Abstract
Vehicle access control systems exist everywhere in our daily life. However, the simple permit-based verification method is not sufficient for the critical departments such as banks and courts, which need to check not only the identity of the vehicles, but also the vehicle route before reaching the restricted area, as the vehicles can have the access permit if and only if they have traveled along the pre-defined routes. To meet the route-tracking requirement, we proposed a novel access control systems based on the radio frequency identification systems on roads. Particularly, we designed a key cloaking method and a route encryption algorithm so that the access control system can be protected against the attackers from both outside and inside. The analytical results demonstrate that our proposed algorithm can successfully reduce the threat of some malicious attack, such as side-channel attack.
Similar content being viewed by others
References
Cheng W, Cheng X, Song M, Chen B, Zhao W (2012) On the design and deployment of rfid assisted navigation systems for vanets. Parallel Distrib Syst IEEE Trans 23(7):1267–1274
Zhou R, Zhao C, Fu L, Chen A, Ye M (2010) Zigbee-based vehicle access control system. In: Intelligent information technology and security informatics (IITSI), Third International Symposium on. pp. 232–235
Roesner F, Kohno T, Moshchuk A, Parno B, Wang H, Cowan C (2012) User-driven access control: rethinking permission granting in modern operating systems. In: Security and privacy (SP), 2012 IEEE Symposium on. pp. 224–238
Almanza-Ojeda DL, Hernandez-Gutierrez A, Ibarra-Manzano MA (2006) Design and implementation of a vehicular access control using rfid. In: Electronics and photonics. MEP 2006. Multiconference on. pp. 223–225
Deriche M, Mohandes M (2012) A hybrid rfid-lpr system for vehicle access control during pilgrimage season in Saudi Arabia. In: Systems, signals and devices (SSD), 9th International Multi-Conference on. pp. 1–6
Shu Y, Gu Y, Chen J (2012) Sensory-data-enhanced authentication for rfid-based access control systems. In: Mobile ad hoc and sensor systems (MASS), IEEE 9th International Conference on. pp. 236–244
Choi K-H, Lee D (2013) A study about security awareness program based on rfid access control system. In: IT convergence and security 2012. Springer. pp. 87–92
Fan X, Zhang Y (2009) A design of bi-verification vehicle access intelligent control system based on rfid. In: Electronic measurement instruments. ICEMI. 9th International Conference on. pp. 1–569-1-573
Noman Mohammed MD, Fung Benjamin CM (2009) Walking in the crowd: anonymizing trajectory data for pattern analysis. In: Proceedings of the 18th ACM conference on Information and knowledge management
Xu T, Cai Y (2008) Exploring historical location data for anonymity preservation in location-based services. In: INFOCOM. The 27th Conference on Computer Communications. IEEE
Nergiz ME, Saygin Y, Atzori M (2008) Towards trajectory anonymization: a generalization-based approach. In: SPRINGL ’08 Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS
Abul O, Bonchi F, Nanni M (2008) Never walk alone: uncertainty for anonymity in moving objects databases. In Data engineering, 2008. ICDE 2008. IEEE 24th International Conference on. pp. 376–385
Yarovoy R, Lakshmanan LV, Wang WH, Francesco B (2009) Anonymizing moving objects: how to hide a mob in a crowd?. In: Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology
Gidofalvi G, Huang X, Pedersen T (2007) Privacy-preserving data mining on moving object trajectories. In: Mobile data management, 2007 International Conference on, pp. 60–68
Sweeney L (2002) K-anonymity: a model for protecting privacy. 10(557)
Terrovitis M, Mamoulis N (2008) Privacy preservation in the publication of trajectories. In: Mobile data management, 2008. MDM ’08. 9th International Conference on, pp. 65–72
Gruteser M, Liu X (2004) Protecting privacy, in continuous location-tracking applications. Secur Priv IEEE 2(2):28–34
Marc Joye J-JQ (2001) Hessian elliptic curves and side-channel attacks. Third international workshop paris. Springer, Berlin, pp 402–410
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Lu, Y., Li, X., Wei, X. et al. Secured access control for vehicles in RFID systems on roads. Pers Ubiquit Comput 18, 1893–1900 (2014). https://doi.org/10.1007/s00779-014-0794-z
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00779-014-0794-z