Skip to main content
. 2023 May 30;23(11):5198. doi: 10.3390/s23115198
Algorithm 1: An adaptive, lightweight, secure, and efficient RFID-based authentication scheme for IoV.

Tagi,Rj Register with the cloud; the cloud synchronizes the RID to the edge server after hashing and encryption

Rj broadcast M1:{Query,Rj1,Rj2,T1} to the surrounding area, where

Rj1=nrG,Rj2=RIDjnrP.

Tagi receive M1:{Query,Rj1,Rj2,T1}

if T2T1ΔT

   compute RIDj=Rj2kRj1

   if rid==RIDJ

      Perform rapid mutual authentication phase

   else

      Perform the transfer of ownership phase

else

   return 0 (Request Timeout)