Skip to main content
Erschienen in: Wireless Personal Communications 4/2017

28.09.2016

Efficient RFID Authentication Using Elliptic Curve Cryptography for the Internet of Things

verfasst von: Han Shen, Jian Shen, Muhammad Khurram Khan, Jong-Hyouk Lee

Erschienen in: Wireless Personal Communications | Ausgabe 4/2017

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The Internet of Things (IoT) is an expansion of Internet-based sensing, processing and networking. As a key technique of the IoT, the Radio Frequency Identification (RFID) had a prosperous development in the past decade. Security schemes were also proposed to ensure secure RFID authentication. This paper analyzes security weaknesses found in previous schemes and proposes a new RFID authentication scheme using Elliptic Curve Cryptography (ECC). Security analysis results show that the proposed scheme can meet security requirements of RFID authentication while requiring no extra cost in terms of performance.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M. (2013). Internet of Things (IoT): A vision architectural elements, and future directions. Future Generation Computer Systems, 29(7), 1645–1660.CrossRef Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M. (2013). Internet of Things (IoT): A vision architectural elements, and future directions. Future Generation Computer Systems, 29(7), 1645–1660.CrossRef
2.
Zurück zum Zitat Najera, P., Lopez, J., & Roman, R. (2011). Real-time location and inpatient care systems based on passive RFID. Journal of Network and Computer Applications, 34(3), 980–989.CrossRef Najera, P., Lopez, J., & Roman, R. (2011). Real-time location and inpatient care systems based on passive RFID. Journal of Network and Computer Applications, 34(3), 980–989.CrossRef
3.
Zurück zum Zitat Weinstein, R. (2005). RFID: A technical overview and its application to the enterprise. IEEE IT Professional, 7(3), 27–33.CrossRef Weinstein, R. (2005). RFID: A technical overview and its application to the enterprise. IEEE IT Professional, 7(3), 27–33.CrossRef
4.
Zurück zum Zitat Juels, A. (2006). RFID security and privacy: A research survey. IEEE Journal on Selected Areas in Communication, 24, 381–394.CrossRef Juels, A. (2006). RFID security and privacy: A research survey. IEEE Journal on Selected Areas in Communication, 24, 381–394.CrossRef
5.
Zurück zum Zitat Peris-Lopez, P., Hernandez-Castro, J. C., Estevez-Tapiador, J. M., & Ribagorda, A. (2006). LMAP: A real lightweight mutual authentication protocol for low-cost RFID tags. In Proceedings of 2nd Workshop in RFID Security (pp. 27–36) Peris-Lopez, P., Hernandez-Castro, J. C., Estevez-Tapiador, J. M., & Ribagorda, A. (2006). LMAP: A real lightweight mutual authentication protocol for low-cost RFID tags. In Proceedings of 2nd Workshop in RFID Security (pp. 27–36)
6.
Zurück zum Zitat Peris-Lopez, P., Hernandez-Castro, J. C., Estevez-Tapiador, J. M., & Ribagorda, A. (2006). EMAP: An efficient mutual authentication protocol for low-cost RFID tags. In Proceedings of OTM Federated Conference. Workshop: ISWorkshop (pp. 352–361) Peris-Lopez, P., Hernandez-Castro, J. C., Estevez-Tapiador, J. M., & Ribagorda, A. (2006). EMAP: An efficient mutual authentication protocol for low-cost RFID tags. In Proceedings of OTM Federated Conference. Workshop: ISWorkshop (pp. 352–361)
7.
Zurück zum Zitat Weis, S., Sarma, S., Rivest, R., & Engels, D. (2003). Security and privacy aspects of low-cost radio frequency identification systems. In Proceedings of International Conference in Security in Pervasive Computing (pp. 454–469) Weis, S., Sarma, S., Rivest, R., & Engels, D. (2003). Security and privacy aspects of low-cost radio frequency identification systems. In Proceedings of International Conference in Security in Pervasive Computing (pp. 454–469)
8.
