Skip to main content

Comparative Analysis of Elliptic Curve Cryptography Based Lightweight Authentication Protocols for RFID-Sensor Integrated MANETs

  • Conference paper
  • First Online:

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 940))

Abstract

In recent years, it is observed that various authentication schemes have been proposed for both resourceful and resource constraint devices. Most of these schemes are not suitable for practical applications because of known security weaknesses. In this work, elliptic curve cryptography (ECC) based authentication mechanisms are proposed for comparative analysis. Proposed authentication mechanisms are formally validated through simulation using automated lightweight cryptographic primitives for resource constrained devices. It is observed that proposed protocol 5 is giving best performance in terms of minimum jitter and processing delay, and maximum throughput for 75, 150 and 1000 nodes networks. A minimum of 4.3% (50 nodes network) and maximum of 61.9% (1000 nodes network) improvement is observed for protocol 5 as compared to other protocol.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Ashton, K.: That ‘Internet of Things’ Thing, in the real world things matter more than ideas. RFID J. http://www.rfidjournal.com/articles/view?4986. Accessed 15 July 2014

  2. Uckelman, D., Harrison, M., Michahelles, F.: Architecturing the Internet of Things. Springer, Heidelberg (2011)

    Book  Google Scholar 

  3. Aggarwal, C.C., Ashish, N., Sheth, A.: The Internet of Things: a survey from the data-centric perspective. In: Aggarwal, C. (ed.) Managing and Mining Sensor Data, pp. 383–428. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  4. Abyaneh, M.R.S.: Security analysis of lightweight schemes for RFID systems. Ph.D. thesis, University of Bergen, Norway (2012)

    Google Scholar 

  5. Juel, A., Weis, S.: Authenticating pervasive devices with human protocols. In: Shoup, V. (ed.) Advances in Cryptology-Crypto 2005. LNCS, vol. 3126, pp. 293–298. Springer (2005)

    Google Scholar 

  6. Peris-Lopez, P., Hernandez-Castro, J.C., Esteveze-Tapiador, J.M., Ribagorda, A.: RFID systems: a survey on security threats and proposed solutions. In: International Conference on Personal Wireless Communication- PWCA 2006. LNCS, Albacete, Spain, vol. 4217, pp. 159–170 (2006)

    Google Scholar 

  7. Moore, G.E.: Cramming More Components onto Integrated Circuits. Electronics: http://www.intel.com. Accessed 01 June 2018

  8. Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., Ribagorda, A.: Attacking RFID systems. In: Harold, F., Nozaki, K., Tipton, M. (ed.) Information Security Management Handbook, pp. 313–334. Auerbach Publications (2011)

    Google Scholar 

  9. Juels, A.: RFID security and privacy: a research survey. IEEE J. Sel. Areas Commun. 24(2), 381–394 (2006)

    Article  MathSciNet  Google Scholar 

  10. Takaragi, K., Usami, M., Imura, R., Itsuki, R., Satoh, T.: An ultra small individual recognition security chip. IEEE Micro 21(6), 43–49 (2001)

    Article  Google Scholar 

  11. Koh, R., Schuster, E., Chackrabarti, I., Bellman, A.: Securing the pharmaceutical supply chain. White Paper, Auto-ID Labs, Massachusetts Institute of Technology (2003)

    Google Scholar 

  12. Lehtonem, M., Staake, T., Michahelles, F., Fleisch, E.: From identification to authentication- a review of RFID product authentication techniques. In: Cole, P.H., Ranasinghe, D.C. (eds.) Networked RFID Systems and Lightweight Cryptography, pp. 169–187. Springer, Heidelberg (2007)

    Google Scholar 

  13. Pearson, J.: Securing the pharmaceutical supply chain with RFID and public key infrastructure (PKI) technologies. Texas instruments White Paper. http://www.ti.com/rfid/docs/docntr.shtml. Accessed 01 June 2018

