SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1189
Lightweight ECC based RFID Authentication Protocol
Aditya M Pillai1, Amulya Bhardwaj2, Gopesh Mittal3, Prof. Sanjeev Kumar4
1Aditya M. Pillai, Dept. of Computer Science and Engineering, ABESIT, Ghaziabad, India.
2Amulya Bhardwaj, Dept. of Computer Science and Engineering, ABESIT, Ghaziabad, India.
3Gopesh Mittal, Dept. of Computer Science and Engineering, ABESIT, Ghaziabad, India.
4Professor Sanjeev Kumar, Dept. of Computer Science and Engineering, ABESIT, Ghaziabad, India.
----------------------------------------------------------------------***---------------------------------------------------------------------
ABSTRACT:- The RFID (radio frequency identification)
technology is being extensively accepted and used as a
governing recognizing technology in medical management
domain like information corroboration, patient records,
blood transmission, etc. With more rigid security concern
to RFID based authentication protocols, ECC (elliptic curve
cryptography) established Radio Frequency Identification
verification protocols is being expected to fit the
prerequisite of security and privacy. However, abounding
new published ECC based RFID protocols have severe
security vulnerability. In the following paper, we have
reviewed few RFID verification and authentication
protocols and has compared its strengths, fragility and
proposed less complex and more efficient authentication
protocol.
Key words: Lightweight ECC, light weight elliptical
curve cryptography, RFID, radio frequency identification,
authentication protocol, automatic verification, standard
encryption, decryption, random cyclic redundancy
analysis, authentication code functions, hash functions,
server-identification, tag-identification.
1. Introduction
The RFID (radio frequency identification) technology
allows the automated, noncontact and exclusive
recognition of objects using radio waves and it is studied
as the finest reinstatement of the existing barcode
technologies. [1] RFID technology is being accepted in an
extensive diversity of corporation and being
progressively used in various fields, like manufacturing,
management, supply chain, inventory management, e-
passport processing, etc. [2].
Inclusion to various utilization in our day to day life, the
RFID is already a big part of the health care field. For
example, it is being used for location tracking of medical
and health capitals, in-patient and out-patient
identification and validation, health treatments progress
tracking, locating patients and procedure administration
at the wellbeing place, and surgical management [3–6].
The main peripheral of RFID systems are back-end
servers, tags and readers. RFID tag is a recognition gear
affixed to object that is to be recognized, which makes
use of RF (radio frequency) to connect and establish
identification of item being read. RFID reader is also a
gear which can be used to observe the presence of RFID
tags on any object nearby and collect the data being
supplied by tag to reader. The reader identifies the tags
by transmitting radio frequency signals, and tag
acknowledge to the reader with a particular number or
any other identifying data. The reader promote the RFID
tag response data to the back-end of the RFID device i.e.
servers. The server has several databases containing tags
information and its related data and is capable of
retrieving complete facts and information required
related to the tag from the tag response/data being fed.
The main assets of RFID devices are that, it gives
automated and various identification seizure and system
performance analysis. RFID readers can automatically
scan numerous tags at the same time, also be used to
track important items. However, RFID systems makes
the security and privacy of the holder of the tag
vulnerable, as the result of automated verification and
identification .[7]
In this paper, we are providing with a RFID protocol that
is based on ECC(Elliptic Curve Cryptography). We
implemented the protocol in telosb using TinyOS NesC.
We also implemented another existing protocol and
performed a comparison between our and the existing
protocol and thus it can be clearly understood that our
protocol provides faster communication.
Fig.1: A typical RFID-based system
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1190
2. Problem Statement
RFID tags are lightweight and resource constraint. These
components have limited amount of battery power,
memory. Security issue comes in case of communication
with RFID tags. Different authentication protocols have
been proposed to secure the data transmission. But due
to privacy security issues, all standard encryption
decryption algorithms authentication protocols cannot
be used. We are proposing a verification and
authentication scheme in this paper.
Some of the major motivation and scopes are enlisted
below:
• Resource constraint components have limited amount
of battery power, memory.
• Secure data transmission between lightweight devices.
