Skip to main content
Erschienen in: The Journal of Supercomputing 9/2018

08.09.2016

A secure ECC-based RFID mutual authentication protocol for internet of things

verfasst von: Amjad Ali Alamr, Firdous Kausar, Jongsung Kim, Changho Seo

Erschienen in: The Journal of Supercomputing | Ausgabe 9/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Progression of the internet technologies has led to the emergence of internet of things (IoT). One of the familiar deployment of IoT is through radio-frequency identification (RFID) technology. In recent times, RFID based systems are one of the most widely spread applications for tagging and keep tracking purposes in IoT deployment. This is due to their powerful features compared to their counterparts of similar techniques such as barcodes. In contrast, radio-frequency identification systems suffer from various attacks and security threats. The wireless channel used for communication is responsible for the majority of these vulnerabilities. In this paper, we propose a new radio-frequency identification authentication protocol based on elliptic curve cryptography (ECC) to eliminate these vulnerabilities. In addition, we use elliptic curve Diffie–Hellman (ECDH) key agreement protocol to generate a temporary shared key used to encrypt the later transmitted messages. Our protocol achieves a set of security properties likes mutual authentication, anonymity, confidentiality, forward security, location privacy, resistance of man-in-the-middle attack, resistance of replay attack and resistance of impersonation attack. We implement our proposed protocol in real RFID system using Omnikey smartcard reader (Omnikey 5421) and NXP Java smartcards (J3A040). Implementation results shows that our proposed protocol outperform in term of time complexity as compared to other similar protocols and requires less number of operations.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Literatur
1.
Zurück zum Zitat Atzori Luigi, Iera Antonio, Morabito Giacomo (2010) The internet of things: a survey. Comput Netw 54(15):2787–2805CrossRefMATH Atzori Luigi, Iera Antonio, Morabito Giacomo (2010) The internet of things: a survey. Comput Netw 54(15):2787–2805CrossRefMATH
2.
Zurück zum Zitat Chien Hung-Yu (2009) Development and implementation of RFID Technology, chapter the study of RFID authentication protocols and security of some popular RFID tags, page 554. i-tech, Vienna Chien Hung-Yu (2009) Development and implementation of RFID Technology, chapter the study of RFID authentication protocols and security of some popular RFID tags, page 554. i-tech, Vienna
3.
Zurück zum Zitat Hof C (2006) Rfid and identity management in everyday life: striking the balance between convenience, choice and control. Report IPOL/A/STOA/2006-22, ETAG (European Technology Assessment Group), European Parliament, Strasbourg Hof C (2006) Rfid and identity management in everyday life: striking the balance between convenience, choice and control. Report IPOL/A/STOA/2006-22, ETAG (European Technology Assessment Group), European Parliament, Strasbourg
4.
Zurück zum Zitat Benssalah M, Djeddou M, Drouiche K (2012) RFID authentication protocols based on ECC encryption schemes. In: 2012 IEEE international conference on RFID-technologies and applications, RFID-TA 2012, Nice, France, November 5–7, 2012, pages 97–100 Benssalah M, Djeddou M, Drouiche K (2012) RFID authentication protocols based on ECC encryption schemes. In: 2012 IEEE international conference on RFID-technologies and applications, RFID-TA 2012, Nice, France, November 5–7, 2012, pages 97–100
5.
Zurück zum Zitat Chou J-S, Chen Y, Wu C-L, Lin C-F (2011) An efficient rfid mutual authentication scheme based on ecc. Cryptology ePrint Archive, Report 2011/418 Chou J-S, Chen Y, Wu C-L, Lin C-F (2011) An efficient rfid mutual authentication scheme based on ecc. Cryptology ePrint Archive, Report 2011/418
6.
Zurück zum Zitat Chou Jue-Sam (2014) An efficient mutual authentication RFID scheme based on elliptic curve cryptography. J Supercomput 70(1):75–94CrossRef Chou Jue-Sam (2014) An efficient mutual authentication RFID scheme based on elliptic curve cryptography. J Supercomput 70(1):75–94CrossRef
7.
Zurück zum Zitat Farash Mohammad Sabzinejad, Kumari Saru, Bakhtiari Majid (2016) Cryptanalysis and improvement of a robust smart card secured authentication scheme on SIP using elliptic curve cryptography. Multimed Tools Appl 75(8):4485–4504CrossRef Farash Mohammad Sabzinejad, Kumari Saru, Bakhtiari Majid (2016) Cryptanalysis and improvement of a robust smart card secured authentication scheme on SIP using elliptic curve cryptography. Multimed Tools Appl 75(8):4485–4504CrossRef
8.
Zurück zum Zitat Liao Y-P, Hsiao C-M (2012) A secure ECC-based RFID authentication scheme using hybrid protocols. In: Proceedings of the International Computer Symposium ICS 2012-Advances in Intelligent Systems and Applications, vol 2. Springer, pp 1–13 Liao Y-P, Hsiao C-M (2012) A secure ECC-based RFID authentication scheme using hybrid protocols. In: Proceedings of the International Computer Symposium ICS 2012-Advances in Intelligent Systems and Applications, vol 2. Springer, pp 1–13
9.
Zurück zum Zitat Gross H, Hlbl M, Slamanig D, Spreitzer R (2015) Privacy-aware authentication in the internet of things. Cryptology ePrint Archive, Report 2015/1110 Gross H, Hlbl M, Slamanig D, Spreitzer R (2015) Privacy-aware authentication in the internet of things. Cryptology ePrint Archive, Report 2015/1110
10.
Zurück zum Zitat Abdalla M, Bellare M, Rogaway P (2001) The oracle diffie-hellman assumptions and an analysis of dhies. In: Naccache D (ed) CT-RSA, volume 2020 of lecture notes in computer science. Springer, Berlin, pp 143–158 Abdalla M, Bellare M, Rogaway P (2001) The oracle diffie-hellman assumptions and an analysis of dhies. In: Naccache D (ed) CT-RSA, volume 2020 of lecture notes in computer science. Springer, Berlin, pp 143–158
11.
Zurück zum Zitat He Debiao, Zeadally Sherali (2015) An analysis of RFID authentication schemes for internet of things in healthcare environment using elliptic curve cryptography. IEEE Int Things J 2(1):72–83CrossRef He Debiao, Zeadally Sherali (2015) An analysis of RFID authentication schemes for internet of things in healthcare environment using elliptic curve cryptography. IEEE Int Things J 2(1):72–83CrossRef
Metadaten
Titel
A secure ECC-based RFID mutual authentication protocol for internet of things
verfasst von
Amjad Ali Alamr
Firdous Kausar
Jongsung Kim
Changho Seo
Publikationsdatum
08.09.2016
Verlag
Springer US
Erschienen in
The Journal of Supercomputing / Ausgabe 9/2018
Print ISSN: 0920-8542
Elektronische ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-016-1861-1

Weitere Artikel der Ausgabe 9/2018

The Journal of Supercomputing 9/2018 Zur Ausgabe

Premium Partner