  14. Nochta, Z., Staake, T., Fleisch, E.: Product specific security features based on RFID technology. In: International Symposium on Applications and the Internet Workshops (SAINTW 2006), Phoenix, AZ, pp. 72–75. Springer (2006)

    Google Scholar 

  15. Burmester, M., Munilla, J.: Lightweight RFID authentication with forward and backward security. ACM Trans. Inf. Syst. Secur. 14(1), 11:1–11: 26 (2011)

    Article  Google Scholar 

  16. Kumar, A., Gopal, K., Aggarwal, A.: Novel trust hierarchical construction for RFID sensor-based MANETs using ECCs. ETRI J. 37(1), 186–196 (2015)

    Article  Google Scholar 

  17. Kumar, A., Gopal, K., Aggarwal, A.: A novel lightweight key management scheme for RFID-sensor integrated hierarchical MANET based on internet of things. Int. J. Adv. Intell. Parad. 9(2–3), 220–245 (2017)

    Google Scholar 

  18. Lata, M., Kumar, A.: Survey on lightweight primitives and protocols for RFID in wireless sensor networks. Int. J. Commun. Netw. Inf. Secur. (IJCNIS) 6(1), 29–43 (2014)

    Google Scholar 

  19. Kumar, A., Aggarwal, A.: Lightweight cryptographic primitives for mobile ad hoc networks. In: International Conference on Security in Computer Networks and Distributed Systems, pp. 240–251, Springer, Heidelberg (2014)

    Google Scholar 

  20. Cao, T., Bertino, E., Lei, H.: Security analysis of the SASI protocol. IEEE Trans. Dependable Secur. Comput. 6(1), 73–77 (2009)

    Article  Google Scholar 

  21. Sun, H.-M., Ting, W.C., Wang, K.H.: On the security of Chien’s ultralightweight RFID authentication protocol. IEEE Trans. Dependable Secur. Comput. 8(2), 315–317 (2011)

    Article  Google Scholar 

  22. D’Arco, P., De Santis, A.: On ultralightweight RFID authentication protocols. IEEE Trans. Dependable Secur. Comput. 8(4), 548–563 (2011)

    Article  Google Scholar 

  23. Stephen, W., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and privacy aspects of low-cost radio frequency identification systems, In: Hutter, D., Muller, G., Stephan, W., Ullman, M. (eds.) First International Conference on Security in Pervasive Computing, Boppard, Germany, pp. 201–212. Springer (2004)

    Google Scholar 

  24. Kumar, A., Aggarwal, A.: Performance analysis of MANET using elliptic curve cryptosystem. In: 14th International Conference on Advanced Communication Technology (ICACT), pp. 201–206. IEEE (2012)

    Google Scholar 

  25. Kumar, A., Gopal, K., Aggarwal, A.: Simulation and cost analysis of group authentication protocols. In: 2016 Ninth International Conference on Contemporary Computing (IC3), Noida, India, pp. 1–7. IEEE (2016)

    Google Scholar 

  26. Kumar, A., Aggarwal, A., Gopal, K.: A novel and efficient reader-to-reader and tag-to-tag anti-collision protocol. IETE J. Res. 1–12 (2018). (Published Online)

    Google Scholar 

  27. Kumar, A., Gopal, K., Aggarwal, A.: Design and analysis of lightweight trust mechanism for secret data using lightweight cryptographic primitives in MANETs. IJ Netw. Secur. 18(1), 1–18 (2016)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Adarsh Kumar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kumar, A., Aggarwal, A. (2020). Comparative Analysis of Elliptic Curve Cryptography Based Lightweight Authentication Protocols for RFID-Sensor Integrated MANETs. In: Abraham, A., Cherukuri, A.K., Melin, P., Gandhi, N. (eds) Intelligent Systems Design and Applications. ISDA 2018 2018. Advances in Intelligent Systems and Computing, vol 940. Springer, Cham. https://doi.org/10.1007/978-3-030-16657-1_87

Download citation

Publish with us

Policies and ethics