A Lightweight Authentication Scheme for RFID Using ECC
- 10 Downloads
Internet of things (IoT) contains a massive number of “things” which are communicated without human interaction. The “things” refers to a physical device such as bar code, tag, smart card, etc. These devices contain a limited amount of memory and a small processing unit. Hence, these devices require a lightweight scheme to provide authentication. However, there are various security issues with these tags such as tracking, cloning, replay attacks, disclosure attack, etc. To remove these security issues, many researchers proposed various authentication schemes. However, there are various security issues, large storage and communication requirement in these schemes. A new lightweight authentication scheme for RFID tag has been proposed which uses hash function and elliptic curve cryptography to authenticate tag and server. The hash function provides irreversibly to the scheme. The performance analysis of the scheme is analyzed in terms of communication, storage, and memory required to store the data. The scheme requires 3 hash function and 1 multiplication to mutual authentication between tag and reader. The scheme provides mutual authentication, forward security and also resistance from tracking attack, cloning attack.
KeywordsIoT RFID Mutual authentication Untraceable privacy
- 1.Bringer, J., Chabanne, H., Icart, T.: Cryptanalysis of EC-RAC a RFID identification protocol. In: International Conference on Cryptology and Network Security, pp. 149–161. Springer (2008)Google Scholar
- 5.Lee, Y.K., Batina, L., Verbauwhede, I.: EC-RAC (ECDLP based randomized access control): provably secure RFID authentication protocol. In: 2008 IEEE International Conference on RFID, pp. 97–104. IEEE (2008)Google Scholar
- 7.Ryu, E.K., Kim, D.S., Yoo, K.Y.: On elliptic curve based untraceable RFID authentication protocols. In: Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, pp. 147–153. ACM (2015)Google Scholar