Skip to main content
Erschienen in: Wireless Personal Communications 4/2017

28.09.2016

Elliptic Curve Cryptography-Based RFID Authentication Resisting Active Tracking

verfasst von: Hung-Yu Chien

Erschienen in: Wireless Personal Communications | Ausgabe 4/2017

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The challenge of authentication for radio frequency identification (RFID) with low computing capacities call for computation-efficient authentication that can achieve mutual authentication, anonymity, and tracking resistance. The excellent performance of elliptic curve cryptography (ECC) including its strong security, its small key size and efficient computation has attracted many researchers’ attention in designing RFID authentication. Recently there are several promising ECC-based RFID authentication schemes aimed at achieving the above functions. Despite of their good performance in terms of computation and general security properties, we find that they all fall in the same security pitfall-being vulnerable to active tracking. In this paper, we identify these weaknesses and then propose a new ECC-based RFID authentication which conquers the weakness and even improves the computational performance.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat EPC Radio-Frequency Identity Protocols Class-1 Generation-2 UHF RFID Protocol for Communications at 860 MHz–960 MHz, Version 1.2.0. EPCglobal Inc., October 2008. www.gs1.org. EPC Radio-Frequency Identity Protocols Class-1 Generation-2 UHF RFID Protocol for Communications at 860 MHz–960 MHz, Version 1.2.0. EPCglobal Inc., October 2008. www.​gs1.​org.
3.
Zurück zum Zitat Avoine, G., Dysli, E., & Oechslin, P. (2005). Reducing time complexity in RFID systems. In The 12th annual workshop on selected areas in cryptography (SAC). Avoine, G., Dysli, E., & Oechslin, P. (2005). Reducing time complexity in RFID systems. In The 12th annual workshop on selected areas in cryptography (SAC).
4.
Zurück zum Zitat Juels, A., & Weis, S. A. (2005). Authenticating pervasive devices with human protocols. In Advances in cryptology—Crypto’05, LNCS (Vol. 3126, pp. 293–308). Berlin: Springer. Juels, A., & Weis, S. A. (2005). Authenticating pervasive devices with human protocols. In Advances in cryptology—Crypto’05, LNCS (Vol. 3126, pp. 293–308). Berlin: Springer.
5.
Zurück zum Zitat Duc, D. N., Park, J., Lee, H., & Kim, K. (2006). Enhancing security of EPCglobal Gen-2 RFID tag against traceability and cloning. In The 2006 symposium on cryptography and information security. Duc, D. N., Park, J., Lee, H., & Kim, K. (2006). Enhancing security of EPCglobal Gen-2 RFID tag against traceability and cloning. In The 2006 symposium on cryptography and information security.
6.
Zurück zum Zitat Juels, A. (2005). Strengthening EPC tag against cloning. In Proceedings of WiSe ‘05. Juels, A. (2005). Strengthening EPC tag against cloning. In Proceedings of WiSe ‘05.
7.
Zurück zum Zitat Yang, J., Park, J., Lee, H., Ren, K., & Kim, K. (2005). Mutual authentication protocol for low-cost RFID. In Handout of the Ecrypt Workshop on RFID and Lightweight Crypto. Yang, J., Park, J., Lee, H., Ren, K., & Kim, K. (2005). Mutual authentication protocol for low-cost RFID. In Handout of the Ecrypt Workshop on RFID and Lightweight Crypto.
8.
Zurück zum Zitat Hopper, N. J., & Blum, M. (2001). Secure human identification protocols. In Proceedings of in advances in cryptology—ASIACRYPT 2001, LNCS (Vol. 2248, pp. 52–66). Hopper, N. J., & Blum, M. (2001). Secure human identification protocols. In Proceedings of in advances in cryptology—ASIACRYPT 2001, LNCS (Vol. 2248, pp. 52–66).
9.
Zurück zum Zitat Piramuthu, S. (2006). HB and related lightweight authentication protocols for secure RFID tag/reader authentication. In CollECTeR Europe Conference. Piramuthu, S. (2006). HB and related lightweight authentication protocols for secure RFID tag/reader authentication. In CollECTeR Europe Conference.
10.
