Peer-to-Peer Networking and Applications

, Volume 11, Issue 4, pp 723–734 | Cite as

Secure ultra-lightweight RFID mutual authentication protocol based on transparent computing for IoV

  • Kai Fan
  • Wei Wang
  • Wei Jiang
  • Hui Li
  • Yintang Yang
Part of the following topical collections:
  1. Special Issue on Transparent Computing


Transparent Computing (TC) has become a promising paradigm in the network computing era, the appearance of Transparent Computing have a real impact on the industry. A growing number of cars on the road, in order to reduce road congestion, improve efficiency, and increase travelers satisfaction, IoV (Internet of Vehicles) arises at the proper time. RFID as an excellent sensing equipment is widely used in the IoV. Tags can collect information separately. The surrounding readers transmit the information to the central processing unit by using the Transparent Computing technique. Data sharing is the premise of IoV, drivers can share their information, in the meantime, they do not want to expose their own privacy information, so anonymity and untraceability is very important. Unfortunately, current applicable or proposed protocols fail to satisfy the security, efficiency and usability. In this paper, we propose a mutual authentication protocol to protect driver’s privacy, TC is used in our protocol, so we can make full use of client hardware, improve the quality of user experience. The last but not least, because the existence of OS-level monitoring and attack tracing, system security increase greatly.


RFID Transparent computing Privacy protection Ultra-lightweight 



This work has been financially supported by the National Natural Science Foundation of China (No. 61303216, No. 61272457, No. U1401251, and No. 61373172), the National High Technology Research and Development Program of China (863 Program) (No. 2012AA013102), and National 111 Program of China B16037 and B08038.


