Skip to main content
Top
Published in: Wireless Personal Communications 4/2017

28-09-2016

Efficient RFID Authentication Using Elliptic Curve Cryptography for the Internet of Things

Authors: Han Shen, Jian Shen, Muhammad Khurram Khan, Jong-Hyouk Lee

Published in: Wireless Personal Communications | Issue 4/2017

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The Internet of Things (IoT) is an expansion of Internet-based sensing, processing and networking. As a key technique of the IoT, the Radio Frequency Identification (RFID) had a prosperous development in the past decade. Security schemes were also proposed to ensure secure RFID authentication. This paper analyzes security weaknesses found in previous schemes and proposes a new RFID authentication scheme using Elliptic Curve Cryptography (ECC). Security analysis results show that the proposed scheme can meet security requirements of RFID authentication while requiring no extra cost in terms of performance.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M. (2013). Internet of Things (IoT): A vision architectural elements, and future directions. Future Generation Computer Systems, 29(7), 1645–1660.CrossRef Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M. (2013). Internet of Things (IoT): A vision architectural elements, and future directions. Future Generation Computer Systems, 29(7), 1645–1660.CrossRef
2.
go back to reference Najera, P., Lopez, J., & Roman, R. (2011). Real-time location and inpatient care systems based on passive RFID. Journal of Network and Computer Applications, 34(3), 980–989.CrossRef Najera, P., Lopez, J., & Roman, R. (2011). Real-time location and inpatient care systems based on passive RFID. Journal of Network and Computer Applications, 34(3), 980–989.CrossRef
3.
go back to reference Weinstein, R. (2005). RFID: A technical overview and its application to the enterprise. IEEE IT Professional, 7(3), 27–33.CrossRef Weinstein, R. (2005). RFID: A technical overview and its application to the enterprise. IEEE IT Professional, 7(3), 27–33.CrossRef
4.
go back to reference Juels, A. (2006). RFID security and privacy: A research survey. IEEE Journal on Selected Areas in Communication, 24, 381–394.CrossRef Juels, A. (2006). RFID security and privacy: A research survey. IEEE Journal on Selected Areas in Communication, 24, 381–394.CrossRef
5.
go back to reference Peris-Lopez, P., Hernandez-Castro, J. C., Estevez-Tapiador, J. M., & Ribagorda, A. (2006). LMAP: A real lightweight mutual authentication protocol for low-cost RFID tags. In Proceedings of 2nd Workshop in RFID Security (pp. 27–36) Peris-Lopez, P., Hernandez-Castro, J. C., Estevez-Tapiador, J. M., & Ribagorda, A. (2006). LMAP: A real lightweight mutual authentication protocol for low-cost RFID tags. In Proceedings of 2nd Workshop in RFID Security (pp. 27–36)
6.
go back to reference Peris-Lopez, P., Hernandez-Castro, J. C., Estevez-Tapiador, J. M., & Ribagorda, A. (2006). EMAP: An efficient mutual authentication protocol for low-cost RFID tags. In Proceedings of OTM Federated Conference. Workshop: ISWorkshop (pp. 352–361) Peris-Lopez, P., Hernandez-Castro, J. C., Estevez-Tapiador, J. M., & Ribagorda, A. (2006). EMAP: An efficient mutual authentication protocol for low-cost RFID tags. In Proceedings of OTM Federated Conference. Workshop: ISWorkshop (pp. 352–361)
7.
go back to reference Weis, S., Sarma, S., Rivest, R., & Engels, D. (2003). Security and privacy aspects of low-cost radio frequency identification systems. In Proceedings of International Conference in Security in Pervasive Computing (pp. 454–469) Weis, S., Sarma, S., Rivest, R., & Engels, D. (2003). Security and privacy aspects of low-cost radio frequency identification systems. In Proceedings of International Conference in Security in Pervasive Computing (pp. 454–469)
8.