Zurück zum Zitat Peris-Lopez, P., Hernandez-Castro, J. C., Estevez-Tapiador, J. M., & Ribagorda, A. (2006). LMAP: A real lightweight mutual authentication protocol for low-cost RFID tags. In Proceedings of 2nd Workshop on RFID Security. Peris-Lopez, P., Hernandez-Castro, J. C., Estevez-Tapiador, J. M., & Ribagorda, A. (2006). LMAP: A real lightweight mutual authentication protocol for low-cost RFID tags. In Proceedings of 2nd Workshop on RFID Security.
11.
Zurück zum Zitat Li, T., & Wang, G. (2007). Security analysis of two ultra-lightweight RFID authentication protocols. In IFIP SEC 2007. Li, T., & Wang, G. (2007). Security analysis of two ultra-lightweight RFID authentication protocols. In IFIP SEC 2007.
12.
Zurück zum Zitat Li, T., & Deng, R. H. (2007). Vulnerability analysis of EMAP—An efficient RFID mutual authentication protocol. In The second international conference on availability, reliability and security (AReS 2007), 2007 Vienna. Li, T., & Deng, R. H. (2007). Vulnerability analysis of EMAP—An efficient RFID mutual authentication protocol. In The second international conference on availability, reliability and security (AReS 2007), 2007 Vienna.
13.
Zurück zum Zitat Chien, H. Y. (2007). SASI: A new ultralightweight RFID authentication protocol providing strong authentication and strong integrity. IEEE Transactions on Dependable and Secure Computing, 4(4), 337–340.CrossRef Chien, H. Y. (2007). SASI: A new ultralightweight RFID authentication protocol providing strong authentication and strong integrity. IEEE Transactions on Dependable and Secure Computing, 4(4), 337–340.CrossRef
14.
Zurück zum Zitat Karthikeyan, S., & Nesterenko, M. (2005). RFID security without extensive cryptography. In Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks, Alexandria, VA, USA, pp. 63–67, Nov., 2005. Karthikeyan, S., & Nesterenko, M. (2005). RFID security without extensive cryptography. In Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks, Alexandria, VA, USA, pp. 63–67, Nov., 2005.
15.
Zurück zum Zitat Molnar, D., & Wagner, D. (2004). Privacy and security in library RFID: Issues, practices, and architectures. In Proceedings of conference on computer and communications security—CCS’04, Washington, DC, USA, pp. 210–219, Oct., 2004. Molnar, D., & Wagner, D. (2004). Privacy and security in library RFID: Issues, practices, and architectures. In Proceedings of conference on computer and communications security—CCS’04, Washington, DC, USA, pp. 210–219, Oct., 2004.
16.
Zurück zum Zitat Ohkubo, M., Suzki, K., & Kinoshita, S. (2003). Cryptographic approach to ‘Privacy-Friendly’ tags. Presented at the RFID Privacy Workshop (MIT, Cambridge, MA, Nov. 15 2003); rfidprivacy.ex.com/2003/agenda.php. Ohkubo, M., Suzki, K., & Kinoshita, S. (2003). Cryptographic approach to ‘Privacy-Friendly’ tags. Presented at the RFID Privacy Workshop (MIT, Cambridge, MA, Nov. 15 2003); rfidprivacy.ex.com/2003/agenda.php.
17.
Zurück zum Zitat Rhee, K., Kwak, J., Kim, S., & Won, D. (2005). Challenge-response based RFID authentication protocol for distributed database environment. In Proceedings of international conference on security in pervasive computing—SPC, Berlin, Germany, LNCS (Vol. 3450, pp. 70–84). Rhee, K., Kwak, J., Kim, S., & Won, D. (2005). Challenge-response based RFID authentication protocol for distributed database environment. In Proceedings of international conference on security in pervasive computing—SPC, Berlin, Germany, LNCS (Vol. 3450, pp. 70–84).
18.
Zurück zum Zitat Chien, H. Y., & Laih, C. S. (2009). ECC-based lightweight authentication protocol with untraceability for low-cost RFID. Journal of Parallel and Distributed Computing, 69, 848–853.CrossRef Chien, H. Y., & Laih, C. S. (2009). ECC-based lightweight authentication protocol with untraceability for low-cost RFID. Journal of Parallel and Distributed Computing, 69, 848–853.CrossRef
19.
Zurück zum Zitat Chien, H. Y. (2013). Combining Rabin cryptosystem and error correction codes to facilitate anonymous authentication with un-traceability for low-end devices. Computer Networks, 57(14), 2705–2717.CrossRef Chien, H. Y. (2013). Combining Rabin cryptosystem and error correction codes to facilitate anonymous authentication with un-traceability for low-end devices. Computer Networks, 57(14), 2705–2717.CrossRef
