Novel ECC-Based RFID Mutual Authentication Protocol for Emerging IoT Applications

被引:19
|
作者
Gabsi, Souhir [1 ,2 ]
Kortli, Yassin [2 ]
Beroulle, Vincent [1 ]
Kieffer, Yann [1 ]
Alasiry, Areej [3 ]
Hamdi, Belgacem [2 ]
机构
[1] Univ Grenoble Alpes, LCIS Lab, Grenoble INP, F-26000 Valence, France
[2] Univ Monastir, Fac Sci Monastir, Elect & Microelect Lab, Monastir 5019, Tunisia
[3] King Khalid Univ, Coll Comp Sci, Abha 61413, Saudi Arabia
关键词
Protocols; Radiofrequency identification; Security; Authentication; Cryptography; Wireless communication; Servers; IoT; RFID protocol; mutual authentication; ECC; server spoofing; tracking; AVISPA; HLPSL; CRYPTANALYSIS; SECURE;
D O I
10.1109/ACCESS.2021.3112554
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The implementation of RFID technology has globally impacted several industries and this revolution has improved the aspects of service delivery in many sectors, such as logistics, supply chain visibility, access control, military, and agri-food sector. RFID provides several security services to protect the data transmitted between a tag and a reader in the IoT environment. However, these advantages do not prevent an attacker to access this communication and remaining various security and privacy issues in these systems. Furthermore, with the rapid growth of IoT, there is an urgent need of security authentication and confidential data protection. Authentication protocols based on cryptographic primitives were widely investigated and implemented to guarantee protection against various attacks that can suffer an RFID system. Among those cryptosystems is the Elliptic Curve Integrated Encryption Scheme (ECIES), which can be found in several cryptographic standards. It offers mutual authentication and data integrity that has become highly employed in RFID applications. In this paper, we present a novel secure ECC-based RFID authentication protocol that meets the security needs of existing published protocols and ensures data confidentiality and privacy. Beforehand, we present an overview of some ECC-based RFID authentication protocols and highlight their security weaknesses against server spoofing, tracking, and impersonation attacks. After that, a comparative study with existing protocols in terms of computational performance and security strength is performed. Finally, our protocol is analyzed and verified with the Automated Validation of Internet Security Protocols and Applications (AVISPA) analysis tool after being modeled in High Level Protocol Specification Language (HLPSL).
引用
收藏
页码:130895 / 130913
页数:19
相关论文
共 50 条
  • [31] A Robust and Efficient ECC-based Mutual Authentication and Session Key Generation Scheme for Healthcare Applications
    Arezou Ostad-Sharif
    Dariush Abbasinezhad-Mood
    Morteza Nikooghadam
    Journal of Medical Systems, 2019, 43
  • [32] ERAP: ECC based RFID Authentication Protocol
    Ahamed, Sheikh Iqbal
    Rahman, Farzana
    Hoque, Md. Endadul
    12TH IEEE INTERNATIONAL WORKSHOP ON FUTURE TRENDS OF DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2008, : 219 - 225
  • [33] On the Security of an ECC Based RFID Authentication Protocol
    Babaheidarian, Parisa
    Delavar, Mahshid
    Mohajeri, Javad
    2012 9TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2012, : 111 - 114
  • [34] A Secure ECC-Based RFID Authentication Scheme Using Hybrid Protocols
    Liao, Yi-Pin
    Hsiao, Chih-Ming
    Liao, Y.-P. (newsun87@mail.sju.edu.tw), 2013, Springer Science and Business Media Deutschland GmbH (21): : 1 - 13
  • [35] RFID System Mutual Authentication Protocols Based on ECC
    Feng, Li
    Yao, Xuanxia
    IEEE 12TH INT CONF UBIQUITOUS INTELLIGENCE & COMP/IEEE 12TH INT CONF ADV & TRUSTED COMP/IEEE 15TH INT CONF SCALABLE COMP & COMMUN/IEEE INT CONF CLOUD & BIG DATA COMP/IEEE INT CONF INTERNET PEOPLE AND ASSOCIATED SYMPOSIA/WORKSHOPS, 2015, : 1644 - 1649
  • [36] A new ECC-based wireless authentication and key agreement protocol
    Zhang, Juan
    Chen, Guanghui
    Deng, Fangmin
    FIFTH WUHAN INTERNATIONAL CONFERENCE ON E-BUSINESS, VOLS 1-3: INTEGRATION AND INNOVATION THROUGH MEASUREMENT AND MANAGEMENT, 2006, : 1219 - 1225
  • [37] A Robust and Efficient ECC-based Mutual Authentication and Session Key Generation Scheme for Healthcare Applications
    Ostad-Sharif, Arezou
    Abbasinezhad-Mood, Dariush
    Nikooghadam, Morteza
    JOURNAL OF MEDICAL SYSTEMS, 2019, 43 (01)
  • [38] Secure ECC-Based Three-Factor Mutual Authentication Protocol for Telecare Medical Information System
    Ryu, Jongseok
    Oh, Jihyeon
    Kwon, Deokkyu
    Son, Seunghwan
    Lee, Joonyoung
    Park, Yohan
    Park, Youngho
    IEEE ACCESS, 2022, 10 : 11511 - 11526
  • [39] Provably Secure ECC-Based Anonymous Authentication and Key Agreement for IoT
    Hu, Shunfang
    Jiang, Shaoping
    Miao, Qing
    Yang, Fan
    Zhou, Weihong
    Duan, Peng
    APPLIED SCIENCES-BASEL, 2024, 14 (08):
  • [40] Cloud-based lightweight secure RFID mutual authentication protocol in IoT
    Fan, Kai
    Luo, Qi
    Zhang, Kuan
    Yang, Yintang
    INFORMATION SCIENCES, 2020, 527 : 329 - 340