go back to reference Chien, H. (2006). Secure access control schemes for RFID systems with anonymity. In Proceedings of International Workshop in Future Mobile Ubiquitous Information Technology (FMUIT ‘06) (pp. 96–99) Chien, H. (2006). Secure access control schemes for RFID systems with anonymity. In Proceedings of International Workshop in Future Mobile Ubiquitous Information Technology (FMUIT ‘06) (pp. 96–99)
9.
go back to reference Lim, J., Oh, H., & Kim, S. (2008). A new hash-based RFID mutual authentication protocol providing enhanced user privacy protection. In Proceedings of 4th International Conference in Information Security Practice and Experience (ISPEC) (pp. 278–289) Lim, J., Oh, H., & Kim, S. (2008). A new hash-based RFID mutual authentication protocol providing enhanced user privacy protection. In Proceedings of 4th International Conference in Information Security Practice and Experience (ISPEC) (pp. 278–289)
10.
go back to reference Liu, A., & Bailey, A. (2009). A privacy and authentication protocol for passive RFID tags. Computer Communications, 32(7), 1194–1199.CrossRef Liu, A., & Bailey, A. (2009). A privacy and authentication protocol for passive RFID tags. Computer Communications, 32(7), 1194–1199.CrossRef
11.
go back to reference Kang, S., Lee, D., & Lee, I. (2008). A study on secure RFID mutual authentication scheme in pervasive. Computer Communications, 31(18), 248–4254.CrossRef Kang, S., Lee, D., & Lee, I. (2008). A study on secure RFID mutual authentication scheme in pervasive. Computer Communications, 31(18), 248–4254.CrossRef
12.
go back to reference Cho, J., Yeo, S., & Kim, S. (2011). Securing against brute-force attack: Ahash-based RFID mutual authentication protocol using a secret value. Computer Communications, 34(3), 391–397.CrossRef Cho, J., Yeo, S., & Kim, S. (2011). Securing against brute-force attack: Ahash-based RFID mutual authentication protocol using a secret value. Computer Communications, 34(3), 391–397.CrossRef
13.
go back to reference Farash, M. (2014). Cryptanalysis and improvement of an efficient mutual authentication RFID scheme based on elliptic curve cryptography. The Journal of Supercomputing. doi:10.1007/s11227-014-1272-0. Farash, M. (2014). Cryptanalysis and improvement of an efficient mutual authentication RFID scheme based on elliptic curve cryptography. The Journal of Supercomputing. doi:10.​1007/​s11227-014-1272-0.
14.
go back to reference Chou, J. (2014). An efficient mutual authentication RFID scheme based on elliptic curve cryptography. The Journal of Supercomputing, 70(1), 75–94.MathSciNetCrossRef Chou, J. (2014). An efficient mutual authentication RFID scheme based on elliptic curve cryptography. The Journal of Supercomputing, 70(1), 75–94.MathSciNetCrossRef
15.
go back to reference Liu, Y., Qin, X., & Wang, C. (2013). A lightweight RFID authentication protocol based on elliptic curve cryptography. The Journal of Supercomputing, 8(11), 2880–2887. Liu, Y., Qin, X., & Wang, C. (2013). A lightweight RFID authentication protocol based on elliptic curve cryptography. The Journal of Supercomputing, 8(11), 2880–2887.
16.
go back to reference Liao, Y., & Hsiao, C. (2014). A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol. Ad Hoc Networks, 18, 133–146.CrossRef Liao, Y., & Hsiao, C. (2014). A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol. Ad Hoc Networks, 18, 133–146.CrossRef
17.
go back to reference Chen, Y., & Chou, J. (2015). ECC-based untraceable authentication for large-scale active-tag RFID systems. Electronic Commerce Research, 15(1), 97–120.CrossRef Chen, Y., & Chou, J. (2015). ECC-based untraceable authentication for large-scale active-tag RFID systems. Electronic Commerce Research, 15(1), 97–120.CrossRef
18.
go back to reference Tuyls, P., & Batina, L. (2006). RFID-tags for anti-counterfeiting. In Proceedings of Topics in Cryptology (CT-RSA) (pp. 115–131) Tuyls, P., & Batina, L. (2006). RFID-tags for anti-counterfeiting. In Proceedings of Topics in Cryptology (CT-RSA) (pp. 115–131)
19.