20.
Zurück zum Zitat Lee, Y. K., Batina, L., & Verbauwhede, I. (2008). EC-RAC (ECDLP based randomized access control): Provably secure RFID authentication protocol. In IEEE International Conference on RFID, pp. 97–104. Lee, Y. K., Batina, L., & Verbauwhede, I. (2008). EC-RAC (ECDLP based randomized access control): Provably secure RFID authentication protocol. In IEEE International Conference on RFID, pp. 97–104.
21.
Zurück zum Zitat Zhang, X. L., Li, L. S., Wu, Y., & Zhang, Q. (2011). An ECDLP-based randomized key RFID authentication protocol. In 2011 international conference on network computing and information security. Zhang, X. L., Li, L. S., Wu, Y., & Zhang, Q. (2011). An ECDLP-based randomized key RFID authentication protocol. In 2011 international conference on network computing and information security.
22.
23.
Zurück zum Zitat Batina, L., Guajardo, J., Kerins, T., Mentens, N., Tuyls, P., Verbauwhede, I. (2007). Public-key cryptography for RFID-tags. In Fifth IEEE international conference on pervasive computing and communications workshops, 2007, pp. 217–222. Batina, L., Guajardo, J., Kerins, T., Mentens, N., Tuyls, P., Verbauwhede, I. (2007). Public-key cryptography for RFID-tags. In Fifth IEEE international conference on pervasive computing and communications workshops, 2007, pp. 217–222.
24.
Zurück zum Zitat Deursen, T., Radomirovíc, S. (2008). Attacks on RFID protocols. In Cryptology ePrint Archive: listing for 2008 (2008/310), 2008. Deursen, T., Radomirovíc, S. (2008). Attacks on RFID protocols. In Cryptology ePrint Archive: listing for 2008 (2008/310), 2008.
25.
Zurück zum Zitat Bringer, J., Chabanne, H., & Icart, T. (2008). Cryptanalysis of EC-RAC, a RFID identification protocol. In International conference on cryptology and network security—CANS’08, Lecture Notes in Computer Science. Berlin: Springer. Bringer, J., Chabanne, H., & Icart, T. (2008). Cryptanalysis of EC-RAC, a RFID identification protocol. In International conference on cryptology and network security—CANS’08, Lecture Notes in Computer Science. Berlin: Springer.
26.
Zurück zum Zitat Godor, G., & Imre, S. (2011). Elliptic curve cryptography based authentication protocol for low-cost RFID tags. In 2011 IEEE international conference on RFID-technologies and applications. Godor, G., & Imre, S. (2011). Elliptic curve cryptography based authentication protocol for low-cost RFID tags. In 2011 IEEE international conference on RFID-technologies and applications.
27.
Zurück zum Zitat Liao, Y. P., & Hsiao, C. M. (2014). A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol. Ad Hoc Networks, 18, 133–146.CrossRef Liao, Y. P., & Hsiao, C. M. (2014). A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol. Ad Hoc Networks, 18, 133–146.CrossRef
28.
Zurück zum Zitat Jurisic, A., & Menezes, A. J. (1997). Elliptic curves and cryptography. Certicom Whitepaper. Jurisic, A., & Menezes, A. J. (1997). Elliptic curves and cryptography. Certicom Whitepaper.
29.
Zurück zum Zitat Boneh, D., & Franklin, M. (2001). Identity-based encryption from the Weil pairing. In Proceedings of Crypto’01, Santa Barbara, California, USA, 19–23 August, LNCS (Vol. 2139, pp. 213–229). Berlin: Springer. Boneh, D., & Franklin, M. (2001). Identity-based encryption from the Weil pairing. In Proceedings of Crypto’01, Santa Barbara, California, USA, 19–23 August, LNCS (Vol. 2139, pp. 213–229). Berlin: Springer.
31.
Zurück zum Zitat Jurisic, A., & Menezes A. J. (1997). Elliptic curves and cryptography. Certicom Whitepaper. Jurisic, A., & Menezes A. J. (1997). Elliptic curves and cryptography. Certicom Whitepaper.
Metadaten
Titel
Elliptic Curve Cryptography-Based RFID Authentication Resisting Active Tracking
verfasst von
Hung-Yu Chien
Publikationsdatum
28.09.2016
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 4/2017
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-016-3756-0

Weitere Artikel der Ausgabe 4/2017

Wireless Personal Communications 4/2017 Zur Ausgabe

Neuer Inhalt