  1. 1.
    Li L, Liu J, Yang Y (2012) Research and development of intelligent motor test system. Journal of Computers 7(9):2192–2199Google Scholar
  2. 2.
    Ying Lu, Wenqiang Chen, Xingmin Wei, Fuquan Zhao (2012) “On the application development of 3G technology in automobiles,” Proceedings of the FISITA 2012 World Automotive Congress, 311–325Google Scholar
  3. 3.
    Liu W (2012) Research on cloud computing security problem and strategy. Proceedings of CECNet 2012:1216–1219Google Scholar
  4. 4.
    Z. Wei, Y. Zhang, and J. Yang (2013) “Private assets protection system based on RFID and cloud computing,” Proceedings of CECNet ‘13, 196–198Google Scholar
  5. 5.
    Li T (2005) An immunity based network security risk estimation. Science in China 48(5):557–578MathSciNetzbMATHGoogle Scholar
  6. 6.
    Shi H, Bai X, Ren C, Zhao C (1848-1853) Development of internet of Vehicle's information system based on cloud. Journal of Software 9(7):2014Google Scholar
  7. 7.
    Y. C. Lee, Y. C. Hsieh, P. S. You, et al (2009) “A new ultra-lightweight RFID protocol with mutual authentication,” Proceedings of Information Engineering-volume, 58–61Google Scholar
  8. 8.
    Catteddu D (2010) Cloud computing: benefits, risks and recommendations for information security. Web Application Security:17–17Google Scholar
  9. 9.
    Auto-ID Center (2002) “860MHz–960MHz Class I radio frequency identification tag radio frequency & logical communication interface specification proposed recommendation Version 1.0.0,” Technical Report MIT-AUTOID-TR-007Google Scholar
  10. 10.
    Lee S-M, Hwang YJ, Lee DH, Lim JI (2005) Efficient authentication for low-cost RFID systems. Proceedings of ICCSA 2005:619–627Google Scholar
  11. 11.
    Lee S, Asano T, Kim K (2006) RFID mutual authentication scheme based on synchronized secret information. Proceedings of SCIS 2006:98–98Google Scholar
  12. 12.
    Gildas Avoine and Philippe Oechslin (2005) “RFID traceability: a mulilayer problem,” Proceedings of Financial Cryptography-FC, 125–140Google Scholar
  13. 13.
    T. Li and G. Wang (2007) “Security analysis of two ultralightweight RFID authentication protocols,” Proceedings of the 22nd IFIP TC-11 International Information Security Conference, pp. 109–120Google Scholar
  14. 14.
    P. Peris-Lopez, J. C. Hernandez-Castro, J. M. Estevez-Tapiador, and A. Ribagorda (2006) “LMAP: a real Lightweight mutual authentication protocol for low-cost RFID tags,” Proceedings of RFID’06Google Scholar
  15. 15.
    P. Peris-Lopez, J. C. Hernandez-Castro, J. M. Estevez-Tapiador, and A. Ribagorda (2006) “EMAP: an efficient mutual authentication protocol for low cost RFID tags”, Proceedings of IS’06, 352–361Google Scholar
  16. 16.
    Y. Zhou (2012) “Transparent computing: From concept to implementation,” Proceedings of Information Technology in Medicine and Education, 5–5Google Scholar
  17. 17.
    Zhang Y, Zhou Y (2012) Trans OS: a transparent computing-based operating system for the cloud. International Journal of Cloud Computing 1(4):287–301CrossRefGoogle Scholar
  18. 18.
    Y. Zhang, Y. Zhou (2006) “Transparent computing: a new paradigm for pervasive computing,” Proceedings of Ubiquitous Intelligence and Computing, pp. 1–11Google Scholar
  19. 19.
    Huang S, Wu M, Xiong Y (2014) Mobile transparent computing to enable ubiquitous operating systems and applications. Journal of Advanced Computational Intelligence & Intelligent Informatics 18(1):32–39CrossRefGoogle Scholar
  20. 20.
    Zhang Y, Yang L, Zhou Y et al (2010) Information security underlying transparent computing: impacts, visions and challenges. Web Intelligence & Agent Systems 8(2):203–217Google Scholar
  21. 21.
    G. Li, P. Yang, H. Zhang (2015) “Application of internet of vehicle (IoV) in the Smart City,” Office InformatizationGoogle Scholar
  22. 22.
    Gebremeskel G, Chai Y, Yang Z (2014) The paradigm of big data for augmenting internet of vehicle into the intelligent cloud computing systems. Internet of Vehicles – Technologies and Services 247-261. doi: 10.1007/978-3-319-11167-4_25
  23. 23.
    H. Lin, X. Huang (2014) “Survey on internet of vehicle technology,” Journal of Mechanical & Electrical EngineeringGoogle Scholar
  24. 24.
    Duan X, Wang X, Duan X et al (2012) Design of school bus safety regulation system based on the internet of vehicle technology. Applied Mechanics & Materials 263:2911–2914CrossRefGoogle Scholar
  25. 25.
    Xie W, Xie L, Zhang C et al (2013) Cloud-based RFID authentication. Proceedings of RFID 2013:168–175Google Scholar
  26. 26.
    Lin I, Hsu H, Cheng C (2015) A cloud-based authentication protocol for RFID supply chain systems. Journal of Network & Systems Management 23(4):978–997CrossRefGoogle Scholar
  27. 27.
    Fan K, Li J, Li H, Liang X, Shen X, Yang Y (2014) RSEL: revocable secure efficient lightweight RFID authentication scheme. Concurrency and Computation: Practice and Experience 26(5):1084–1096CrossRefGoogle Scholar
  28. 28.
    Li H, Lin X, Yang H, Liang X, Lu R, Shen X (2053-2064) EPPDR: an efficient privacy-preserving demand response scheme with adaptive key evolution in smart grid. IEEE Transactions on Parallel and Distributed Systems 25(8):2014Google Scholar
  29. 29.
    Chu L, Wu S (2011) An integrated building fire evacuation system with RFID and cloud computing. Proceedings of IIHMSP 2011:17–20Google Scholar
  30. 30.
    Fan K, Gong Y, Liang C, Li H, Yang Y (2015) Lightweight and ultralightweight RFID mutual authentication protocol with cache in the reader for IoT in 5G. Security and Communication Networks. doi: 10.1002/sec.1314 Google Scholar
  31. 31.
    Ma D, Prasad A (2011) A context-aware approach for enhanced security and privacy in RFID electronic toll collection systems. Proceedings of ICCCN 2011:1–6Google Scholar
  32. 32.
    S. Abughazalah, K. Markantonakis, K. Mayes (2015) “Secure improved cloud-based RFID authentication protocol”. Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance, 147–164. doi: 10.1007/978-3-319-17016-9_10
  33. 33.
    Bhaskar P, Ahamed S (2007) Privacy in pervasive computing and open issues. Proceedings of Ares 2007:147–154Google Scholar
  34. 34.
    Li H, Liu D, Dai Y, Luan T (2015) Engineering searchable encryption of mobile cloud networks: when QoE meets QoP. IEEE Wirel Commun 22(4):74–80CrossRefGoogle Scholar
  35. 35.
    Li H, Yang Y, Luan T, Liang X, Zhou L, Shen X (2016) Enabling fine-grained multi-keyword search supporting classified sub-dictionaries over encrypted cloud data. IEEE Transactions on Dependable and Secure Computing 13(3):312–325CrossRefGoogle Scholar
  36. 36.
    Chien H, Chen C (2007) Mutual authentication protocol for RFID conforming to EPC class 1 generation 2 standards. Computer Standards and Interfaces 29:254–259CrossRefGoogle Scholar
  37. 37.
    Tan C et al (2008) Secure and serverless RFID authentication and search protocols. IEEE Trans Wirel Commun 7:1400–1407CrossRefGoogle Scholar
  38. 38.
    Z. Shen, Sh. Liu, (2012) “Security threats and security policy in wireless sensor networks,” Advances in Information Sciences & Service Sciences, 4, 10, 166.Google Scholar

Copyright information

© Springer Science+Business Media New York 2017

Authors and Affiliations

  1. 1.State Key Laboratory of Integrated Service NetworksXidian UniversityXi’anChina
  2. 2.Key Laboratory of Ministry of education for Wide Band-Gap Semicon. Materials and DevicesXidian UniversityXi’anChina

Personalised recommendations