go back to reference Lee, Y., Batina, L., & Verbauwhede, I. EC-RAC (ECDLP based randomized access control): Provably secure RFID authentication protocol. In Proceedings of IEEE International Conference in RFID (pp. 97–104) Lee, Y., Batina, L., & Verbauwhede, I. EC-RAC (ECDLP based randomized access control): Provably secure RFID authentication protocol. In Proceedings of IEEE International Conference in RFID (pp. 97–104)
20.
go back to reference Fu, Z., Sun, X., Liu, Q., Zhou, L., & Shu, J. (2015). Achieving efficient cloud search services: Multi keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Transactions on Communications, 98(1), 190–200.CrossRef Fu, Z., Sun, X., Liu, Q., Zhou, L., & Shu, J. (2015). Achieving efficient cloud search services: Multi keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Transactions on Communications, 98(1), 190–200.CrossRef
21.
go back to reference Xia, X., Wang, X., Sun, X., & Wang, Q. (2015). A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Transactions on Parallel and Distributed Systems, 27(2), 340–352.CrossRef Xia, X., Wang, X., Sun, X., & Wang, Q. (2015). A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Transactions on Parallel and Distributed Systems, 27(2), 340–352.CrossRef
22.
go back to reference Fu, Z., Ren, K., Shu, J., Sun, X., & Huang, F. (2015). Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Transactions on Parallel and Distributed Systems. doi:10.1109/TPDS.2015.2506573. Fu, Z., Ren, K., Shu, J., Sun, X., & Huang, F. (2015). Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Transactions on Parallel and Distributed Systems. doi:10.​1109/​TPDS.​2015.​2506573.
23.
go back to reference Ren, Y., Shen, J., Wang, J., Han, J., & Lee, S. (2015). Mutual verifiable provable data auditing in public cloud storage. Journal of Internet Technology, 16(2), 317–323. Ren, Y., Shen, J., Wang, J., Han, J., & Lee, S. (2015). Mutual verifiable provable data auditing in public cloud storage. Journal of Internet Technology, 16(2), 317–323.
26.
27.
go back to reference Bringer, J., Chabanne, H., & Icart, T. (2008). Cryptanalysis of EC-RAC, a RFID identification protocol. In Proceedings of 7th International Conference in Cryptology and Network Security (CNS’08) (pp. 149–161) Bringer, J., Chabanne, H., & Icart, T. (2008). Cryptanalysis of EC-RAC, a RFID identification protocol. In Proceedings of 7th International Conference in Cryptology and Network Security (CNS’08) (pp. 149–161)
28.
go back to reference Lee, Y., Batina, L., & Verbauwhede, I. (2009). Untraceable RFID authentication protocols: Revision of EC-RAC. In Proceedings of IEEE nternational Conference in RFID (pp. 178–185) Lee, Y., Batina, L., & Verbauwhede, I. (2009). Untraceable RFID authentication protocols: Revision of EC-RAC. In Proceedings of IEEE nternational Conference in RFID (pp. 178–185)
29.
go back to reference Deursen, T., & Radomirovic, S. (2009). Untraceable RFID protocols are not trivially composable: Attacks on the revision of EC-RAC. Cryptology ePrint Archive, Report Deursen, T., & Radomirovic, S. (2009). Untraceable RFID protocols are not trivially composable: Attacks on the revision of EC-RAC. Cryptology ePrint Archive, Report
30.
go back to reference Jiang, Q., Ma, J., Lu, X., & Tian, Y. (2015). An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks. Peer-to-Peer Networking and Applications, 8(6), 1070–1081.CrossRef Jiang, Q., Ma, J., Lu, X., & Tian, Y. (2015). An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks. Peer-to-Peer Networking and Applications, 8(6), 1070–1081.CrossRef
31.
go back to reference Jiang, Q., Ma, J., Li, G., & Yang, L. (2013). An enhanced authentication scheme with privacy preservation for roaming service in global mobility networks. Wireless Personal Communications, 68(4), 1477–1491.CrossRef Jiang, Q., Ma, J., Li, G., & Yang, L. (2013). An enhanced authentication scheme with privacy preservation for roaming service in global mobility networks. Wireless Personal Communications, 68(4), 1477–1491.CrossRef
32.