Zurück zum Zitat Chien, H. (2006). Secure access control schemes for RFID systems with anonymity. In Proceedings of International Workshop in Future Mobile Ubiquitous Information Technology (FMUIT ‘06) (pp. 96–99) Chien, H. (2006). Secure access control schemes for RFID systems with anonymity. In Proceedings of International Workshop in Future Mobile Ubiquitous Information Technology (FMUIT ‘06) (pp. 96–99)
9.
Zurück zum Zitat Lim, J., Oh, H., & Kim, S. (2008). A new hash-based RFID mutual authentication protocol providing enhanced user privacy protection. In Proceedings of 4th International Conference in Information Security Practice and Experience (ISPEC) (pp. 278–289) Lim, J., Oh, H., & Kim, S. (2008). A new hash-based RFID mutual authentication protocol providing enhanced user privacy protection. In Proceedings of 4th International Conference in Information Security Practice and Experience (ISPEC) (pp. 278–289)
10.
Zurück zum Zitat Liu, A., & Bailey, A. (2009). A privacy and authentication protocol for passive RFID tags. Computer Communications, 32(7), 1194–1199.CrossRef Liu, A., & Bailey, A. (2009). A privacy and authentication protocol for passive RFID tags. Computer Communications, 32(7), 1194–1199.CrossRef
11.
Zurück zum Zitat Kang, S., Lee, D., & Lee, I. (2008). A study on secure RFID mutual authentication scheme in pervasive. Computer Communications, 31(18), 248–4254.CrossRef Kang, S., Lee, D., & Lee, I. (2008). A study on secure RFID mutual authentication scheme in pervasive. Computer Communications, 31(18), 248–4254.CrossRef
12.
Zurück zum Zitat Cho, J., Yeo, S., & Kim, S. (2011). Securing against brute-force attack: Ahash-based RFID mutual authentication protocol using a secret value. Computer Communications, 34(3), 391–397.CrossRef Cho, J., Yeo, S., & Kim, S. (2011). Securing against brute-force attack: Ahash-based RFID mutual authentication protocol using a secret value. Computer Communications, 34(3), 391–397.CrossRef
13.
Zurück zum Zitat Farash, M. (2014). Cryptanalysis and improvement of an efficient mutual authentication RFID scheme based on elliptic curve cryptography. The Journal of Supercomputing. doi:10.1007/s11227-014-1272-0. Farash, M. (2014). Cryptanalysis and improvement of an efficient mutual authentication RFID scheme based on elliptic curve cryptography. The Journal of Supercomputing. doi:10.​1007/​s11227-014-1272-0.
14.
Zurück zum Zitat Chou, J. (2014). An efficient mutual authentication RFID scheme based on elliptic curve cryptography. The Journal of Supercomputing, 70(1), 75–94.MathSciNetCrossRef Chou, J. (2014). An efficient mutual authentication RFID scheme based on elliptic curve cryptography. The Journal of Supercomputing, 70(1), 75–94.MathSciNetCrossRef
15.
Zurück zum Zitat Liu, Y., Qin, X., & Wang, C. (2013). A lightweight RFID authentication protocol based on elliptic curve cryptography. The Journal of Supercomputing, 8(11), 2880–2887. Liu, Y., Qin, X., & Wang, C. (2013). A lightweight RFID authentication protocol based on elliptic curve cryptography. The Journal of Supercomputing, 8(11), 2880–2887.
16.
Zurück zum Zitat Liao, Y., & Hsiao, C. (2014). A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol. Ad Hoc Networks, 18, 133–146.CrossRef Liao, Y., & Hsiao, C. (2014). A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol. Ad Hoc Networks, 18, 133–146.CrossRef
17.
Zurück zum Zitat Chen, Y., & Chou, J. (2015). ECC-based untraceable authentication for large-scale active-tag RFID systems. Electronic Commerce Research, 15(1), 97–120.CrossRef Chen, Y., & Chou, J. (2015). ECC-based untraceable authentication for large-scale active-tag RFID systems. Electronic Commerce Research, 15(1), 97–120.CrossRef
18.
Zurück zum Zitat Tuyls, P., & Batina, L. (2006). RFID-tags for anti-counterfeiting. In Proceedings of Topics in Cryptology (CT-RSA) (pp. 115–131) Tuyls, P., & Batina, L. (2006). RFID-tags for anti-counterfeiting. In Proceedings of Topics in Cryptology (CT-RSA) (pp. 115–131)
19.
