Volume 6, Issue 10 (October 2019), Pages: 1-6
----------------------------------------------
Original Research Paper
Title: Secure vehicle tracking using RFID
Author(s): Ibrahim M. Alseadoon, Rabie A. Ramadan *, Ahmed Y. Khedr, Badr M. Alshammari
Affiliation(s):
College of Computer Science and Engineering, University of Hail, Hail, Saudi Arabia
Full Text - PDF XML
* Corresponding Author.
Corresponding author's ORCID profile: https://orcid.org/0000-0002-0281-9381
Digital Object Identifier:
https://doi.org/10.21833/ijaas.2019.10.001
Abstract:
Localization technology such as GPS is one of the most methods used to guide drivers to their final destination. It is also used in some other applications including tracking. However, it seems that GPS technology by itself might not be sufficient especially in tunnels and mountains. First, to have a strong signal between an orbiting satellite and a GPS receiver, there must be a relatively clear line of sight. Obstructions such as buildings, trees, and large mountain passes can potentially weaken the strength of the signal from the satellites and make the positioning data less reliable. Also, GPS localization signals in most of the tracking applications sent Short Message Service (SMS) that are not never secured. Therefore, SMS signal might be intercepted, eavesdropped, replayed, and modified and this might lead to misguided vehicles, trucks, container cargos and trains. This paper concerns the security of vehicles tracking information for the sake of transportation security. This paper also suggests other localization technology along with GPS for accurate localization such as RFID in addition to proposing a lightweight security algorithm for tracking information.
© 2019 The Authors. Published by IASE.
This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).
Keywords: Localization, Tracking, RFID, Internet of things
Article History: Received 16 March 2019, Received in revised form 12 July 2019, Accepted 17 July 2019
Acknowledgement:
This research was supported by Research Deanship, University of Hail, KSA.
Compliance with ethical standards
Conflict of interest: The authors declare that they have no conflict of interest.
Citation:
Alseadoon IM, Ramadan RA, and Khedr AY et al. (2019). Secure vehicle tracking using RFID. International Journal of Advanced and Applied Sciences, 6(10): 1-6
Permanent Link to this page
Figures
Fig. 1 Fig. 2 Fig. 3 Fig. 4 Fig. 5
Tables
Table 1 Table 2 Table 3
----------------------------------------------
References (13)
- Altunbasak H and Owen H (2007). An architectural framework for data link layer security with security inter-layering. In the 2007 IEEE SoutheastCon, IEEE, Richmond, USA: 607-614. https://doi.org/10.1109/SECON.2007.342975 [Google Scholar]
- Buttyan L and Csik L (2010). Security analysis of reliable transport layer protocols for wireless sensor networks. In the 8th IEEE International Conference on Pervasive Computing and Communications Workshops, IEEE, Mannheim, Germany: 419-424. https://doi.org/10.1109/PERCOMW.2010.5470633 [Google Scholar]
- Infanta J and Hemalatha M (2013). Enhancing building security with RFID and ZigBee. International Journal of Engineering and Technology, 5(1): 265-272. [Google Scholar]
- Kamarulazizi K and Ismail DW (2010). Electronic toll collection system using passive RFID technology. Journal of Theoretical and Applied Information Technology, 22(2): 70-76. [Google Scholar]
- Lee JH and Ernst T (2011). Security issues of IPv6 communications in cooperative intelligent transportation systems (poster). In the IEEE Vehicular Networking Conference, IEEE, Amsterdam, Netherlands: 284-290. https://doi.org/10.1109/VNC.2011.6117112 [Google Scholar]
- Lim TS, Sim SC, and Mansor MM (2009). RFID based attendance system. In the IEEE Symposium on Industrial Electronics and Applications, IEEE, Kuala Lumpur, Malaysia, 2: 778-782. https://doi.org/10.1109/ISIEA.2009.5356360 [Google Scholar]
- Mohandes M (2008). An RFID-based pilgrim identification system (A pilot study). In the 11th International Conference on Optimization of Electrical and Electronic Equipment, IEEE, Brasov, Romania: 107-112. https://doi.org/10.1109/OPTIM.2008.4602508 [Google Scholar]
- Padrón G, García C, Quesada-Arencibia A, Alayón F, and Pérez R (2014). Using massive vehicle positioning data to improve control and planning of public road transport. Sensors (Basel, Switzerland), 14(4): 7342-7358. https://doi.org/10.3390/s140407342 [Google Scholar] PMid:24763212 PMCid:PMC4029661
- Radhamani G and Ramasamy K (2002). Security issues in WAP WTLS protocol. In the IEEE International Conference on Communications, Circuits and Systems and West Sino Expositions, IEEE, Chengdu, China, 1: 483-487. https://doi.org/10.1109/ICCCAS.2002.1180664 [Google Scholar]
- Ramadan RA (2009). Leveraging RFID technology for intelligent classroom. In the 4th International Design and Test Workshop, IEEE, Riyadh, Saudi Arabia: 1-6. https://doi.org/10.1109/IDT.2009.5404113 [Google Scholar]
- Salehi M, Sepahvand I, and Yarahmadi M (2014). TLCSBFL: A traffic lights control system based on fuzzy logic. International Journal of u-and e-Service, Science and Technology, 7(3): 27-34. https://doi.org/10.14257/ijunesst.2014.7.3.03 [Google Scholar]
- Ting-ting C (2012). Study of an underground-based cyclic timetable impact on arrangement for bus schedule reliability. In the International Conference on Information Management, Innovation Management and Industrial Engineering, IEEE, Sanya, China: 3: 503-506. https://doi.org/10.1109/ICIII.2012.6340028 [Google Scholar]
- Usman M, Ahmed I, Aslam MI, Khan S, and Shah UA (2017). SIT: A lightweight encryption algorithm for secure internet of things. International Journal of Advanced Computer Science and Applications, 8(1): 402-411. https://doi.org/10.14569/IJACSA.2017.080151 [Google Scholar]
|