A provably secure authentication scheme for RFID-enabled UAV applications

نویسندگان

چکیده

Advantages of Physically Uncloneable Functions (PUFs) have led to appearing a substantial number novel identification and authentication based systems such as Radio frequency (RFID), which is expected replace the conventional bar-code system due its advantages real-time recognition considerable objects. For example, RFID can be used identify an unmanned aerial vehicle (UAV) when it attached with tag. In this article, we propose anonymous scheme for RFID-enabled UAV applications using Unclonable Functions. Security performance analyses demonstrate that our proposed secure efficient. Hence, useful several RFID-based application systems.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Provably Secure Grouping-Proofs for RFID Tags

We investigate an application of RFIDs referred to in the literature as group scanning, in which several tags are “simultaneously” scanned by a reader device. Our goal is to study the group scanning problem in strong adversarial models. We present a security model for this application and give a formal description of the attending security requirements, focusing on the privacy (anonymity) of th...

متن کامل

Provably Secure Metering Scheme

Naor and Pinkas introduced metering schemes at Eurocrypt '98 in order to decide on advertisement fees for web servers. In the schemes, any server should be able to construct a proof to be sent to an audit agency if and only if it has been visited by at least a certain number, say k, of clients. This paper rst shows an attack for their schemes such that only two malicious clients can prevent a s...

متن کامل

A Provably-Secure ECC-Based Authentication Scheme for Wireless Sensor Networks

A smart-card-based user authentication scheme for wireless sensor networks (in short, a SUA-WSN scheme) is designed to restrict access to the sensor data only to users who are in possession of both a smart card and the corresponding password. While a significant number of SUA-WSN schemes have been suggested in recent years, their intended security properties lack formal definitions and proofs i...

متن کامل

A Provably Secure Certificateless Proxy Signature Scheme

Proxy signature, a variant of digital signature, is in the limelight in recent years for secure communication. For instance, when a manager is occupied with business matters, or travelling on business, he has to delegate an agent to deal with his day-today office concerns. Therefore, a proxy signature scheme is necessary in this scenario. Although identity-based proxy signature schemes have bee...

متن کامل

A New Provably Secure Transitive Signature Scheme

A transitive signature scheme allows a signer to publish a graph in an authenticated and cost-saving manner. The resulting authenticated graph is indeed the transitive closure of the graph constructed by edges which are explicitly signed by the signer. A property of the transitive signature scheme enables such scenario is called composability. Composability means that by knowing signatures on t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Computer Communications

سال: 2021

ISSN: ['1873-703X', '0140-3664']

DOI: https://doi.org/10.1016/j.comcom.2020.11.009