2023
DOI: 10.3390/s23115198
|View full text |Cite
|
Sign up to set email alerts
|

VASERP: An Adaptive, Lightweight, Secure, and Efficient RFID-Based Authentication Scheme for IoV

Abstract: With the rapid growth in wireless communication and IoT technologies, Radio Frequency Identification (RFID) is applied to the Internet of Vehicles (IoV) to ensure the security of private data and the accuracy of identification and tracking. However, in traffic congestion scenarios, frequent mutual authentication increases the overall computing and communication overhead of the network. For this reason, in this work, we propose a lightweight RFID security fast authentication protocol for traffic congestion scen… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 8 publications
(2 citation statements)
references
References 43 publications
0
2
0
Order By: Relevance
“…A lightweight RFID security rapid verification mechanism for traffic congestion situations was presented by Gong et al 22 , developing a title transfer method for transferring permission to gain access to vehicle tags in non-congestion conditions. The hash function and the elliptic curve cryptography (ECC) technique work together to protect the privacy of automobile users' data, and the edge server was utilized for verification.…”
Section: Enhances Localization Precisionmentioning
confidence: 99%
“…A lightweight RFID security rapid verification mechanism for traffic congestion situations was presented by Gong et al 22 , developing a title transfer method for transferring permission to gain access to vehicle tags in non-congestion conditions. The hash function and the elliptic curve cryptography (ECC) technique work together to protect the privacy of automobile users' data, and the edge server was utilized for verification.…”
Section: Enhances Localization Precisionmentioning
confidence: 99%
“…Cryptography is the study of secure communication techniques that protect against potential attacks and is the science of encryption and decryption techniques, and, as such, involves the use of algorithms and mathematical methods to guarantee the safety and confidentiality of data during conveying and retention. Cryptography is primarily used to protect sensitive information, such as electronic payments, Internet communications, e-mail, and data stored in computer systems [42]. The most basic cryptographic classification is the division of message encryption into Symmetric Cryptography and Public-Key Cryptography Asymmetric Cryptography.…”
Section: Introductionmentioning
confidence: 99%