A provably secure authentication scheme for RFID-enabled UAV applications
نویسندگان
چکیده
Advantages of Physically Uncloneable Functions (PUFs) have led to appearing a substantial number novel identification and authentication based systems such as Radio frequency (RFID), which is expected replace the conventional bar-code system due its advantages real-time recognition considerable objects. For example, RFID can be used identify an unmanned aerial vehicle (UAV) when it attached with tag. In this article, we propose anonymous scheme for RFID-enabled UAV applications using Unclonable Functions. Security performance analyses demonstrate that our proposed secure efficient. Hence, useful several RFID-based application systems.
منابع مشابه
Provably Secure Grouping-Proofs for RFID Tags
We investigate an application of RFIDs referred to in the literature as group scanning, in which several tags are “simultaneously” scanned by a reader device. Our goal is to study the group scanning problem in strong adversarial models. We present a security model for this application and give a formal description of the attending security requirements, focusing on the privacy (anonymity) of th...
متن کاملProvably Secure Metering Scheme
Naor and Pinkas introduced metering schemes at Eurocrypt '98 in order to decide on advertisement fees for web servers. In the schemes, any server should be able to construct a proof to be sent to an audit agency if and only if it has been visited by at least a certain number, say k, of clients. This paper rst shows an attack for their schemes such that only two malicious clients can prevent a s...
متن کاملA Provably-Secure ECC-Based Authentication Scheme for Wireless Sensor Networks
A smart-card-based user authentication scheme for wireless sensor networks (in short, a SUA-WSN scheme) is designed to restrict access to the sensor data only to users who are in possession of both a smart card and the corresponding password. While a significant number of SUA-WSN schemes have been suggested in recent years, their intended security properties lack formal definitions and proofs i...
متن کاملA Provably Secure Certificateless Proxy Signature Scheme
Proxy signature, a variant of digital signature, is in the limelight in recent years for secure communication. For instance, when a manager is occupied with business matters, or travelling on business, he has to delegate an agent to deal with his day-today office concerns. Therefore, a proxy signature scheme is necessary in this scenario. Although identity-based proxy signature schemes have bee...
متن کاملA New Provably Secure Transitive Signature Scheme
A transitive signature scheme allows a signer to publish a graph in an authenticated and cost-saving manner. The resulting authenticated graph is indeed the transitive closure of the graph constructed by edges which are explicitly signed by the signer. A property of the transitive signature scheme enables such scenario is called composability. Composability means that by knowing signatures on t...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Computer Communications
سال: 2021
ISSN: ['1873-703X', '0140-3664']
DOI: https://doi.org/10.1016/j.comcom.2020.11.009