Skip to main content
Log in

Secured access control for vehicles in RFID systems on roads

  • Original Article
  • Published:
Personal and Ubiquitous Computing Aims and scope Submit manuscript

Abstract

Vehicle access control systems exist everywhere in our daily life. However, the simple permit-based verification method is not sufficient for the critical departments such as banks and courts, which need to check not only the identity of the vehicles, but also the vehicle route before reaching the restricted area, as the vehicles can have the access permit if and only if they have traveled along the pre-defined routes. To meet the route-tracking requirement, we proposed a novel access control systems based on the radio frequency identification systems on roads. Particularly, we designed a key cloaking method and a route encryption algorithm so that the access control system can be protected against the attackers from both outside and inside. The analytical results demonstrate that our proposed algorithm can successfully reduce the threat of some malicious attack, such as side-channel attack.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Cheng W, Cheng X, Song M, Chen B, Zhao W (2012) On the design and deployment of rfid assisted navigation systems for vanets. Parallel Distrib Syst IEEE Trans 23(7):1267–1274

    Article  Google Scholar 

  2. Zhou R, Zhao C, Fu L, Chen A, Ye M (2010) Zigbee-based vehicle access control system. In: Intelligent information technology and security informatics (IITSI), Third International Symposium on. pp. 232–235

  3. Roesner F, Kohno T, Moshchuk A, Parno B, Wang H, Cowan C (2012) User-driven access control: rethinking permission granting in modern operating systems. In: Security and privacy (SP), 2012 IEEE Symposium on. pp. 224–238

  4. Almanza-Ojeda DL, Hernandez-Gutierrez A, Ibarra-Manzano MA (2006) Design and implementation of a vehicular access control using rfid. In: Electronics and photonics. MEP 2006. Multiconference on. pp. 223–225

  5. Deriche M, Mohandes M (2012) A hybrid rfid-lpr system for vehicle access control during pilgrimage season in Saudi Arabia. In: Systems, signals and devices (SSD), 9th International Multi-Conference on. pp. 1–6

  6. Shu Y, Gu Y, Chen J (2012) Sensory-data-enhanced authentication for rfid-based access control systems. In: Mobile ad hoc and sensor systems (MASS), IEEE 9th International Conference on. pp. 236–244

  7. Choi K-H, Lee D (2013) A study about security awareness program based on rfid access control system. In: IT convergence and security 2012. Springer. pp. 87–92

  8. Fan X, Zhang Y (2009) A design of bi-verification vehicle access intelligent control system based on rfid. In: Electronic measurement instruments. ICEMI. 9th International Conference on. pp. 1–569-1-573

  9. Noman Mohammed MD, Fung Benjamin CM (2009) Walking in the crowd: anonymizing trajectory data for pattern analysis. In: Proceedings of the 18th ACM conference on Information and knowledge management

  10. Xu T, Cai Y (2008) Exploring historical location data for anonymity preservation in location-based services. In: INFOCOM. The 27th Conference on Computer Communications. IEEE

  11. Nergiz ME, Saygin Y, Atzori M (2008) Towards trajectory anonymization: a generalization-based approach. In: SPRINGL ’08 Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS

  12. Abul O, Bonchi F, Nanni M (2008) Never walk alone: uncertainty for anonymity in moving objects databases. In Data engineering, 2008. ICDE 2008. IEEE 24th International Conference on. pp. 376–385

  13. Yarovoy R, Lakshmanan LV, Wang WH, Francesco B (2009) Anonymizing moving objects: how to hide a mob in a crowd?. In: Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology

  14. Gidofalvi G, Huang X, Pedersen T (2007) Privacy-preserving data mining on moving object trajectories. In: Mobile data management, 2007 International Conference on, pp. 60–68

  15. Sweeney L (2002) K-anonymity: a model for protecting privacy. 10(557)

  16. Terrovitis M, Mamoulis N (2008) Privacy preservation in the publication of trajectories. In: Mobile data management, 2008. MDM ’08. 9th International Conference on, pp. 65–72

  17. Gruteser M, Liu X (2004) Protecting privacy, in continuous location-tracking applications. Secur Priv IEEE 2(2):28–34

    Article  Google Scholar 

  18. Marc Joye J-JQ (2001) Hessian elliptic curves and side-channel attacks. Third international workshop paris. Springer, Berlin, pp 402–410

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wei Cheng.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Lu, Y., Li, X., Wei, X. et al. Secured access control for vehicles in RFID systems on roads. Pers Ubiquit Comput 18, 1893–1900 (2014). https://doi.org/10.1007/s00779-014-0794-z

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00779-014-0794-z

Keywords

Navigation