Novel ECC-Based RFID Mutual Authentication Protocol for Emerging IoT Applications

被引:19
|
作者
Gabsi, Souhir [1 ,2 ]
Kortli, Yassin [2 ]
Beroulle, Vincent [1 ]
Kieffer, Yann [1 ]
Alasiry, Areej [3 ]
Hamdi, Belgacem [2 ]
机构
[1] Univ Grenoble Alpes, LCIS Lab, Grenoble INP, F-26000 Valence, France
[2] Univ Monastir, Fac Sci Monastir, Elect & Microelect Lab, Monastir 5019, Tunisia
[3] King Khalid Univ, Coll Comp Sci, Abha 61413, Saudi Arabia
关键词
Protocols; Radiofrequency identification; Security; Authentication; Cryptography; Wireless communication; Servers; IoT; RFID protocol; mutual authentication; ECC; server spoofing; tracking; AVISPA; HLPSL; CRYPTANALYSIS; SECURE;
D O I
10.1109/ACCESS.2021.3112554
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The implementation of RFID technology has globally impacted several industries and this revolution has improved the aspects of service delivery in many sectors, such as logistics, supply chain visibility, access control, military, and agri-food sector. RFID provides several security services to protect the data transmitted between a tag and a reader in the IoT environment. However, these advantages do not prevent an attacker to access this communication and remaining various security and privacy issues in these systems. Furthermore, with the rapid growth of IoT, there is an urgent need of security authentication and confidential data protection. Authentication protocols based on cryptographic primitives were widely investigated and implemented to guarantee protection against various attacks that can suffer an RFID system. Among those cryptosystems is the Elliptic Curve Integrated Encryption Scheme (ECIES), which can be found in several cryptographic standards. It offers mutual authentication and data integrity that has become highly employed in RFID applications. In this paper, we present a novel secure ECC-based RFID authentication protocol that meets the security needs of existing published protocols and ensures data confidentiality and privacy. Beforehand, we present an overview of some ECC-based RFID authentication protocols and highlight their security weaknesses against server spoofing, tracking, and impersonation attacks. After that, a comparative study with existing protocols in terms of computational performance and security strength is performed. Finally, our protocol is analyzed and verified with the Automated Validation of Internet Security Protocols and Applications (AVISPA) analysis tool after being modeled in High Level Protocol Specification Language (HLPSL).
引用
收藏
页码:130895 / 130913
页数:19
相关论文
共 50 条
  • [41] Cryptanalysis of Arshad et al.'s ECC-based mutual authentication scheme for session initiation protocol
    Tang, Hongbin
    Liu, Xinsong
    MULTIMEDIA TOOLS AND APPLICATIONS, 2013, 65 (03) : 321 - 333
  • [42] A provably secure ECC-based access and handover authentication protocol for space information networks
    Guo, Junyan
    Du, Ye
    Zhang, Yahang
    Li, Meihong
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2021, 193
  • [43] A Novel Lightweight Block Cipher-Based Mutual Authentication Protocol for Constrained Environments
    Trinh, Cuong
    Huynh, Bao
    Lansky, Jan
    Mildeova, Stanislava
    Safkhani, Masoumeh
    Bagheri, Nasour
    Kumari, Saru
    Hosseinzadeh, Mehdi
    IEEE ACCESS, 2020, 8 : 165536 - 165550
  • [44] ECC-Based Authentication Protocol for Military Internet of Drone (IoD): A Holistic Security Framework
    Choe, Hyeon
    Kang, Dongsu
    IEEE ACCESS, 2025, 13 : 21503 - 21519
  • [45] ECC-Based Anonymous and Multi-factor Authentication Scheme for IoT Environment
    Dargaoui, Souhayla
    Azrour, Mourade
    El Allaoui, Ahmad
    Guezzaz, Azidine
    Alabdulatif, Abdulatif
    Ahmad, Sultan
    INTERNATIONAL JOURNAL OF ONLINE AND BIOMEDICAL ENGINEERING, 2025, 21 (01) : 56 - 75
  • [46] A Secure ECC-Based RFID Authentication Scheme Using Hybrid Protocols
    Liao, Yi-Pin
    Hsiao, Chih-Ming
    Liao, Y.-P. (newsun87@mail.sju.edu.tw), 2013, Springer Science and Business Media Deutschland GmbH (21): : 1 - 13
  • [47] LRMAPC: a lightweight RFID mutual authentication protocol with cache in the reader for IoT
    Fan, Kai
    Liang, Chen
    Li, Hui
    Yang, Yintang
    2014 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY (CIT), 2014, : 276 - 280
  • [48] Cryptanalysis of a Hash Based Mutual RFID Tag Authentication Protocol
    Sun, Da-Zhi
    Zhong, Ji-Dong
    WIRELESS PERSONAL COMMUNICATIONS, 2016, 91 (03) : 1085 - 1093
  • [49] A novel ECC-based provably secure and privacy-preserving multi-factor authentication protocol for cloud computing
    Shukla, Shivangi
    Patel, Sankita J.
    COMPUTING, 2022, 104 (05) : 1173 - 1202
  • [50] Cloud-based lightweight secure RFID mutual authentication protocol in IoT
    Fan, Kai
    Luo, Qi
    Zhang, Kuan
    Yang, Yintang
    INFORMATION SCIENCES, 2020, 527 : 329 - 340