Novel ECC-Based RFID Mutual Authentication Protocol for Emerging IoT Applications

被引:19
|
作者
Gabsi, Souhir [1 ,2 ]
Kortli, Yassin [2 ]
Beroulle, Vincent [1 ]
Kieffer, Yann [1 ]
Alasiry, Areej [3 ]
Hamdi, Belgacem [2 ]
机构
[1] Univ Grenoble Alpes, LCIS Lab, Grenoble INP, F-26000 Valence, France
[2] Univ Monastir, Fac Sci Monastir, Elect & Microelect Lab, Monastir 5019, Tunisia
[3] King Khalid Univ, Coll Comp Sci, Abha 61413, Saudi Arabia
关键词
Protocols; Radiofrequency identification; Security; Authentication; Cryptography; Wireless communication; Servers; IoT; RFID protocol; mutual authentication; ECC; server spoofing; tracking; AVISPA; HLPSL; CRYPTANALYSIS; SECURE;
D O I
10.1109/ACCESS.2021.3112554
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The implementation of RFID technology has globally impacted several industries and this revolution has improved the aspects of service delivery in many sectors, such as logistics, supply chain visibility, access control, military, and agri-food sector. RFID provides several security services to protect the data transmitted between a tag and a reader in the IoT environment. However, these advantages do not prevent an attacker to access this communication and remaining various security and privacy issues in these systems. Furthermore, with the rapid growth of IoT, there is an urgent need of security authentication and confidential data protection. Authentication protocols based on cryptographic primitives were widely investigated and implemented to guarantee protection against various attacks that can suffer an RFID system. Among those cryptosystems is the Elliptic Curve Integrated Encryption Scheme (ECIES), which can be found in several cryptographic standards. It offers mutual authentication and data integrity that has become highly employed in RFID applications. In this paper, we present a novel secure ECC-based RFID authentication protocol that meets the security needs of existing published protocols and ensures data confidentiality and privacy. Beforehand, we present an overview of some ECC-based RFID authentication protocols and highlight their security weaknesses against server spoofing, tracking, and impersonation attacks. After that, a comparative study with existing protocols in terms of computational performance and security strength is performed. Finally, our protocol is analyzed and verified with the Automated Validation of Internet Security Protocols and Applications (AVISPA) analysis tool after being modeled in High Level Protocol Specification Language (HLPSL).
引用
收藏
页码:130895 / 130913
页数:19
相关论文
共 50 条
  • [1] ECC-based RFID/NFC Mutual Authentication Protocol
    Huo, Weiguang
    Dong, Qingkuan
    Chen, Yuan
    PROCEEDINGS OF THE 2015 2ND INTERNATIONAL WORKSHOP ON MATERIALS ENGINEERING AND COMPUTER SCIENCES (IWMECS 2015), 2015, 33 : 169 - 177
  • [2] A Novel ECC-based RFID Authentication Protocol
    Fang Mingwei
    Wu Junjun
    Zhang Xinfang
    Chen Hong
    ADVANCED MATERIALS AND COMPUTER SCIENCE, PTS 1-3, 2011, 474-476 : 1764 - +
  • [3] ECC-Based RFID Authentication Protocol
    Yang X.-C.
    Xu C.-X.
    Li C.-R.
    Journal of Electronic Science and Technology, 2020, 18 (04) : 320 - 329
  • [4] ECC-Based RFID Authentication Protocol
    Xing-Chun Yang
    Chun-Xiang Xu
    Chao-Rong Li
    JournalofElectronicScienceandTechnology, 2020, 18 (04) : 320 - 329
  • [5] A secure ECC-based RFID mutual authentication protocol for internet of things
    Alamr, Amjad Ali
    Kausar, Firdous
    Kim, Jongsung
    Seo, Changho
    JOURNAL OF SUPERCOMPUTING, 2018, 74 (09): : 4281 - 4294
  • [6] A secure ECC-based RFID mutual authentication protocol for internet of things
    Amjad Ali Alamr
    Firdous Kausar
    Jongsung Kim
    Changho Seo
    The Journal of Supercomputing, 2018, 74 : 4281 - 4294
  • [7] New ECC-Based IoT Authentication Protocol for Securing RFID Systems
    Timouhin H.
    Amounas F.
    Azrour M.
    SN Computer Science, 4 (6)
  • [8] Hierarchical ECC-Based RFID Authentication Protocol
    Batina, Lejia
    Seys, Stefaan
    Singelee, Dave
    Verbanwhede, Ingrid
    RFID SECURITY AND PRIVACY, 2012, 7055 : 183 - 201
  • [9] Hierarchical ECC-Based RFID Authentication Protocol
    Batina, Lejla
    Seys, Stefaan
    Singelee, Dave
    Verbauwhede, Ingrid
    RFID: SECURITY AND PRIVACY: 7TH INTERNATIONALWORKSHOP, RFIDSEC 2011, 2012, 7055 : 183 - 201
  • [10] A secure ECC-based mobile RFID mutual authentication protocol and its application
    Chiou, Shin-Yan
    Ko, Wen-Tsai
    Lu, Erl-Huei
    International Journal of Network Security, 2018, 20 (02): : 396 - 402