, pp. 109–120. Springer Li T, Wang G (2007) Security Analysis of Two Ultra-Lightweight RFID Authentication Protocols. In: IFIP International Information Security Conference, pp. 109–120. Springer
19.
go back to reference Peris-Lopez P, Hernandez-Castro JC, Estevez-Tapiador JM, Ribagorda A (2006) Emap: an efficient mutual-authentication protocol for low-cost rfid tags. In: OTM Confederated International Conferences “On the Move to Meaningful Internet Systems,” pp. 352–361. Springer Peris-Lopez P, Hernandez-Castro JC, Estevez-Tapiador JM, Ribagorda A (2006) Emap: an efficient mutual-authentication protocol for low-cost rfid tags. In: OTM Confederated International Conferences “On the Move to Meaningful Internet Systems,” pp. 352–361. Springer
20.
go back to reference Peris-Lopez P, Hernandez-Castro JC, Estévez-Tapiador JM, Ribagorda A (2006) Lmap: a real lightweight mutual authentication protocol for low-cost rfid tags. In: Proc of 2nd Workshop on RFID Security, vol. 6 Peris-Lopez P, Hernandez-Castro JC, Estévez-Tapiador JM, Ribagorda A (2006) Lmap: a real lightweight mutual authentication protocol for low-cost rfid tags. In: Proc of 2nd Workshop on RFID Security, vol. 6
21.
go back to reference Peris-Lopez P, Hernandez-Castro JC, Estevez-Tapiador JM, Ribagorda A (2006) m2ap: a minimalist mutual-authentication protocol for low-cost rfid tags. In: International Conference on Ubiquitous Intelligence and Computing, pp. 912–923. Springer. Peris-Lopez P, Hernandez-Castro JC, Estevez-Tapiador JM, Ribagorda A (2006) m2ap: a minimalist mutual-authentication protocol for low-cost rfid tags. In: International Conference on Ubiquitous Intelligence and Computing, pp. 912–923. Springer.
22.
go back to reference Aghili SF, Mala H, Kaliyar P, Conti M (2019) SecLAP: secure and lightweight RFID authentication protocol for Medical IoT. Futur Gener Comput Syst 101:621–634CrossRef Aghili SF, Mala H, Kaliyar P, Conti M (2019) SecLAP: secure and lightweight RFID authentication protocol for Medical IoT. Futur Gener Comput Syst 101:621–634CrossRef
23.
go back to reference Singh SK (2021) Linux yourself: concept and programming. CRC Press. Singh SK (2021) Linux yourself: concept and programming. CRC Press.
24.
go back to reference Shariq M, Singh K (2021) A novel vector-space-based lightweight privacy-preserving rfid authentication protocol for iot environment. J Supercomput 77:8532–8562CrossRef Shariq M, Singh K (2021) A novel vector-space-based lightweight privacy-preserving rfid authentication protocol for iot environment. J Supercomput 77:8532–8562CrossRef
25.
go back to reference Shariq M, Singh K, Bajuri MY, Pantelous AA, Ahmadian A, Salimi M (2021) A secure and reliable RFID authentication protocol using digital schnorr cryptosystem for IoT-enabled healthcare in COVID-19 scenario. Sustain Cities Soc 75:103354CrossRef Shariq M, Singh K, Bajuri MY, Pantelous AA, Ahmadian A, Salimi M (2021) A secure and reliable RFID authentication protocol using digital schnorr cryptosystem for IoT-enabled healthcare in COVID-19 scenario. Sustain Cities Soc 75:103354CrossRef
26.
go back to reference Liu YL, Qin XL, Zhao XJ, Hao GS, Dong YQ (2015) Lightweight rfid authentication protocol based on digital signature. Comput Sci 42:95–107 Liu YL, Qin XL, Zhao XJ, Hao GS, Dong YQ (2015) Lightweight rfid authentication protocol based on digital signature. Comput Sci 42:95–107
27.
go back to reference Yang F, Li J, Lei T, Wang S (2017) Architecture and key technologies for internet of vehicles: a survey. J Commun Inf Netw 2(2):1–17CrossRef Yang F, Li J, Lei T, Wang S (2017) Architecture and key technologies for internet of vehicles: a survey. J Commun Inf Netw 2(2):1–17CrossRef
28.
go back to reference Zheng D, Wang J, & Ben K (2013) Research of information processing for massive sensors in extended IOV applications. In 2013 15th IEEE International Conference on Communication Technology (pp. 438–443). IEEE. Zheng D, Wang J, & Ben K (2013) Research of information processing for massive sensors in extended IOV applications. In 2013 15th IEEE International Conference on Communication Technology (pp. 438–443). IEEE.
29.
go back to reference Tian Y, Chen G, Li J (2012) A new ultralightweight RFID authentication protocol with permutation. IEEE Commun Lett 16(5):702–705CrossRef Tian Y, Chen G, Li J (2012) A new ultralightweight RFID authentication protocol with permutation. IEEE Commun Lett 16(5):702–705CrossRef
30.
go back to reference Kumar R, Singh SK, Lobiyal DK, Chui KT, Santaniello D, Rafsanjani MK (2022) A novel decentralized group key management scheme for cloud-based vehicular IoT networks. Int J Cloud Appl Comput (IJCAC) 12(1):1–34 Kumar R, Singh SK, Lobiyal DK, Chui KT, Santaniello D, Rafsanjani MK (2022) A novel decentralized group key management scheme for cloud-based vehicular IoT networks. Int J Cloud Appl Comput (IJCAC) 12(1):1–34
31.
go back to reference Wang X, Fan K, Yang K, Cheng X, Dong Q, Li H, Yang Y (2022) A new RFID ultra-lightweight authentication protocol for medical privacy protection in smart living. Comput Commun 186:121–132CrossRef Wang X, Fan K, Yang K, Cheng X, Dong Q, Li H, Yang Y (2022) A new RFID ultra-lightweight authentication protocol for medical privacy protection in smart living. Comput Commun 186:121–132CrossRef
32.
go back to reference Kumar A, Singh K, Shariq M, Lal C, Conti M, Amin R, Chaudhry SA (2023) An efficient and reliable ultralightweight RFID authentication scheme for healthcare systems. Comput Commun 205:147–157CrossRef Kumar A, Singh K, Shariq M, Lal C, Conti M, Amin R, Chaudhry SA (2023) An efficient and reliable ultralightweight RFID authentication scheme for healthcare systems. Comput Commun 205:147–157CrossRef
33.
go back to reference Sharma S, & Singh SK. (2022) IoT and its uses in Security Surveillance, Insights2Techinfo, pp1. Sharma S, & Singh SK. (2022) IoT and its uses in Security Surveillance, Insights2Techinfo, pp1.
34.
go back to reference Liu N (2011) Internet of vehicles: your next connection. Huawei WinWin 11:23–28 Liu N (2011) Internet of vehicles: your next connection. Huawei WinWin 11:23–28
Metadata
Title
UPSRVNet: Ultralightweight, Privacy preserved, and Secure RFID-based authentication protocol for VIoT Networks
Authors
Rakesh Kumar
Sunil K. Singh
D. K. Lobiyal
Publication date
06-07-2023
Publisher
Springer US
Published in
The Journal of Supercomputing / Issue 1/2024
Print ISSN: 0920-8542
Electronic ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-023-05463-1

Other articles of this Issue 1/2024

The Journal of Supercomputing 1/2024 Go to the issue

Premium Partner