Novel ECC-Based RFID Mutual Authentication Protocol for Emerging IoT Applications

被引:19
|
作者
Gabsi, Souhir [1 ,2 ]
Kortli, Yassin [2 ]
Beroulle, Vincent [1 ]
Kieffer, Yann [1 ]
Alasiry, Areej [3 ]
Hamdi, Belgacem [2 ]
机构
[1] Univ Grenoble Alpes, LCIS Lab, Grenoble INP, F-26000 Valence, France
[2] Univ Monastir, Fac Sci Monastir, Elect & Microelect Lab, Monastir 5019, Tunisia
[3] King Khalid Univ, Coll Comp Sci, Abha 61413, Saudi Arabia
关键词
Protocols; Radiofrequency identification; Security; Authentication; Cryptography; Wireless communication; Servers; IoT; RFID protocol; mutual authentication; ECC; server spoofing; tracking; AVISPA; HLPSL; CRYPTANALYSIS; SECURE;
D O I
10.1109/ACCESS.2021.3112554
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The implementation of RFID technology has globally impacted several industries and this revolution has improved the aspects of service delivery in many sectors, such as logistics, supply chain visibility, access control, military, and agri-food sector. RFID provides several security services to protect the data transmitted between a tag and a reader in the IoT environment. However, these advantages do not prevent an attacker to access this communication and remaining various security and privacy issues in these systems. Furthermore, with the rapid growth of IoT, there is an urgent need of security authentication and confidential data protection. Authentication protocols based on cryptographic primitives were widely investigated and implemented to guarantee protection against various attacks that can suffer an RFID system. Among those cryptosystems is the Elliptic Curve Integrated Encryption Scheme (ECIES), which can be found in several cryptographic standards. It offers mutual authentication and data integrity that has become highly employed in RFID applications. In this paper, we present a novel secure ECC-based RFID authentication protocol that meets the security needs of existing published protocols and ensures data confidentiality and privacy. Beforehand, we present an overview of some ECC-based RFID authentication protocols and highlight their security weaknesses against server spoofing, tracking, and impersonation attacks. After that, a comparative study with existing protocols in terms of computational performance and security strength is performed. Finally, our protocol is analyzed and verified with the Automated Validation of Internet Security Protocols and Applications (AVISPA) analysis tool after being modeled in High Level Protocol Specification Language (HLPSL).
引用
收藏
页码:130895 / 130913
页数:19
相关论文
共 50 条
  • [21] RESEAP: An ECC-Based Authentication and Key Agreement Scheme for IoT Applications
    Safkhani, Masoumeh
    Bagheri, Nasour
    Kumari, Saru
    Tavakoli, Hamidreza
    Kumar, Sachin
    Chen, Jiahui
    IEEE ACCESS, 2020, 8 : 200851 - 200862
  • [22] ECC-based lightweight mutual authentication protocol for fog enabled IoT system using three-way authentication procedure
    Verma, Upendra
    Bhardwaj, Diwakar
    INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2021, 24 (05) : 505 - 516
  • [23] ECC-based lightweight authentication protocol with untraceability for low-cost RFID
    Chien, Hung-Yu
    Laih, Chi-Sung
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2009, 69 (10) : 848 - 853
  • [24] ERASMIS: An ECC-based robust authentication protocol suitable for medical IoT systems
    Servati, Mohammad Reza
    Safkhani, Masoumeh
    Rahmani, Amir Masoud
    Hosseinzadeh, Mehdi
    COMPUTER NETWORKS, 2025, 258
  • [25] A review and analysis of secure and lightweight ECC-based RFID authentication protocol for Internet of Vehicles
    Kumar, Sanjeev
    Banka, Haider
    Kaushik, Baijnath
    Sharma, Surbhi
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2021, 32 (11)
  • [26] An ECC-based authentication protocol for fog-IoT enabled smart home environment
    Mohanta B.K.
    Jena D.
    Patnaik S.
    Mohanta, Bhabendu Kumar (C116004@iiit-bh.ac.in), 1600, Inderscience Publishers (20): : 25 - 46
  • [27] A Secure and Efficient ECC-Based Anonymous Authentication Protocol
    Wang, Feifei
    Xu, Guoai
    Gu, Lize
    SECURITY AND COMMUNICATION NETWORKS, 2019, 2019
  • [28] A Lightweight ECC-Based Authentication Scheme for Internet of Things (IoT)
    Hammi, Badis
    Fayad, Achraf
    Khatoun, Rida
    Zeadally, Sherali
    Begriche, Youcef
    IEEE SYSTEMS JOURNAL, 2020, 14 (03): : 3440 - 3450
  • [29] ERMAP: ECC-based robust mutual authentication protocol for smart grid communication with AVISPA simulations
    Rajaram, Sangeetha
    Vollala, Satyanarayana
    Ramasubramanian, N.
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2022, 41 (04) : 232 - 245
  • [30] A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol
    Liao, Yi-Pin
    Hsiao, Chih-Ming
    AD HOC NETWORKS, 2014, 18 : 133 - 146