Zurück zum Zitat Lee, Y., Batina, L., & Verbauwhede, I. EC-RAC (ECDLP based randomized access control): Provably secure RFID authentication protocol. In Proceedings of IEEE International Conference in RFID (pp. 97–104) Lee, Y., Batina, L., & Verbauwhede, I. EC-RAC (ECDLP based randomized access control): Provably secure RFID authentication protocol. In Proceedings of IEEE International Conference in RFID (pp. 97–104)
20.
Zurück zum Zitat Fu, Z., Sun, X., Liu, Q., Zhou, L., & Shu, J. (2015). Achieving efficient cloud search services: Multi keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Transactions on Communications, 98(1), 190–200.CrossRef Fu, Z., Sun, X., Liu, Q., Zhou, L., & Shu, J. (2015). Achieving efficient cloud search services: Multi keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Transactions on Communications, 98(1), 190–200.CrossRef
21.
Zurück zum Zitat Xia, X., Wang, X., Sun, X., & Wang, Q. (2015). A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Transactions on Parallel and Distributed Systems, 27(2), 340–352.CrossRef Xia, X., Wang, X., Sun, X., & Wang, Q. (2015). A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Transactions on Parallel and Distributed Systems, 27(2), 340–352.CrossRef
22.
Zurück zum Zitat Fu, Z., Ren, K., Shu, J., Sun, X., & Huang, F. (2015). Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Transactions on Parallel and Distributed Systems. doi:10.1109/TPDS.2015.2506573. Fu, Z., Ren, K., Shu, J., Sun, X., & Huang, F. (2015). Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Transactions on Parallel and Distributed Systems. doi:10.​1109/​TPDS.​2015.​2506573.
23.
Zurück zum Zitat Ren, Y., Shen, J., Wang, J., Han, J., & Lee, S. (2015). Mutual verifiable provable data auditing in public cloud storage. Journal of Internet Technology, 16(2), 317–323. Ren, Y., Shen, J., Wang, J., Han, J., & Lee, S. (2015). Mutual verifiable provable data auditing in public cloud storage. Journal of Internet Technology, 16(2), 317–323.
24.
26.
27.
Zurück zum Zitat Bringer, J., Chabanne, H., & Icart, T. (2008). Cryptanalysis of EC-RAC, a RFID identification protocol. In Proceedings of 7th International Conference in Cryptology and Network Security (CNS’08) (pp. 149–161) Bringer, J., Chabanne, H., & Icart, T. (2008). Cryptanalysis of EC-RAC, a RFID identification protocol. In Proceedings of 7th International Conference in Cryptology and Network Security (CNS’08) (pp. 149–161)
28.
Zurück zum Zitat Lee, Y., Batina, L., & Verbauwhede, I. (2009). Untraceable RFID authentication protocols: Revision of EC-RAC. In Proceedings of IEEE nternational Conference in RFID (pp. 178–185) Lee, Y., Batina, L., & Verbauwhede, I. (2009). Untraceable RFID authentication protocols: Revision of EC-RAC. In Proceedings of IEEE nternational Conference in RFID (pp. 178–185)
29.
Zurück zum Zitat Deursen, T., & Radomirovic, S. (2009). Untraceable RFID protocols are not trivially composable: Attacks on the revision of EC-RAC. Cryptology ePrint Archive, Report Deursen, T., & Radomirovic, S. (2009). Untraceable RFID protocols are not trivially composable: Attacks on the revision of EC-RAC. Cryptology ePrint Archive, Report
30.
Zurück zum Zitat Jiang, Q., Ma, J., Lu, X., & Tian, Y. (2015). An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks. Peer-to-Peer Networking and Applications, 8(6), 1070–1081.CrossRef Jiang, Q., Ma, J., Lu, X., & Tian, Y. (2015). An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks. Peer-to-Peer Networking and Applications, 8(6), 1070–1081.CrossRef
31.
Zurück zum Zitat Jiang, Q., Ma, J., Li, G., & Yang, L. (2013). An enhanced authentication scheme with privacy preservation for roaming service in global mobility networks. Wireless Personal Communications, 68(4), 1477–1491.CrossRef Jiang, Q., Ma, J., Li, G., & Yang, L. (2013). An enhanced authentication scheme with privacy preservation for roaming service in global mobility networks. Wireless Personal Communications, 68(4), 1477–1491.CrossRef
32.
