A Secure and Privacy Friendly ECC Based RFID Authentication Protocol for Practical Applications

被引:5
作者
Arslan, Atakan [1 ,2 ]
Colak, Sultan Aldirmaz [1 ]
Erturk, Sarp [1 ]
机构
[1] Kocaeli Univ, Dept Elect & Commun, TR-41380 Kocaeli, Turkey
[2] TUBITAK BILGEM Informat & Informat Secur Res Ctr, TR-41470 Kocaeli, Turkey
关键词
Privacy; Security; RFID; IoT; ECC; Implementation; ELLIPTIC CURVE CRYPTOGRAPHY; MUTUAL AUTHENTICATION; INTERNET; SCHEME; IDENTIFICATION; CRYPTANALYSIS; THINGS; RAC;
D O I
10.1007/s11277-021-08552-7
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Radio frequency identification (RFID) is a promising and widespread wireless communication technology for entity identification or authentication. By the emerging Internet of Things phenomenon, the use of RFID is densely augmenting in various daily life applications. However, RFID systems suffer from security and privacy issues. Recently, many researchers propose RFID authentication protocols based on elliptic curve cryptography (ECC) to efficiently mitigate the aforementioned concerns. In this work, we extensively examine the state-of-the-art RFID authentication protocols based on ECC in terms of security and performance. Some of these works claim that their protocols provide all general security and privacy properties. We revisit Vaudenay's formal privacy model and show that they do not provide forward and/or backward privacy under this model contrary to their claim. Then, we propose a secure, privacy-preserving and efficient ECC based RFID authentication protocol. We also present a security and performance analysis of our proposed protocol and compare it to the existing relevant schemes in detail. Furthermore, we implement our proposal in a real RFID system to demonstrate its practicability. To the best of our knowledge, our proposed scheme is the most efficient ECC based RFID authentication protocol realized in a real-world environment that satisfies all common security and privacy features including backward and forward privacy.
引用
收藏
页码:2653 / 2691
页数:39
相关论文
共 89 条
[41]   A Secure ECC-based RFID Mutual Authentication Protocol to Enhance Patient Medication Safety [J].
Jin, Chunhua ;
Xu, Chunxiang ;
Zhang, Xiaojun ;
Li, Fagen .
JOURNAL OF MEDICAL SYSTEMS, 2016, 40 (01) :1-6
[42]   A Secure RFID Mutual Authentication Protocol for Healthcare Environments Using Elliptic Curve Cryptography [J].
Jin, Chunhua ;
Xu, Chunxiang ;
Zhang, Xiaojun ;
Zhao, Jining .
JOURNAL OF MEDICAL SYSTEMS, 2015, 39 (03)
[43]   A lightweight mutual authentication and key agreement protocol for remote surgery application in Tactile Internet environment [J].
Kamil, Ismaila Adeniyi ;
Ogundoyin, Sunday Oyinlola .
COMPUTER COMMUNICATIONS, 2021, 170 :1-18
[44]  
Kardas, 2013, DEPLOYING OSK LOW RE, P3
[45]  
Kardas Suleyman, 2013, Lightweight Cryptography for Security and Privacy. Second International Workshop, LightSec 2013. Revised Selected Papers: LNCS 8162, P130, DOI 10.1007/978-3-642-40392-7_10
[46]   k-strong privacy for radio frequency identification authentication protocols based on physically unclonable functions [J].
Kardas, Suleyman ;
Celik, Serkan ;
Bingol, Muhammed Ali ;
Kiraz, Mehmet Sabir ;
Demirci, Huseyin ;
Levi, Albert .
WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2015, 15 (18) :2150-2166
[47]   A New Security and Privacy Framework for RFID In Cloud Computing [J].
Kardas, Suleyman ;
Celik, Serkan ;
Bingol, Muhammed Ali ;
Levi, Albert .
2013 IEEE FIFTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), VOL 1, 2013, :171-176
[48]  
KOBLITZ N, 1987, MATH COMPUT, V48, P203, DOI 10.1090/S0025-5718-1987-0866109-5
[49]   The state of elliptic curve cryptography [J].
Koblitz, N ;
Menezes, A ;
Vanstone, S .
DESIGNS CODES AND CRYPTOGRAPHY, 2000, 19 (2-3) :173-193
[50]   A secure authentication protocol for wearable devices environment using ECC [J].
Kumar, Devender ;
Grover, Harmanpreet Singh ;
Adarsh .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 47 (8-15) :8-15