A Secure and Privacy Friendly ECC Based RFID Authentication Protocol for Practical Applications

被引:5
作者
Arslan, Atakan [1 ,2 ]
Colak, Sultan Aldirmaz [1 ]
Erturk, Sarp [1 ]
机构
[1] Kocaeli Univ, Dept Elect & Commun, TR-41380 Kocaeli, Turkey
[2] TUBITAK BILGEM Informat & Informat Secur Res Ctr, TR-41470 Kocaeli, Turkey
关键词
Privacy; Security; RFID; IoT; ECC; Implementation; ELLIPTIC CURVE CRYPTOGRAPHY; MUTUAL AUTHENTICATION; INTERNET; SCHEME; IDENTIFICATION; CRYPTANALYSIS; THINGS; RAC;
D O I
10.1007/s11277-021-08552-7
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Radio frequency identification (RFID) is a promising and widespread wireless communication technology for entity identification or authentication. By the emerging Internet of Things phenomenon, the use of RFID is densely augmenting in various daily life applications. However, RFID systems suffer from security and privacy issues. Recently, many researchers propose RFID authentication protocols based on elliptic curve cryptography (ECC) to efficiently mitigate the aforementioned concerns. In this work, we extensively examine the state-of-the-art RFID authentication protocols based on ECC in terms of security and performance. Some of these works claim that their protocols provide all general security and privacy properties. We revisit Vaudenay's formal privacy model and show that they do not provide forward and/or backward privacy under this model contrary to their claim. Then, we propose a secure, privacy-preserving and efficient ECC based RFID authentication protocol. We also present a security and performance analysis of our proposed protocol and compare it to the existing relevant schemes in detail. Furthermore, we implement our proposal in a real RFID system to demonstrate its practicability. To the best of our knowledge, our proposed scheme is the most efficient ECC based RFID authentication protocol realized in a real-world environment that satisfies all common security and privacy features including backward and forward privacy.
引用
收藏
页码:2653 / 2691
页数:39
相关论文
共 89 条
  • [1] A provably secure RFID authentication protocol based on ECQV for the medical internet of things
    Agrahari, Abhay Kumar
    Varma, Shirshu
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2021, 14 (03) : 1277 - 1289
  • [2] A secure ECC-based RFID mutual authentication protocol for internet of things
    Alamr, Amjad Ali
    Kausar, Firdous
    Kim, Jongsung
    Seo, Changho
    [J]. JOURNAL OF SUPERCOMPUTING, 2018, 74 (09) : 4281 - 4294
  • [3] Comparison and Feasibility of Various RFID Authentication Methods Using ECC
    Alexander, Pagan, Jr.
    Baashirah, Rania
    Abuzneid, Abdelshakour
    [J]. SENSORS, 2018, 18 (09)
  • [4] DKEM: Secure and efficient Distributed Key Establishment Protocol for Wireless Mesh Networks
    Altop, Duygu Karaoglan
    Bingol, Muhammed Ali
    Levi, Albert
    Savas, Erkay
    [J]. AD HOC NETWORKS, 2017, 54 : 53 - 68
  • [5] Three elliptic curve cryptography-based RFID authentication protocols for Internet of Things
    An, Rui
    Feng, Hui
    Liu, Qin
    Li, Li
    [J]. ADVANCES ON BROAD-BAND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS, 2017, 2 : 857 - 878
  • [6] [Anonymous], 2016, SPECIAL PUBLICATION, V800-57
  • [7] [Anonymous], 2003, RFID Handbook - Fundamentals and Applications in Contactless Smart Cards Identification
  • [8] Are RNGs Achilles' Heel of RFID Security and Privacy Protocols?
    Arslan, Atakan
    Kardas, Suleyman
    Colak, Sultan Aldirmaz
    Erturk, Sarp
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2018, 100 (04) : 1355 - 1375
  • [9] Avoine, 2018, RFID LOUNGE
  • [10] Privacy-Friendly Authentication in RFID Systems: On Sublinear Protocols Based on Symmetric-Key Cryptography
    Avoine, Gildas
    Bingol, Muhammed Ali
    Carpent, Xavier
    Yalcin, Siddika Berna Ors
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2013, 12 (10) : 2037 - 2049