4.6 Article

A new lightweight RFID grouping authentication protocol for multiple tags in mobile environment

Journal

MULTIMEDIA TOOLS AND APPLICATIONS
Volume 76, Issue 21, Pages 22761-22783

Publisher

SPRINGER
DOI: 10.1007/s11042-017-4386-6

Keywords

RFID; Grouping authentication; Multiple tags; Mobile environment

Funding

  1. National Science Foundation of China [61300237, U1536206, U1405254, 61232016, 61402234]
  2. National Basic Research Program 973 [2011CB311808]
  3. Natural Science Foundation of Jiangsu province [BK2012461]
  4. Jiangsu Engineering Center of Network Monitoring in NUIST [KJR1302]
  5. Nanjing University of Information Science and Technology [S8113003001]
  6. Nanjing Project of Science and Technology Activities for Returning from Overseas
  7. Project of six personnel in Jiangsu Province [R2015L06]
  8. CICAEET fund
  9. PAPD fund

Ask authors/readers for more resources

Radio Frequency Identification (RFID) is a promising technology in logistics management of mobile environment. Due to the practical prospects of low-cost RFID tags, multiple tags authentication remains an interesting topic. However, because of the resource restriction of low-cost tags, security and privacy risks remain crucial issues. Lots of research findings have been made emphasizing on the arrangement where single object to be verified is combined with only one tag, while the scenario that one object is attached with multiple tags is out of consideration, especially the authentication of large-size objects. In this paper, a new lightweight RFID grouping authentication protocol for multiple tags in mobile environment is proposed. A number of tags are attached to different parts of the large-size object. The proposed protocol can tolerate missing tags. The tags that do not respond will not disturb the entire authentication process, which guarantees that the object can be timely verified. Moreover, the security analysis shows that this protocol can offer sufficient security assurances and resist various attacks. Besides, the proposed protocol has better performance in terms of the execution time compared to previous studies.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

Article Computer Science, Hardware & Architecture

Cyber Information Retrieval Through Pragmatics Understanding and Visualization

Nan Sun, Jun Zhang, Shang Gao, Leo Yu Zhang, Seyit Camtepe, Yang Xiang

Summary: With the rapid increase of cybersecurity attacks and their significant impact, the amount of cybersecurity-related information has surged. This article proposes an innovative cybersecurity retrieval scheme that uses semantic contents and hidden metadata for automatic indexing and searching of cybersecurity information. A novel cybersecurity search engine is implemented to demonstrate effective and understandable retrieval based on the proposed schema. Comprehensive performance evaluation is conducted on real-world datasets to validate the algorithms and techniques developed for cybersecurity information retrieval. This new engine enables augmented search, cybersecurity analytics, and visualization, aiming to provide direct and efficient results for obtaining and truly understanding cybersecurity information.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2023)

Article Computer Science, Information Systems

SAM: Multi-turn Response Selection Based on Semantic Awareness Matching

Rongjunchen Zhang, Tingmin Wu, Sheng Wen, Surya Nepal, Cecile Paris, Yang Xiang

Summary: This article presents a novel chatbot model called SAM, which is based on Semantic Awareness Matching. SAM utilizes a two-layer matching network to capture similarity and semantic features in the context, and selects appropriate responses based on the matching probability of the two feature types.

ACM TRANSACTIONS ON INTERNET TECHNOLOGY (2023)

Article Geochemistry & Geophysics

Diffraction imaging of discontinuities using migrated dip-angle gathers

Peng Lin, Suping Peng, Yang Xiang, Chuangjian Li, Xiaoqin Cui

Summary: A novel diffraction imaging approach combining the GMD algorithm and LSGDF technique is developed to effectively extract and separate continuous reflections and discontinuous diffractions. The proposed method enhances the resolving power of imaging subsurface geologic structures.

