Abstract
In traditional transportation, each driver usually relies on their experience to determine an appropriate route, which may shorten the driving time and transport cost. However, this may also lead to a waste of time in traffic jams or due to other problems. In recent years, by introducing Internet of Things technology into the transportation system, traffic condition data can be collected and analyzed in real-time, which makes it easier for drivers to choose appropriate routes. However, the transmitted data may be intercepted or falsified, especially in untrusted public communication channels. Some schemes have been proposed to protect personal data, while they are vulnerable to some known attacks. Therefore, we propose a mutual authentication scheme for session key agreement and information encryption before transmitting personal data. This scheme can correctly identify vehicles and information. The Burrows–Abadi–Needham logic proof and our security discussion demonstrate that this authentication scheme can resist the various known attacks, including de-synchronization, the replay attack and the reader lost attack, which is solved for the first time in this field. Compared with some typical schemes, the performance analysis shows that this new scheme realizes a balance between security and computing costs.
Highlights
With wireless network and sensing technology applied to people’s daily routine, various convenient and smart services for people have been developed
In order to ensure that the shared traffic information is reliable, we propose an radio frequency identification (RFID)-based scheme to verify traffic information from vehicles anonymously and resist the usual forms of attack
With various services growing in vehicular ad hoc networks (VANETs), many issues appear in VANET research
Summary
With wireless network and sensing technology applied to people’s daily routine, various convenient and smart services for people have been developed. Based on the received information, the transportation driver or administrator is able to adjust the traveling schedule in the case of traffic jams or accidents These traffic conditions are useful for official roadside management (such as dispersing or limiting vehicle flow) and assistance (such as road repair). For solving the aforementioned privacy problem, we design a new retrieval method to assist the server in searching for the authenticated information, which initially allows multiple readers to identify different tags at the same time. Based on this retrieval method, we can predefine the scope of the tags that each reader recognizes, which is a method to protect data privacy.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.