IEEE LATIN AMERICA TRANSACTIONS, VOL. 11, NO. 6, DECEMBER 2013
An Improved Scheme for Key Management of
RFID in Vehicular Adhoc Networks
Q. Zhang, M. A. Almulla and A. Boukerche
Abstract— Vehicular Ad hoc Networks (VANETs) are emerging as a promising approach to improving traffic safety and providing a wide range of wireless applications for all road users. This paper addresses an improved authentication scheme for Radio frequency identification (RFID) applied in VANETs. As often being considered as a precondition for the realization of IoT, RFID can be utilized in the vehicles, so as to make the vehicles identifiable and inventoriable by computers as long as they are fitted out with radio tags. One of the public concerns is likely to focus on a certain large number of security and privacy issues. A few light symmetric key management schemes have been proposed for RFID scenarios.
However, as we mentioned already, the authentication methodologies of those light symmetric key management schemes, especially in the scenarios of RFID, are still at an initial phase and call for enormous research efforts. We propose a certificate revocation status validation scheme called EKA2, using the concept of clustering from data mining to evaluate the trustiness of digital certificates. Keywords— Authentication Scheme, RFID, VANETs.
EXTENDED ABSTRACT
T
HERE HAS been growing interest in developing secure and convenient driving conditions in the past decades.
Vehicular Adhoc Networks (VANETs) play an important role in wireless communication amongs vehicles, which emphasizes drivers‘safety and the use of assistance applications. Meanwhile, as a living entity, the Internet is always evolving and developing. Recently a novel paradigm: the
Internet of Things (IoT) is swiftly gaining ground in the scenario of contemporary wireless telecommunications industry. The Internet of Things is driven by the pervasive presence around individuals
References: ipv6 for phone services,” in Consumer Electronics, 2009. ISCE ’09. International Conference on, vol. 2, pp. 1243 –1245, feb. 2007. 370, 2004. Global Telecommunications Conference, 2008. IEEE GLOBECOM 2008 and Mobile Computing, pp. n/a–n/a, 2012. through health social networks,” Computer Communications, 2012.