Novel ECC-Based RFID Mutual Authentication Protocol for Emerging IoT Applications

被引:19
|
作者
Gabsi, Souhir [1 ,2 ]
Kortli, Yassin [2 ]
Beroulle, Vincent [1 ]
Kieffer, Yann [1 ]
Alasiry, Areej [3 ]
Hamdi, Belgacem [2 ]
机构
[1] Univ Grenoble Alpes, LCIS Lab, Grenoble INP, F-26000 Valence, France
[2] Univ Monastir, Fac Sci Monastir, Elect & Microelect Lab, Monastir 5019, Tunisia
[3] King Khalid Univ, Coll Comp Sci, Abha 61413, Saudi Arabia
关键词
Protocols; Radiofrequency identification; Security; Authentication; Cryptography; Wireless communication; Servers; IoT; RFID protocol; mutual authentication; ECC; server spoofing; tracking; AVISPA; HLPSL; CRYPTANALYSIS; SECURE;
D O I
10.1109/ACCESS.2021.3112554
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The implementation of RFID technology has globally impacted several industries and this revolution has improved the aspects of service delivery in many sectors, such as logistics, supply chain visibility, access control, military, and agri-food sector. RFID provides several security services to protect the data transmitted between a tag and a reader in the IoT environment. However, these advantages do not prevent an attacker to access this communication and remaining various security and privacy issues in these systems. Furthermore, with the rapid growth of IoT, there is an urgent need of security authentication and confidential data protection. Authentication protocols based on cryptographic primitives were widely investigated and implemented to guarantee protection against various attacks that can suffer an RFID system. Among those cryptosystems is the Elliptic Curve Integrated Encryption Scheme (ECIES), which can be found in several cryptographic standards. It offers mutual authentication and data integrity that has become highly employed in RFID applications. In this paper, we present a novel secure ECC-based RFID authentication protocol that meets the security needs of existing published protocols and ensures data confidentiality and privacy. Beforehand, we present an overview of some ECC-based RFID authentication protocols and highlight their security weaknesses against server spoofing, tracking, and impersonation attacks. After that, a comparative study with existing protocols in terms of computational performance and security strength is performed. Finally, our protocol is analyzed and verified with the Automated Validation of Internet Security Protocols and Applications (AVISPA) analysis tool after being modeled in High Level Protocol Specification Language (HLPSL).
引用
收藏
页码:130895 / 130913
页数:19
相关论文
共 50 条
  • [41] A Secure and Privacy Friendly ECC Based RFID Authentication Protocol for Practical Applications
    Arslan, Atakan
    Colak, Sultan Aldirmaz
    Erturk, Sarp
    WIRELESS PERSONAL COMMUNICATIONS, 2021, 120 (04) : 2653 - 2691
  • [42] A Secure and Privacy Friendly ECC Based RFID Authentication Protocol for Practical Applications
    Atakan Arslan
    Sultan Aldırmaz Çolak
    Sarp Ertürk
    Wireless Personal Communications, 2021, 120 : 2653 - 2691
  • [43] Cryptanalysis of Arshad et al.’s ECC-based mutual authentication scheme for session initiation protocol
    Hongbin Tang
    Xinsong Liu
    Multimedia Tools and Applications, 2013, 65 : 321 - 333
  • [44] Cryptanalysis and Improvement of an ECC-Based Authentication Protocol for Wireless Sensor Networks
    Song, Taeui
    Kang, Dongwoo
    Ryu, Jihyeon
    Kim, Hyoungshick
    Won, Dongho
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS (ICCSA 2018), PT II, 2018, 10961 : 50 - 61
  • [45] Analysis and improvement of ECC-based fig.-proof protocol for RFID
    Hong-Yan, Kang (khyky@sina.com), 1600, Science and Engineering Research Support Society (09):
  • [46] An ECC-Based Authentication Protocol for Dynamic Charging System of Electric Vehicles
    Wang, Jie
    Wang, Shengbao
    Wen, Kang
    Weng, Bosen
    Zhou, Xin
    Chen, Kefei
    ELECTRONICS, 2024, 13 (06)
  • [47] Cryptanalysis of Arshad et al.'s ECC-based mutual authentication scheme for session initiation protocol
    Tang, Hongbin
    Liu, Xinsong
    MULTIMEDIA TOOLS AND APPLICATIONS, 2013, 65 (03) : 321 - 333
  • [48] A scalable and secure RFID mutual authentication protocol using ECC for Internet of Things
    Naeem, Muhammad
    Chaudhry, Shehzad Ashraf
    Mahmood, Khalid
    Karuppiah, Marimuthu
    Kumari, Saru
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2020, 33 (13)
  • [49] Analysis and design of ECC-based RFID grouping-proof protocol
    Hong-Yan, Kang
    Open Automation and Control Systems Journal, 2015, 7 : 1523 - 1527
  • [50] ECC-Based Anonymous and Multi-factor Authentication Scheme for IoT Environment
    Dargaoui, Souhayla
    Azrour, Mourade
    El Allaoui, Ahmad
    Guezzaz, Azidine
    Alabdulatif, Abdulatif
    Ahmad, Sultan
    INTERNATIONAL JOURNAL OF ONLINE AND BIOMEDICAL ENGINEERING, 2025, 21 (01) : 56 - 75