GEOPHYSICS (2023)

Article Geochemistry & Geophysics

Separation and imaging of seismic diffractions using geometric mode decomposition

Peng Lin, Suping Peng, Chuangjian Li, Yang Xiang, Xiaoqin Cui

Summary: This study proposes a novel diffraction separation method using the Fourier-based geometric-mode decomposition (GMDF) algorithm to remove reflections and separate diffractions. The GMDF algorithm effectively represents reflections with linear geometric features by adaptively decomposing seismic data into band-limited modes, and the alternating direction method of the multipliers algorithm is used to solve the GMDF optimization problem. The method demonstrates good performance in removing strong reflections and separating weak diffractions, providing interpreters with detailed structural and stratigraphic information.

GEOPHYSICS (2023)

Article Automation & Control Systems

Cyber Code Intelligence for Android Malware Detection

Junyang Qiu, Qing-Long Han, Wei Luo, Lei Pan, Surya Nepal, Jun Zhang, Yang Xiang

Summary: This article presents a new multiview feature intelligence framework for recognizing evolving malware. The framework learns the representation of a targeted capability through processes like feature analysis, selection, aggregation, and encoding, to detect unknown malware with the same capability.

IEEE TRANSACTIONS ON CYBERNETICS (2023)

Article Geosciences, Multidisciplinary

Hydrochemical and stable isotopes (δ2H and δ18O) changes of groundwater from a spring induced by local earthquakes, Northwest China

Yang Xiang, Suping Peng

Summary: It has been found that small earthquakes can cause changes in the chemical composition and isotopic ratios of cold springs. By continuously monitoring the X10 spring and conducting water chemistry analysis and isotope methods, the study reveals that the changes in chemical ion concentrations and hydrogen-oxygen isotope ratios in the X10 spring are related to local seismic activity. The study suggests that hydrogen and oxygen stable isotopes are more sensitive to seismic activity than commonly used chemical constituents, and combined monitoring of isotopes and water chemistry should be considered in the future to capture hydrogeochemical precursor signals caused by earthquakes.

FRONTIERS IN EARTH SCIENCE (2023)

Article Automation & Control Systems

Detecting Vulnerability on IoT Device Firmware: A Survey

Xiaotao Feng, Xiaogang Zhu, Qing-Long Han, Wei Zhou, Sheng Wen, Yang Xiang

Summary: Internet of things (IoT) devices, accounting for 30% of all network-connected endpoints, pose security risks to companies and attract cybercriminals. Firmware security analysis is crucial to address these risks and protect vulnerable devices. However, the diversity of execution environments and closed source firmware make firmware security analysis challenging. This survey systematically reviews and analyzes research challenges and their solutions in firmware security analysis, introducing various methods and classifying them into four categories. The survey provides insights for software developers, cyber security researchers, and software security engineers.

IEEE-CAA JOURNAL OF AUTOMATICA SINICA (2023)

Article Computer Science, Information Systems

A Lightweight Matrix Factorization for Recommendation With Local Differential Privacy in Big Data

Hao Zhou, Geng Yang, Yang Xiang, Yunlu Bai, Weiya Wang

Summary: This paper proposes a novel lightweight matrix factorization for recommendations, which utilizes user local IoT devices for shard gradients training to address the resource-constrained issue in big data recommendations. A two-phase solution is designed to protect user data security and reduce item dimension, and a stabilization mechanism is introduced to decrease the scale of perturbed gradients. Experimental results show that the proposed scheme achieves good performance in terms of security, accuracy, and efficiency compared to other methods.

IEEE TRANSACTIONS ON BIG DATA (2023)

Article Computer Science, Hardware & Architecture

Lightweight Authentication Scheme for Data Dissemination in Cloud-Assisted Healthcare IoT

Jianghua Liu, Jian Yang, Wei Wu, Xinyi Huang, Yang Xiang

Summary: Recent advancements in IoT and cloud computing have accelerated the development of practical applications, including healthcare systems. However, the sensitive nature of healthcare IoT data and the resource constraints of IoT devices pose challenges for secure dissemination. To address these challenges, a lightweight and secure redactable signature scheme with coarse-grained additional redaction control (CRS) is proposed. The CRS provides security against forgery, redaction attacks, and linkability, with lower computational complexity and communication overhead compared to existing solutions.