go back to reference Wang, D., He, D., Wang, P., & Chu, C. (2015). Anonymous two-factor authentication in distributed systems: Certain goals are beyond attainment. IEEE Transactions on Dependable and Secure Computing, 12(4), 428–442.CrossRef Wang, D., He, D., Wang, P., & Chu, C. (2015). Anonymous two-factor authentication in distributed systems: Certain goals are beyond attainment. IEEE Transactions on Dependable and Secure Computing, 12(4), 428–442.CrossRef
33.
go back to reference Wang, D., Wang, N., Wang, P., & Qing, S. (2015). Preserving privacy for free: Efficient and provably secure two-factor authentication scheme with user anonymity. Information Sciences, 321, 162–178.CrossRef Wang, D., Wang, N., Wang, P., & Qing, S. (2015). Preserving privacy for free: Efficient and provably secure two-factor authentication scheme with user anonymity. Information Sciences, 321, 162–178.CrossRef
34.
go back to reference Guo, P., Wang, J., Li, B., & Lee, S. (2014). A variable threshold-value authentication architecture for wireless mesh networks. Journal of Internet Technology, 15(6), 929–936. Guo, P., Wang, J., Li, B., & Lee, S. (2014). A variable threshold-value authentication architecture for wireless mesh networks. Journal of Internet Technology, 15(6), 929–936.
35.
go back to reference Shen, J., Tan, H., Wang, J., Wang, J., & Lee, S. (2015). A novel routing protocol providing good transmission reliability in underwater sensor networks. Journal of Internet Technology, 16(1), 171–178. Shen, J., Tan, H., Wang, J., Wang, J., & Lee, S. (2015). A novel routing protocol providing good transmission reliability in underwater sensor networks. Journal of Internet Technology, 16(1), 171–178.
36.
go back to reference He, D., & Zeadally, S. (2015). Authentication protocol for ambient assisted living system. IEEE Communications Magazine, 35(1), 71–77.CrossRef He, D., & Zeadally, S. (2015). Authentication protocol for ambient assisted living system. IEEE Communications Magazine, 35(1), 71–77.CrossRef
37.
go back to reference Ryu, E., Kim, D., Yoo, K. (2015). On elliptic curve based untraceable RFID authentication protocols. In Proceedings of the 3rd ACM Workshop in Information Hiding and Multimedia Security, ACM Ryu, E., Kim, D., Yoo, K. (2015). On elliptic curve based untraceable RFID authentication protocols. In Proceedings of the 3rd ACM Workshop in Information Hiding and Multimedia Security, ACM
38.
go back to reference Pointcheval, D., & Stern, J. (2000). Security arguments for digital signatures and blind signatures. Journal of Cryptology, 13(3), 361–396.CrossRefMATH Pointcheval, D., & Stern, J. (2000). Security arguments for digital signatures and blind signatures. Journal of Cryptology, 13(3), 361–396.CrossRefMATH
39.
go back to reference Godor, G., Giczi, N., Imre, S. (2010). Elliptic curve cryptography based mutual authentication protocol for low computational capacity RFID systems-performance analysis by simulations. In IEEE International Conference on Wireless Communications, Networking and Information Security (WCNIS) (pp. 650–657) Godor, G., Giczi, N., Imre, S. (2010). Elliptic curve cryptography based mutual authentication protocol for low computational capacity RFID systems-performance analysis by simulations. In IEEE International Conference on Wireless Communications, Networking and Information Security (WCNIS) (pp. 650–657)
40.
go back to reference Cao, X., & Kou, W. (2010). A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges. Information Sciences, 180(15), 2895–2903.MathSciNetCrossRefMATH Cao, X., & Kou, W. (2010). A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges. Information Sciences, 180(15), 2895–2903.MathSciNetCrossRefMATH
Metadata
Title
Efficient RFID Authentication Using Elliptic Curve Cryptography for the Internet of Things
Authors
Han Shen
Jian Shen
Muhammad Khurram Khan
Jong-Hyouk Lee
Publication date
28-09-2016
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 4/2017
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-016-3739-1

Other articles of this Issue 4/2017

Wireless Personal Communications 4/2017 Go to the issue