2022
DOI: 10.1007/s11227-021-04232-2
|View full text |Cite|
|
Sign up to set email alerts
|

AnonSURP: an anonymous and secure ultralightweight RFID protocol for deployment in internet of vehicles systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
13
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
8

Relationship

1
7

Authors

Journals

citations
Cited by 14 publications
(13 citation statements)
references
References 31 publications
0
13
0
Order By: Relevance
“…Environmental feedback redefines people's understanding of traditional car travels. However, with the rapid development of smart cars, it also raises serious challenges to the security of the existing IoV [30]. Among them, network security and data security have become important scenarios for the sustainable growth of the IoV industry.…”
Section: The Security Of Iovmentioning
confidence: 99%
See 1 more Smart Citation
“…Environmental feedback redefines people's understanding of traditional car travels. However, with the rapid development of smart cars, it also raises serious challenges to the security of the existing IoV [30]. Among them, network security and data security have become important scenarios for the sustainable growth of the IoV industry.…”
Section: The Security Of Iovmentioning
confidence: 99%
“…Whereas rapidly developing IoV technology, the United States and Europe attach great importance to the network security management, protection system construction, data security, and privacy protection of the IoV life cycle [30].…”
Section: The Security Of Iovmentioning
confidence: 99%
“…For read-write tags, they may face the risk of data rewriting. Several researchers have participated in the implementation of low-cost privacy and security protocols to increase their applicability [66], [67]. Many lightweight RFID solutions have been proposed, but they are still expensive, vulnerable to security risks, and do not fully address security issues [58].…”
Section: ) Security Issuesmentioning
confidence: 99%
“…[147] 2022 Suggests a new lightweight RFID authentication protocol that can resist several attacks MT2 [80] 2006 Tag deactivation was proposed by EPCglobal MT3 [148] 2008 Suggests an isolated container made of a metal mesh to protect the privacy of tags [149] 2005 Suggests a new approach to enhance the isolation between receivers and transmitters for passive RFID applications [150] 2019 Proposes a new carrier leakage cancellation technique which is needed in UHF RFID reader circuit [151] 2002 Suggests jamming all neighboring radio channels by an active RF jammer that frequently hinders particular RF channels MT5 [152] 2009 Suggests a look-up mapping mechanism to achieve the goal of location privacy by converting the genuine ID of RFID into an anonymous one. [67] 2022 Proposes an anonymous and secure highlight RFID protocol used specifically for the Internet of Vehicles. [153] 2022 Suggests a lightweight anonymous RFID authentication protocol using XOR and pseudorandom function (PRF) operations [125] 2006 Proposes a novel technique to change an anonymous ID frequently to prevent some privacy issues (e.g., tracking attack) MT6 [154] 2013 Proposes an Physically Unclonable Function (PUF)-based authentication protocol which utilizes a pair of item-level tags to prevent cloning attacks [155] 2020 Proposes a lightweight PUF-based authentication protocol that is used to secure communications between smart meters and neighborhood gateways [156] 2021 Proposes a secure authentication protocol developed based on PUF and AES [157] 2014 Proposes an PUF-based authentication protocol to prevent memory leakage MT7 [158] 2005 Suggests a personal RFID firewall in which all requests from readers to tags must be verified [159] 2006 Proposes a novel idea for a personal RFID-privacy object known as RFID Enhancer Proxy (REP) that operates as a proxy for RFID tags [160] 2008 Proposes a framework which can be used to enhance RFID security by using a proxy.…”
Section: Implementation Techniquesmentioning
confidence: 99%
“…The vehicle networking industry is booming due to the rapid development of emerging technologies such as edge computing, wireless communication, and artificial intelligence [ 1 , 2 , 3 , 4 , 5 , 6 , 7 ]. Compared to visual inspection technology, which relies on “seeing” assets, RFID solutions rely on “listening” by using ultra-high-frequency (UHF) signals to remotely interrogate RFID tags attached to or embedded in objects, which greatly improves the efficiency of traffic control systems, including electronic toll collection, cargo inspection, and vehicle entry control, among other applications [ 8 , 9 ].…”
Section: Introductionmentioning
confidence: 99%