Zurück zum Zitat Wang, D., He, D., Wang, P., & Chu, C. (2015). Anonymous two-factor authentication in distributed systems: Certain goals are beyond attainment. IEEE Transactions on Dependable and Secure Computing, 12(4), 428–442.CrossRef Wang, D., He, D., Wang, P., & Chu, C. (2015). Anonymous two-factor authentication in distributed systems: Certain goals are beyond attainment. IEEE Transactions on Dependable and Secure Computing, 12(4), 428–442.CrossRef
33.
Zurück zum Zitat Wang, D., Wang, N., Wang, P., & Qing, S. (2015). Preserving privacy for free: Efficient and provably secure two-factor authentication scheme with user anonymity. Information Sciences, 321, 162–178.CrossRef Wang, D., Wang, N., Wang, P., & Qing, S. (2015). Preserving privacy for free: Efficient and provably secure two-factor authentication scheme with user anonymity. Information Sciences, 321, 162–178.CrossRef
34.
Zurück zum Zitat Guo, P., Wang, J., Li, B., & Lee, S. (2014). A variable threshold-value authentication architecture for wireless mesh networks. Journal of Internet Technology, 15(6), 929–936. Guo, P., Wang, J., Li, B., & Lee, S. (2014). A variable threshold-value authentication architecture for wireless mesh networks. Journal of Internet Technology, 15(6), 929–936.
35.
Zurück zum Zitat Shen, J., Tan, H., Wang, J., Wang, J., & Lee, S. (2015). A novel routing protocol providing good transmission reliability in underwater sensor networks. Journal of Internet Technology, 16(1), 171–178. Shen, J., Tan, H., Wang, J., Wang, J., & Lee, S. (2015). A novel routing protocol providing good transmission reliability in underwater sensor networks. Journal of Internet Technology, 16(1), 171–178.
36.
Zurück zum Zitat He, D., & Zeadally, S. (2015). Authentication protocol for ambient assisted living system. IEEE Communications Magazine, 35(1), 71–77.CrossRef He, D., & Zeadally, S. (2015). Authentication protocol for ambient assisted living system. IEEE Communications Magazine, 35(1), 71–77.CrossRef
37.
Zurück zum Zitat Ryu, E., Kim, D., Yoo, K. (2015). On elliptic curve based untraceable RFID authentication protocols. In Proceedings of the 3rd ACM Workshop in Information Hiding and Multimedia Security, ACM Ryu, E., Kim, D., Yoo, K. (2015). On elliptic curve based untraceable RFID authentication protocols. In Proceedings of the 3rd ACM Workshop in Information Hiding and Multimedia Security, ACM
38.
Zurück zum Zitat Pointcheval, D., & Stern, J. (2000). Security arguments for digital signatures and blind signatures. Journal of Cryptology, 13(3), 361–396.CrossRefMATH Pointcheval, D., & Stern, J. (2000). Security arguments for digital signatures and blind signatures. Journal of Cryptology, 13(3), 361–396.CrossRefMATH
39.
Zurück zum Zitat Godor, G., Giczi, N., Imre, S. (2010). Elliptic curve cryptography based mutual authentication protocol for low computational capacity RFID systems-performance analysis by simulations. In IEEE International Conference on Wireless Communications, Networking and Information Security (WCNIS) (pp. 650–657) Godor, G., Giczi, N., Imre, S. (2010). Elliptic curve cryptography based mutual authentication protocol for low computational capacity RFID systems-performance analysis by simulations. In IEEE International Conference on Wireless Communications, Networking and Information Security (WCNIS) (pp. 650–657)
40.
Zurück zum Zitat Cao, X., & Kou, W. (2010). A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges. Information Sciences, 180(15), 2895–2903.MathSciNetCrossRefMATH Cao, X., & Kou, W. (2010). A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges. Information Sciences, 180(15), 2895–2903.MathSciNetCrossRefMATH
Metadaten
Titel
Efficient RFID Authentication Using Elliptic Curve Cryptography for the Internet of Things
verfasst von
Han Shen
Jian Shen
Muhammad Khurram Khan
Jong-Hyouk Lee
Publikationsdatum
28.09.2016
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 4/2017
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-016-3739-1

Weitere Artikel der Ausgabe 4/2017

Wireless Personal Communications 4/2017 Zur Ausgabe

Neuer Inhalt