4.4 Article

A Secure and Privacy Friendly ECC Based RFID Authentication Protocol for Practical Applications

Journal

WIRELESS PERSONAL COMMUNICATIONS
Volume 120, Issue 4, Pages 2653-2691

Publisher

SPRINGER
DOI: 10.1007/s11277-021-08552-7

Keywords

Privacy; Security; RFID; IoT; ECC; Implementation

Ask authors/readers for more resources

RFID technology is widely used in the Internet of Things era, but security and privacy issues have always existed. In recent years, researchers have proposed RFID authentication protocols based on elliptic curve cryptography to improve security. This study proposes a secure, privacy-preserving, and efficient ECC-based RFID authentication protocol, achieving the most effective solution in a real-world environment.
Radio frequency identification (RFID) is a promising and widespread wireless communication technology for entity identification or authentication. By the emerging Internet of Things phenomenon, the use of RFID is densely augmenting in various daily life applications. However, RFID systems suffer from security and privacy issues. Recently, many researchers propose RFID authentication protocols based on elliptic curve cryptography (ECC) to efficiently mitigate the aforementioned concerns. In this work, we extensively examine the state-of-the-art RFID authentication protocols based on ECC in terms of security and performance. Some of these works claim that their protocols provide all general security and privacy properties. We revisit Vaudenay's formal privacy model and show that they do not provide forward and/or backward privacy under this model contrary to their claim. Then, we propose a secure, privacy-preserving and efficient ECC based RFID authentication protocol. We also present a security and performance analysis of our proposed protocol and compare it to the existing relevant schemes in detail. Furthermore, we implement our proposal in a real RFID system to demonstrate its practicability. To the best of our knowledge, our proposed scheme is the most efficient ECC based RFID authentication protocol realized in a real-world environment that satisfies all common security and privacy features including backward and forward privacy.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.4
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available