A Secure and Privacy Friendly ECC Based RFID Authentication Protocol for Practical Applications


Arslan A., Colak S., ERTÜRK S.

WIRELESS PERSONAL COMMUNICATIONS, cilt.120, sa.4, ss.2653-2691, 2021 (SCI-Expanded) identifier identifier

  • Yayın Türü: Makale / Tam Makale
  • Cilt numarası: 120 Sayı: 4
  • Basım Tarihi: 2021
  • Doi Numarası: 10.1007/s11277-021-08552-7
  • Dergi Adı: WIRELESS PERSONAL COMMUNICATIONS
  • Derginin Tarandığı İndeksler: Science Citation Index Expanded (SCI-EXPANDED), Scopus, PASCAL, Applied Science & Technology Source, Communication Abstracts, Compendex, Computer & Applied Sciences, INSPEC
  • Sayfa Sayıları: ss.2653-2691
  • Anahtar Kelimeler: Privacy, Security, RFID, IoT, ECC, Implementation, ELLIPTIC CURVE CRYPTOGRAPHY, MUTUAL AUTHENTICATION, INTERNET, SCHEME, IDENTIFICATION, CRYPTANALYSIS, THINGS, RAC
  • Kocaeli Üniversitesi Adresli: Evet

Özet

Radio frequency identification (RFID) is a promising and widespread wireless communication technology for entity identification or authentication. By the emerging Internet of Things phenomenon, the use of RFID is densely augmenting in various daily life applications. However, RFID systems suffer from security and privacy issues. Recently, many researchers propose RFID authentication protocols based on elliptic curve cryptography (ECC) to efficiently mitigate the aforementioned concerns. In this work, we extensively examine the state-of-the-art RFID authentication protocols based on ECC in terms of security and performance. Some of these works claim that their protocols provide all general security and privacy properties. We revisit Vaudenay's formal privacy model and show that they do not provide forward and/or backward privacy under this model contrary to their claim. Then, we propose a secure, privacy-preserving and efficient ECC based RFID authentication protocol. We also present a security and performance analysis of our proposed protocol and compare it to the existing relevant schemes in detail. Furthermore, we implement our proposal in a real RFID system to demonstrate its practicability. To the best of our knowledge, our proposed scheme is the most efficient ECC based RFID authentication protocol realized in a real-world environment that satisfies all common security and privacy features including backward and forward privacy.