IEEE TRANSACTIONS ON COMPUTERS (2023)

Article Computer Science, Hardware & Architecture

How Does Visualisation Help App Practitioners Analyse Android Apps?

Lihong Tang, Tingmin Wu, Xiao Chen, Sheng Wen, Li Li, Xin Xia, Marthie Grobler, Yang Xiang

Summary: Behaviour analysis is crucial for the security verification of suspicious Android applications, but analysts often face significant obstacles. To address this issue, a visualisation tool called VisualDroid is developed based on apps' call graphs, which effectively lowers the barriers to Android behaviour and security analysis. Controlled experiments and a user study demonstrate that VisualDroid improves the effectiveness of behaviour analysis and security awareness.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2023)

Article Medicine, General & Internal

A glycometabolic gene signature associating with immune infiltration and chemosensitivity and predicting the prognosis of patients with osteosarcoma

Fengyan Wang, Kun Yang, Runsang Pan, Yang Xiang, Zhilin Xiong, Pinhao Li, Ke Li, Hong Sun

Summary: This study aimed to establish a glycometabolic gene signature to predict the prognosis of osteosarcoma patients and provide guidance for treatment selection. PRKACB, SEPHS2, GPX7, and PFKFB3 were identified as genes that can be used to construct the glycometabolic gene signature, which had a favorable performance in predicting the prognosis of osteosarcoma patients.

FRONTIERS IN MEDICINE (2023)

Article Energy & Fuels

Introducing masking layer for daytime radiative cooling coating to realize high optical performance, thin thickness, and excellent durability in long-term outdoor application

Yan Dong, Yanan Zou, Xiang Li, Fuqiang Wang, Ziming Cheng, Weifeng Meng, Lingling Chen, Yang Xiang, Tong Wang, Yuying Yan

Summary: The idea of introducing a masking layer to prepare a water-based double-layer PDRC coating with high optical performance and thin thickness is proposed in this study. The PDRC coating achieved high solar reflectance and atmospheric transparent spectrum window emittance, with only 40% of the thickness and 60% of the cost compared to existing water-based PDRC coating. The coating demonstrated efficient cooling performance in large-scale outdoor applications and energy savings in container rooftops, providing compelling evidence for its ability to mitigate carbon emissions and address global climate change.

APPLIED ENERGY (2023)

Article Energy & Fuels

Porous CuCo2O4/CuO microspheres and nanosheets as cathode materials for advanced hybrid supercapacitors

Dongsheng Liu, Yafei Liu, Enhui Bao, Xianglin Ren, Xiaohong Liu, Yang Xiang, Chunju Xu, Yi Li, Huiyu Chen

Summary: The study successfully prepared porous CuCo2O4/CuO microspheres and nanosheets using different methods. These materials exhibited battery-like features and excellent electrochemical performance, indicating great potential for electrochemical energy storage.

JOURNAL OF ENERGY STORAGE (2023)

Article Computer Science, Hardware & Architecture

Abuse-resistant deniable encryption

Yanmei Cao, Jianghong Wei, Yang Xiang, Willy Susilo, Xiaofeng Chen

Summary: Deniable encryption (DE) allows private communication even when adversaries force participants to reveal their secret keys. However, existing DE systems do not consider potential abuse by malicious users. This paper proposes an abuse-resistant DE scheme and provides formal definitions and security analysis. The proposed scheme outperforms existing work in terms of functionality and ciphertext rate.

COMPUTER STANDARDS & INTERFACES (2024)

Article Computer Science, Theory & Methods

Capturing Dynamics of Information Diffusion in SNS: A Survey of Methodology and Techniques

Huacheng Li, Chunhe Xia, Tianbo Wang, Sheng Wen, Chao Chen, Yang Xiang

Summary: Studying information diffusion in SNS is significant for both academia and industry. It contributes to the development of subjects like statistics, sociology, and data mining in theory, and provides fundamental support for downstream applications such as public opinion monitoring, rumor source identification, and viral marketing in practice. This survey investigates and summarizes emerging works in diffusion modeling, including a unified concept, methodologies, classification, comparative studies, representative models, and open issues.

ACM COMPUTING SURVEYS (2023)

No Data Available