3.Existing RFID authentication protocols
There are various numbers of research papers and
groups that are being burdened by the security and
privacy significance of the RFID (Radio Frequency
Identification) systems and its various authentication
and validation protocols for the same are being designed.
In the following paper, we have covered the current
works regarding RFID authentication protocols. The way
RFID tags and scanner work, they can be categorised into
three tags: passive, active and semi active tags. Passive
are the one, being used in related protocols. Juels [8]
created verification and authentication scheme with the
help of message authentication functions and hash code
functions to construct protocols for medical applications.
Making improvements in his work, Wong al. [9] too used
same functions to construct “hash-lock” protocol. sadly,
Chen et. [10] discovered that Juel al.’s protocol was
unable to provide RFID tag anonymity and can easily fall
prey to rep0lay attack by the intruder. He also stated
that [10] Wong al.’s protocol was unable to provide with
location secrecy along with being prone to the
impersonation and the replay attack.[11].
Further to enhance RFID security and performance
issues, Chien used the random cyclic redundancy
analysis to construct a mutual identification and
authentication protocol. With time, Lopez al. [12]
discovered that protocol being developed by Chien was
unable to ensure forward privacy along with location
secrecy. To resolve these issues, Lo al. [13] introduced a
better protocol for authentication inspired from Chien’s
proposal. Nonetheless, Yeh al. [14] stated that Loal.’s
[13] proposal was still not able to provide location
secrecy. A new authentication protocol was introduced
by Yeh et al. [14] with improved privacy and security.
However, Yeh et al.’s was not able to provide security
from the server impersonation and the data integrity
attacks from the intruder, because of the fact that data
was being transferred to server in the plain text format.
Cho et al. [15] made use of the similar message
authentication code functions and hash functions to
create a better and secure authentication protocol.
However, Cho et al.’s scheme was very prone to the
various attacks like resynchronization, the tag
impersonation and the impersonating reader’s attack,
which was shown by Safkhani et al. [16] in his proposal.
New studies on, the public key cryptography like ECC is
also used in the design of RFID identification and
authentication protocols. Chen et al. in his paper was the
first to propose the RFID identification and
authentication protocol with the help of quadratic
residues in his work. Later on, Cao and Shen [17]
discovered that Chen’s proposal was very much prone to
the tag impersonation attack and the replay attack. In
order to resolve these security issues, Yeh and Wu [18]
provided with enhanced RFID authentication protocol
with the help of quadratic residues. Further, for making
the system efficiency better, Doss al. [19] developed a
new RFID identification and authentication protocol
similarly with the quad residues. In comparison with the
cryptography using quadric residues, the Elliptic curve
cryptography (ECC) was able to provide the equivalent
level of privacy and security with much smaller key size
as compared to previous approaches.
Thus, ECC-based RFID identification and authentication
protocol is much more efficient. Lee et al. [20] created an
ECC-RFID protocol for authentication and declared that
their protocol is probably more secure and efficient.
Nonetheless, Bringer [21] and Deursen [22] discovered
that Lee’s protocol was prone to the various attacks like
tracking attack and the replay attack. Now, for enhancing
the privacy and security, Lee [23] created yet other RFID
authentication scheme/protocol.
Nonetheless, Deursen [24] showed that Lee’s protocol
[20] was still defenceless to the tracking attack. Further,
a new ECC-based RFID authentication protocol was
developed by Lee [25] to conquer vulnerability in
various previous protocols. Sadly, later on it was
indicated by Lv et al. [26] that Lee’s 3 protocols are very
much prone to the tracking attack. Newly introduced
work by, Liao and Hsiao [27] gave an ECC-based RFID
identification and authentication protocol unified with
an ID-verifier transmission scheme and asserted that
their protocol can be easily implemented to provide
security from various threats. Nonetheless, further it was
shown in Peeters and Hermans work [28], that Liao and
Hsiao’s proposal was very much prone to the server
impersonation attack.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1191
3.1 Liao and Hsiao Authentication Protocol
Fig. 2: Liao and hsiao’s protocol.
