An efficient and secure RFID authentication protocol using elliptic curve cryptography
- 207 Downloads
Radio frequency identification (RFID) is a relatively new technology widely deployed in many applications. Due to several advantages of the technology including decreased costs and increased speed, different organizations and industries show interest in it, and its application range is gradually developing. Some of the main problems of RFID are security and privacy. The implementation of authentication protocols is a flexible and effective way to solve these problems. Several authentication protocols of RFID are based on hash functions or symmetric cryptography. According to the small size of the key, efficient computations, and high security in the elliptic curve cryptography (ECC), its use has increased. Recently some certain ECC-based authentication protocols have been represented. In this paper, a RFID authentication protocol is presented using ECC for mutual authentication to overcome weaknesses of the existing authentication protocols. It has been shown that the proposed protocol satisfies security requirements of RFID authentication protocol and prevents different attacks on RFID systems. Also, the proposed authentication protocol has been analyzed in terms of computational costs, communication costs, and storage requirements. The results revealed that the proposed authentication protocol is an appropriate model for RFID tags with limited resources.
KeywordsAuthentication protocol RFID Elliptic curve cryptography Privacy
The authors thanks the editors and the anonymous reviewers for their valuable comments.
- 3.Park D. G., Boyd C., & TDawson E. (2000). Classification of authentication protocols: A practical approach. In Third international workshop, ISW 2000 Wollongong (pp. 194–208).Google Scholar
- 4.Liao, Y. P., & Hsiao, C. M. (2013). A secure ECC-based RFID authentication scheme using hybrid protocols. Advances in Intelligent Systems and Applications, 2, 1–13.Google Scholar
- 9.Kumar, N., Kaur, K., Misra, S. C., & Iqbal, R. (2015). An intelligent RFID-enabled authentication scheme for healthcare applications in vehicular mobile cloud. Peer-to-Peer Networking and Applications, 9(5), 1–17.Google Scholar
- 12.Godor, G., Giczi, N., & Imre, S. (2010). Elliptic curve cryptography based mutual authentication protocol for low computational capacity RFID systems performance analysis by simulations. In IEEE international conference on wireless communications, networking and information security (WCNIS), IEEE (pp. 650–657). DOI: 10.1109/WCINS.2010.5541860.
- 13.Juels, A. (2004). Minimalist cryptography for low-cost RFID tags. In International conference on security in communication networks (pp. 149–164). Berlin: Springer.Google Scholar
- 15.Juels, A., & Pappu, R. (2003). Squealing Euros: Privacy protection in RFID-enabled banknotes. In International conference on financial cryptography (pp. 103–121). Berlin: Springer.Google Scholar
- 16.Hopper, N. J., & Blum, M. (2000). A secure human-computer authentication scheme. Technical Report CMU-CS-00-139. Carnegie Mellon University.Google Scholar
- 17.Juels, A., & Weis, S. A. (2005). Authenticating pervasive devices with human protocols. In Annual international cryptology conference (pp. 293–308). Berlin: Springer.Google Scholar
- 18.Tuyls P., & Batina L. (2006). RFID-tags for anti-counterfeiting. In Topics in cryptology CT-RSA (pp. 115–131).Google Scholar
- 20.Batina L., Guajardo J., Kerins T., et al. (2007). Public-key cryptography for RFID-tags. In Proceedings of the fifth annual ieee international conference pervasive computing and communications workshop (pp. 217–222). DOI: 10.1109/PERCOMW.2007.98.
- 22.Lee Y. K., Batina L., & Verbauwhede I. (2008). EC-RAC (ECDLP based randomized access control): Provably secure RFID authentication protocol. In Proceedings of the 2008 IEEE International Conference (pp. 97–104). DOI: 10.1109/RFID.2008.4519370.
- 23.Bringer J., Chabanne H., & Icart T. (2008). Cryptanalysis of EC-RAC, a RFID identification protocol. In Cryptology and network security (pp. 149–161).Google Scholar
- 24.Juels, A., Pappu, R., & Parno, B. (2008). Unidirectional key distribution across time and space with applications to RFID security. In USENIX security symposium (pp. 75–90).Google Scholar
- 27.Zheng, X., Chen, C. M., & Wu, T. Y. (2014). Another improvement of RAPP: An ultra-lightweight authentication protocol for RFID. Intelligent Data Analysis and its Applications, I, 145–153.Google Scholar
- 32.Ouafi, K., & Phan, R. C. W. (2008). Traceable privacy of recent provably-secure RFID protocols. In International conference on applied cryptography and network security (pp. 479–489).Google Scholar
- 33.Alamr, A. A., Kausar, F., & Kim, J. S. (2016). Secure mutual authentication protocol for RFID based on elliptic curve cryptography. In Proceedings of the 2016 international conference on platform technology and service (PlatCon), IEEE (pp. 1–7).Google Scholar