Skip to main content
Top

2020 | OriginalPaper | Chapter

A Lightweight Authentication Scheme for RFID Using ECC

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Internet of things (IoT) contains a massive number of “things” which are communicated without human interaction. The “things” refers to a physical device such as bar code, tag, smart card, etc. These devices contain a limited amount of memory and a small processing unit. Hence, these devices require a lightweight scheme to provide authentication. However, there are various security issues with these tags such as tracking, cloning, replay attacks, disclosure attack, etc. To remove these security issues, many researchers proposed various authentication schemes. However, there are various security issues, large storage and communication requirement in these schemes. A new lightweight authentication scheme for RFID tag has been proposed which uses hash function and elliptic curve cryptography to authenticate tag and server. The hash function provides irreversibly to the scheme. The performance analysis of the scheme is analyzed in terms of communication, storage, and memory required to store the data. The scheme requires 3 hash function and 1 multiplication to mutual authentication between tag and reader. The scheme provides mutual authentication, forward security and also resistance from tracking attack, cloning attack.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Bringer, J., Chabanne, H., Icart, T.: Cryptanalysis of EC-RAC a RFID identification protocol. In: International Conference on Cryptology and Network Security, pp. 149–161. Springer (2008) Bringer, J., Chabanne, H., Icart, T.: Cryptanalysis of EC-RAC a RFID identification protocol. In: International Conference on Cryptology and Network Security, pp. 149–161. Springer (2008)
2.
go back to reference Chen, Y., Chou, J.S.: ECC-based untraceable authentication for large-scale active-tag RFID systems. Electron. Commer. Res. 15(1), 97–120 (2015)CrossRef Chen, Y., Chou, J.S.: ECC-based untraceable authentication for large-scale active-tag RFID systems. Electron. Commer. Res. 15(1), 97–120 (2015)CrossRef
3.
go back to reference Finkenzeller, K.: RFID Handbook: Fundamentals and Applications in Contactless Smart Cards Radio Frequency Identification and Near-Field Communication. Wiley, Hoboken (2010)CrossRef Finkenzeller, K.: RFID Handbook: Fundamentals and Applications in Contactless Smart Cards Radio Frequency Identification and Near-Field Communication. Wiley, Hoboken (2010)CrossRef
4.
go back to reference Juels, A., Weis, S.A.: Defining strong privacy for RFID. ACM Trans. Inf. Syst. Secur. (TISSEC) 13(1), 7 (2009)CrossRef Juels, A., Weis, S.A.: Defining strong privacy for RFID. ACM Trans. Inf. Syst. Secur. (TISSEC) 13(1), 7 (2009)CrossRef
5.
go back to reference Lee, Y.K., Batina, L., Verbauwhede, I.: EC-RAC (ECDLP based randomized access control): provably secure RFID authentication protocol. In: 2008 IEEE International Conference on RFID, pp. 97–104. IEEE (2008) Lee, Y.K., Batina, L., Verbauwhede, I.: EC-RAC (ECDLP based randomized access control): provably secure RFID authentication protocol. In: 2008 IEEE International Conference on RFID, pp. 97–104. IEEE (2008)
6.
go back to reference Liao, Y.P., Hsiao, C.M.: A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol. Ad Hoc Netw. 18, 133–146 (2014)CrossRef Liao, Y.P., Hsiao, C.M.: A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol. Ad Hoc Netw. 18, 133–146 (2014)CrossRef
7.
go back to reference Ryu, E.K., Kim, D.S., Yoo, K.Y.: On elliptic curve based untraceable RFID authentication protocols. In: Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, pp. 147–153. ACM (2015) Ryu, E.K., Kim, D.S., Yoo, K.Y.: On elliptic curve based untraceable RFID authentication protocols. In: Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, pp. 147–153. ACM (2015)
8.
go back to reference Shen, H., Shen, J., Khan, M.K., Lee, J.H.: Efficient RFID authentication using elliptic curve cryptography for the Internet of Things. Wireless Pers. Commun. 96(4), 5253–5266 (2017)CrossRef Shen, H., Shen, J., Khan, M.K., Lee, J.H.: Efficient RFID authentication using elliptic curve cryptography for the Internet of Things. Wireless Pers. Commun. 96(4), 5253–5266 (2017)CrossRef
9.
go back to reference Zhao, Z.: A secure RFID authentication protocol for healthcare environments using elliptic curve cryptosystem. J. Med. Syst. 38(5), 46 (2014)CrossRef Zhao, Z.: A secure RFID authentication protocol for healthcare environments using elliptic curve cryptosystem. J. Med. Syst. 38(5), 46 (2014)CrossRef
Metadata
Title
A Lightweight Authentication Scheme for RFID Using ECC
Authors
Atul Kumar
Ankit Kumar Jain
Copyright Year
2020
DOI
https://doi.org/10.1007/978-3-030-39875-0_19