Abstract
In recent years, it is observed that various authentication schemes have been proposed for both resourceful and resource constraint devices. Most of these schemes are not suitable for practical applications because of known security weaknesses. In this work, elliptic curve cryptography (ECC) based authentication mechanisms are proposed for comparative analysis. Proposed authentication mechanisms are formally validated through simulation using automated lightweight cryptographic primitives for resource constrained devices. It is observed that proposed protocol 5 is giving best performance in terms of minimum jitter and processing delay, and maximum throughput for 75, 150 and 1000 nodes networks. A minimum of 4.3% (50 nodes network) and maximum of 61.9% (1000 nodes network) improvement is observed for protocol 5 as compared to other protocol.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Ashton, K.: That ‘Internet of Things’ Thing, in the real world things matter more than ideas. RFID J. http://www.rfidjournal.com/articles/view?4986. Accessed 15 July 2014
Uckelman, D., Harrison, M., Michahelles, F.: Architecturing the Internet of Things. Springer, Heidelberg (2011)
Aggarwal, C.C., Ashish, N., Sheth, A.: The Internet of Things: a survey from the data-centric perspective. In: Aggarwal, C. (ed.) Managing and Mining Sensor Data, pp. 383–428. Springer, Heidelberg (2013)
Abyaneh, M.R.S.: Security analysis of lightweight schemes for RFID systems. Ph.D. thesis, University of Bergen, Norway (2012)
Juel, A., Weis, S.: Authenticating pervasive devices with human protocols. In: Shoup, V. (ed.) Advances in Cryptology-Crypto 2005. LNCS, vol. 3126, pp. 293–298. Springer (2005)
Peris-Lopez, P., Hernandez-Castro, J.C., Esteveze-Tapiador, J.M., Ribagorda, A.: RFID systems: a survey on security threats and proposed solutions. In: International Conference on Personal Wireless Communication- PWCA 2006. LNCS, Albacete, Spain, vol. 4217, pp. 159–170 (2006)
Moore, G.E.: Cramming More Components onto Integrated Circuits. Electronics: http://www.intel.com. Accessed 01 June 2018
Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., Ribagorda, A.: Attacking RFID systems. In: Harold, F., Nozaki, K., Tipton, M. (ed.) Information Security Management Handbook, pp. 313–334. Auerbach Publications (2011)
Juels, A.: RFID security and privacy: a research survey. IEEE J. Sel. Areas Commun. 24(2), 381–394 (2006)
Takaragi, K., Usami, M., Imura, R., Itsuki, R., Satoh, T.: An ultra small individual recognition security chip. IEEE Micro 21(6), 43–49 (2001)
Koh, R., Schuster, E., Chackrabarti, I., Bellman, A.: Securing the pharmaceutical supply chain. White Paper, Auto-ID Labs, Massachusetts Institute of Technology (2003)
Lehtonem, M., Staake, T., Michahelles, F., Fleisch, E.: From identification to authentication- a review of RFID product authentication techniques. In: Cole, P.H., Ranasinghe, D.C. (eds.) Networked RFID Systems and Lightweight Cryptography, pp. 169–187. Springer, Heidelberg (2007)
Pearson, J.: Securing the pharmaceutical supply chain with RFID and public key infrastructure (PKI) technologies. Texas instruments White Paper. http://www.ti.com/rfid/docs/docntr.shtml. Accessed 01 June 2018
Nochta, Z., Staake, T., Fleisch, E.: Product specific security features based on RFID technology. In: International Symposium on Applications and the Internet Workshops (SAINTW 2006), Phoenix, AZ, pp. 72–75. Springer (2006)
Burmester, M., Munilla, J.: Lightweight RFID authentication with forward and backward security. ACM Trans. Inf. Syst. Secur. 14(1), 11:1–11: 26 (2011)
Kumar, A., Gopal, K., Aggarwal, A.: Novel trust hierarchical construction for RFID sensor-based MANETs using ECCs. ETRI J. 37(1), 186–196 (2015)
Kumar, A., Gopal, K., Aggarwal, A.: A novel lightweight key management scheme for RFID-sensor integrated hierarchical MANET based on internet of things. Int. J. Adv. Intell. Parad. 9(2–3), 220–245 (2017)
Lata, M., Kumar, A.: Survey on lightweight primitives and protocols for RFID in wireless sensor networks. Int. J. Commun. Netw. Inf. Secur. (IJCNIS) 6(1), 29–43 (2014)
Kumar, A., Aggarwal, A.: Lightweight cryptographic primitives for mobile ad hoc networks. In: International Conference on Security in Computer Networks and Distributed Systems, pp. 240–251, Springer, Heidelberg (2014)
Cao, T., Bertino, E., Lei, H.: Security analysis of the SASI protocol. IEEE Trans. Dependable Secur. Comput. 6(1), 73–77 (2009)
Sun, H.-M., Ting, W.C., Wang, K.H.: On the security of Chien’s ultralightweight RFID authentication protocol. IEEE Trans. Dependable Secur. Comput. 8(2), 315–317 (2011)
D’Arco, P., De Santis, A.: On ultralightweight RFID authentication protocols. IEEE Trans. Dependable Secur. Comput. 8(4), 548–563 (2011)
Stephen, W., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and privacy aspects of low-cost radio frequency identification systems, In: Hutter, D., Muller, G., Stephan, W., Ullman, M. (eds.) First International Conference on Security in Pervasive Computing, Boppard, Germany, pp. 201–212. Springer (2004)
Kumar, A., Aggarwal, A.: Performance analysis of MANET using elliptic curve cryptosystem. In: 14th International Conference on Advanced Communication Technology (ICACT), pp. 201–206. IEEE (2012)
Kumar, A., Gopal, K., Aggarwal, A.: Simulation and cost analysis of group authentication protocols. In: 2016 Ninth International Conference on Contemporary Computing (IC3), Noida, India, pp. 1–7. IEEE (2016)
Kumar, A., Aggarwal, A., Gopal, K.: A novel and efficient reader-to-reader and tag-to-tag anti-collision protocol. IETE J. Res. 1–12 (2018). (Published Online)
Kumar, A., Gopal, K., Aggarwal, A.: Design and analysis of lightweight trust mechanism for secret data using lightweight cryptographic primitives in MANETs. IJ Netw. Secur. 18(1), 1–18 (2016)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Kumar, A., Aggarwal, A. (2020). Comparative Analysis of Elliptic Curve Cryptography Based Lightweight Authentication Protocols for RFID-Sensor Integrated MANETs. In: Abraham, A., Cherukuri, A.K., Melin, P., Gandhi, N. (eds) Intelligent Systems Design and Applications. ISDA 2018 2018. Advances in Intelligent Systems and Computing, vol 940. Springer, Cham. https://doi.org/10.1007/978-3-030-16657-1_87
Download citation
DOI: https://doi.org/10.1007/978-3-030-16657-1_87
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-16656-4
Online ISBN: 978-3-030-16657-1
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)