Advertisement

Comparative Analysis of Elliptic Curve Cryptography Based Lightweight Authentication Protocols for RFID-Sensor Integrated MANETs

  • Adarsh KumarEmail author
  • Alok Aggarwal
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 940)

Abstract

In recent years, it is observed that various authentication schemes have been proposed for both resourceful and resource constraint devices. Most of these schemes are not suitable for practical applications because of known security weaknesses. In this work, elliptic curve cryptography (ECC) based authentication mechanisms are proposed for comparative analysis. Proposed authentication mechanisms are formally validated through simulation using automated lightweight cryptographic primitives for resource constrained devices. It is observed that proposed protocol 5 is giving best performance in terms of minimum jitter and processing delay, and maximum throughput for 75, 150 and 1000 nodes networks. A minimum of 4.3% (50 nodes network) and maximum of 61.9% (1000 nodes network) improvement is observed for protocol 5 as compared to other protocol.

Keywords

ECC Authentication RFID Reader Tag Simulation QoS 

References

  1. 1.
    Ashton, K.: That ‘Internet of Things’ Thing, in the real world things matter more than ideas. RFID J. http://www.rfidjournal.com/articles/view?4986. Accessed 15 July 2014
  2. 2.
    Uckelman, D., Harrison, M., Michahelles, F.: Architecturing the Internet of Things. Springer, Heidelberg (2011)Google Scholar
  3. 3.
    Aggarwal, C.C., Ashish, N., Sheth, A.: The Internet of Things: a survey from the data-centric perspective. In: Aggarwal, C. (ed.) Managing and Mining Sensor Data, pp. 383–428. Springer, Heidelberg (2013)Google Scholar
  4. 4.
    Abyaneh, M.R.S.: Security analysis of lightweight schemes for RFID systems. Ph.D. thesis, University of Bergen, Norway (2012)Google Scholar
  5. 5.
    Juel, A., Weis, S.: Authenticating pervasive devices with human protocols. In: Shoup, V. (ed.) Advances in Cryptology-Crypto 2005. LNCS, vol. 3126, pp. 293–298. Springer (2005)Google Scholar
  6. 6.
    Peris-Lopez, P., Hernandez-Castro, J.C., Esteveze-Tapiador, J.M., Ribagorda, A.: RFID systems: a survey on security threats and proposed solutions. In: International Conference on Personal Wireless Communication- PWCA 2006. LNCS, Albacete, Spain, vol. 4217, pp. 159–170 (2006)Google Scholar
  7. 7.
    Moore, G.E.: Cramming More Components onto Integrated Circuits. Electronics: http://www.intel.com. Accessed 01 June 2018
  8. 8.
    Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., Ribagorda, A.: Attacking RFID systems. In: Harold, F., Nozaki, K., Tipton, M. (ed.) Information Security Management Handbook, pp. 313–334. Auerbach Publications (2011)Google Scholar
  9. 9.
    Juels, A.: RFID security and privacy: a research survey. IEEE J. Sel. Areas Commun. 24(2), 381–394 (2006)MathSciNetGoogle Scholar
  10. 10.
    Takaragi, K., Usami, M., Imura, R., Itsuki, R., Satoh, T.: An ultra small individual recognition security chip. IEEE Micro 21(6), 43–49 (2001)Google Scholar
  11. 11.
    Koh, R., Schuster, E., Chackrabarti, I., Bellman, A.: Securing the pharmaceutical supply chain. White Paper, Auto-ID Labs, Massachusetts Institute of Technology (2003)Google Scholar
  12. 12.
    Lehtonem, M., Staake, T., Michahelles, F., Fleisch, E.: From identification to authentication- a review of RFID product authentication techniques. In: Cole, P.H., Ranasinghe, D.C. (eds.) Networked RFID Systems and Lightweight Cryptography, pp. 169–187. Springer, Heidelberg (2007)Google Scholar
  13. 13.
    Pearson, J.: Securing the pharmaceutical supply chain with RFID and public key infrastructure (PKI) technologies. Texas instruments White Paper. http://www.ti.com/rfid/docs/docntr.shtml. Accessed 01 June 2018
  14. 14.
    Nochta, Z., Staake, T., Fleisch, E.: Product specific security features based on RFID technology. In: International Symposium on Applications and the Internet Workshops (SAINTW 2006), Phoenix, AZ, pp. 72–75. Springer (2006)Google Scholar
  15. 15.
    Burmester, M., Munilla, J.: Lightweight RFID authentication with forward and backward security. ACM Trans. Inf. Syst. Secur. 14(1), 11:1–11: 26 (2011)Google Scholar
  16. 16.
    Kumar, A., Gopal, K., Aggarwal, A.: Novel trust hierarchical construction for RFID sensor-based MANETs using ECCs. ETRI J. 37(1), 186–196 (2015)Google Scholar
  17. 17.
    Kumar, A., Gopal, K., Aggarwal, A.: A novel lightweight key management scheme for RFID-sensor integrated hierarchical MANET based on internet of things. Int. J. Adv. Intell. Parad. 9(2–3), 220–245 (2017)Google Scholar
  18. 18.
    Lata, M., Kumar, A.: Survey on lightweight primitives and protocols for RFID in wireless sensor networks. Int. J. Commun. Netw. Inf. Secur. (IJCNIS) 6(1), 29–43 (2014)Google Scholar
  19. 19.
    Kumar, A., Aggarwal, A.: Lightweight cryptographic primitives for mobile ad hoc networks. In: International Conference on Security in Computer Networks and Distributed Systems, pp. 240–251, Springer, Heidelberg (2014)Google Scholar
  20. 20.
    Cao, T., Bertino, E., Lei, H.: Security analysis of the SASI protocol. IEEE Trans. Dependable Secur. Comput. 6(1), 73–77 (2009)Google Scholar
  21. 21.
    Sun, H.-M., Ting, W.C., Wang, K.H.: On the security of Chien’s ultralightweight RFID authentication protocol. IEEE Trans. Dependable Secur. Comput. 8(2), 315–317 (2011)Google Scholar
  22. 22.
    D’Arco, P., De Santis, A.: On ultralightweight RFID authentication protocols. IEEE Trans. Dependable Secur. Comput. 8(4), 548–563 (2011)Google Scholar
  23. 23.
    Stephen, W., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and privacy aspects of low-cost radio frequency identification systems, In: Hutter, D., Muller, G., Stephan, W., Ullman, M. (eds.) First International Conference on Security in Pervasive Computing, Boppard, Germany, pp. 201–212. Springer (2004)Google Scholar
  24. 24.
    Kumar, A., Aggarwal, A.: Performance analysis of MANET using elliptic curve cryptosystem. In: 14th International Conference on Advanced Communication Technology (ICACT), pp. 201–206. IEEE (2012)Google Scholar
  25. 25.
    Kumar, A., Gopal, K., Aggarwal, A.: Simulation and cost analysis of group authentication protocols. In: 2016 Ninth International Conference on Contemporary Computing (IC3), Noida, India, pp. 1–7. IEEE (2016)Google Scholar
  26. 26.
    Kumar, A., Aggarwal, A., Gopal, K.: A novel and efficient reader-to-reader and tag-to-tag anti-collision protocol. IETE J. Res. 1–12 (2018). (Published Online)Google Scholar
  27. 27.
    Kumar, A., Gopal, K., Aggarwal, A.: Design and analysis of lightweight trust mechanism for secret data using lightweight cryptographic primitives in MANETs. IJ Netw. Secur. 18(1), 1–18 (2016)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.University of Petroleum and Energy StudiesDehradunIndia

Personalised recommendations