An Efficient RFID Authentication Scheme Based on Elliptic Curve Cryptography for Internet of Things

  • PDF / 2,861,043 Bytes
  • 27 Pages / 439.37 x 666.142 pts Page_size
  • 50 Downloads / 247 Views

DOWNLOAD

REPORT


An Efficient RFID Authentication Scheme Based on Elliptic Curve Cryptography for Internet of Things Mustapha Benssalah1   · Izza Sarah1 · Karim Drouiche2 Accepted: 11 November 2020 © Springer Science+Business Media, LLC, part of Springer Nature 2020

Abstract With the rapid development of microelectronics devices and the progress in communication and information technologies, many services and technologies are increasingly involved into our daily life. In fact, as the used systems are progressively interconnected and open, this introduce new threats such as more and more hacking, fraud and many other kinds of misuses. Consequently, the security and privacy of the exchanged data information tampering must be addressed most seriously. In this context, recently Elliptic Curve Cryptography (ECC) is widely used in many cryptosystems nowadays especially for those presenting challenging constraints in terms of power consumption, memory, computational cost, etc. It is well-known that the ECC provides high security level with much smaller key sizes. In this paper, we show that an inappropriate use of ECC cryptographic primitives, the lack of experience in designing secure protocols and the unsuitable choice of security verification tools can destroy the whole security of a given ECC-based scheme. Therefore, first we wreck efficient attacks on three most recent proposed ECC-based protocols published in three of well-known scientific journals. Then, an improved protocol that inherits the strengths of Dinarvand and Barati’s protocol and takes into account the discovered flaws is proposed. Via formal and informal security models, we assess that the improved protocol could deliver all the virtues of Dinarvand and Barati’s protocol and resists all known attacks. Keywords  ECC · Communication · Wireless networking · RFID · Security analysis

1 Introduction With the fast development of wireless communication technologies and the Internet of Things (IoT) networks, many network services and wireless devices have been generated and introduced in favor of benefits of human well-being. In fact, we assist to a growth in connectivity and data traffic convoyed by innumerable information and communications * Mustapha Benssalah [email protected] 1

Laboratoire Traitement du Signal, ’Ecole Militaire Polytechnique, BP 17 Bordj El Bahri, 16111 Algiers, Algeria

2

LIK Neuville Sur Oise, Cergy Pontoise University, Cergy‑Pontoise CEDEX, France



13

Vol.:(0123456789)



M. Benssalah et al.

technologies (ICT), such as WiFi, sensors, Bluetooth, advanced mobile communications (3G/4G), Radio Frequency Identification (RFID), etc [1, 2]. We undoubtedly that one of the main issues that the scientific community may face will be the security and privacy of the exchanged personal and secret data. In other words, the security and privacy will be one of keys distinctive indicators that other relevant performance such as data rate, range, latency, etc. Consequently, the security and the privacy aspects must be guaranteed urgently. In the recent years, n