A secure ECC-based RFID mutual authentication protocol for internet of things

被引:49
作者
Alamr, Amjad Ali [1 ]
Kausar, Firdous [1 ]
Kim, Jongsung [2 ,3 ]
Seo, Changho [4 ]
机构
[1] Imam Mohammad bin Saud Islamic Univ, Coll Comp & Informat Sci, Dept Comp Sci, Riyadh, Saudi Arabia
[2] Kookmin Univ, Dept Math, Seoul, South Korea
[3] Kookmin Univ, Dept Financial Informat Secur, Seoul, South Korea
[4] Kongju Natl Univ, Dept Appl Math, Kong Ju, South Korea
基金
新加坡国家研究基金会;
关键词
RFID; ECC; ECDH; Authentication protocol; Internet of things;
D O I
10.1007/s11227-016-1861-1
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Progression of the internet technologies has led to the emergence of internet of things (IoT). One of the familiar deployment of IoT is through radio-frequency identification (RFID) technology. In recent times, RFID based systems are one of the most widely spread applications for tagging and keep tracking purposes in IoT deployment. This is due to their powerful features compared to their counterparts of similar techniques such as barcodes. In contrast, radio-frequency identification systems suffer from various attacks and security threats. The wireless channel used for communication is responsible for the majority of these vulnerabilities. In this paper, we propose a new radio-frequency identification authentication protocol based on elliptic curve cryptography (ECC) to eliminate these vulnerabilities. In addition, we use elliptic curve Diffie-Hellman (ECDH) key agreement protocol to generate a temporary shared key used to encrypt the later transmitted messages. Our protocol achieves a set of security properties likes mutual authentication, anonymity, confidentiality, forward security, location privacy, resistance of man-in-the-middle attack, resistance of replay attack and resistance of impersonation attack. We implement our proposed protocol in real RFID system using Omnikey smartcard reader (Omnikey 5421) and NXP Java smartcards (J3A040). Implementation results shows that our proposed protocol outperform in term of time complexity as compared to other similar protocols and requires less number of operations.
引用
收藏
页码:4281 / 4294
页数:14
相关论文
共 12 条
[1]  
Abdalla M, 2001, LECT NOTES COMPUT SC, V2020, P143
[2]   The Internet of Things: A survey [J].
Atzori, Luigi ;
Iera, Antonio ;
Morabito, Giacomo .
COMPUTER NETWORKS, 2010, 54 (15) :2787-2805
[3]  
Benssalah M., 2012, 2012 IEEE International Conference on RFID-Technologies and Applications (RFID-TA), P97, DOI 10.1109/RFID-TA.2012.6404575
[4]  
Certicom Research, STAND EFF CRYPT SEC
[5]  
Chien Hung-Yu, 2009, DEV IMPLEMENTATION R, P554
[6]  
Chou J. - S., 2011, IACR CRYPTOLOGY EPRI, V2011, P418
[7]   An efficient mutual authentication RFID scheme based on elliptic curve cryptography [J].
Chou, Jue-Sam .
JOURNAL OF SUPERCOMPUTING, 2014, 70 (01) :75-94
[8]   Cryptanalysis and improvement of a robust smart card secured authentication scheme on SIP using elliptic curve cryptography [J].
Farash, Mohammad Sabzinejad ;
Kumari, Saru ;
Bakhtiari, Majid .
MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (08) :4485-4504
[9]  
Gross H, 2015, 20151110 CRYPT EPRIN
[10]   An Analysis of RFID Authentication Schemes for Internet of Things in Healthcare Environment Using Elliptic Curve Cryptography [J].
He, Debiao ;
Zeadally, Sherali .
IEEE INTERNET OF THINGS JOURNAL, 2015, 2 (01) :72-83