The writer gave their authentication rules on the basis of
public key cryptanalysis but did considered the fact 1)
tag-attestation is established on the transmitted privacy
ZT, and 2) Identification of the server is established on
the transmitted secret data xT. For tag-identification the
public data of the tag is masked using an
unauthenticated Diffie-Helmann compliance scheme to
solve TKT1 = TKS1 and an implicit authenticated variant to
compute TKT2= TKS2. For RFID server verification of the
value of R1 and R2 is crossed with the tag’s private key xT.
3.2 Debiao He’s Authentication Protocol
Fig. 3: Debiao He’s Protocol
3.3 Issues in existing protocols
Tag-authentication and secrecy depend on the lack of the
attacker knowledge to know the tag’s public component
ZT . Nonetheless, it freely can get the information about
the tag, without physical attack, Directly by transmitting
R2 = −PS. It referes to fact that the tag will convey to tag,
AuthT = ZT − r1PS + r1 PS = ZT. The executive ability is to
withdraw this unique identifier which enables no
secrecy properties can be obtained. Here, the elemental
attack prones can easily be reduced by tag analyzing that
R2 = −PS .
Yet, the intrusion can freely be continued by
approximating R2= −PS +αP along α ∈R ZN. The result
from the tag will be AuthT = ZT+ r1 (−P S+ αP) + r1 PS = ZT
+ α r1 P. The mugger thus now easily recovers ZT = AuthT
− αR1.
Shared secret when used in RFID helps in achieving
Server-attestation. Yet, Liao and Hsiao explained in their
proposal server spoofing attack as an intrusion where
the intruder is able to imitate a server to a tag whose
safety is being compromised (i.e. access to the tag’s
secret data). Thus, the intruder gains knowledge about
xT - tag and transmits xT(R1 + R2 ), strongly verifying as
the genuine server. Here, it can be noted that there is no
requirement of any data even r2 for this intrusion.
For mutual verification theorem of RFID system it can be
contend that it is not that important concern for the
private RFID verification scheme. Yet, if additional
information is to be send by tag or sever, for instance,
RFID readings, authentications are vital. Thus both tag
and server-attestation is not obtained, thus further it
fails to obtain mutual authentication.
Therefore, the proposed scheme by Liao and Hsiao is
very much prone mainly from existing homomorphic
schemes consisting the input-output data which can be
easily attacked. Thus resulting into less secure and
private functions is obtained by this protocol.
4. Proposed Protocol
 F(q): field size is given by q and F(q) defines the
finite field.
 a,b: two parameters of an elliptic curve E.
 y2 =x3 +ax+b represents the elliptic curve E, over
the limited field F(q).
 P: generator point.
 y: Server’s private key.
 x: private key for the Tag
 R1 , R4: message from server to tag.
 C1 , R2 :message from tag to server.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1192
Fig. 3: Proposed Protocol.
Information regarding the private and public
keys of server and tag are stored in server, whereas, but
no access of server’s private key is given to the tag. R’ and
R1 values are calculated by server. R1 is sent to the tag.
When received, R1 is where tag performs an operation
which results in C1, R’’ is calculated and R2, updates C1, C1
and R2 are sent to the server.
The server performs operation on C1 and R’ result
matching is done with the former. If matching fails,
communication is stopped, else on R2 an operation is
performed by server which results in R4 which in turn is
sent to the tag.
The tag, when received, checks are done for if values are
matched with R’’. If matching is successful then only
communication is further continued, which means both
sides have been successfully authenticated, else no
communication will take place.
5. Analysis of Security
5.1 Theorem 1: Mutual Authentication
No generation of legal message R1 is carried without the
information of r1 and y where r1 is the randomized
number that is generated by the server and y being the
private key of the server. Only server knows both these
values and they are not passed during the
communication, this maintains the secrecy of the two
values, and hence is only stored in server. No generation
of legal message R2 can happen without the information
of r2 and x, r 2 being a random generated number by tag
and x being the tag’s private key. Thus, Mutual
Authentication between the tag and the server could be
ingrained by the proposed scheme.
5.2 Theorem 2: Anonymity
Tag x has a secret key which is known by the tag and
server both. In any step, given value never be passed in
any occurring step of the process and hence cannot be
fetched in any way. Therefore, private key can never be
fetched: x for the tag and our proposed protocol can
exhibit anonymity.
5.3 Theorem 3: Availability
By the representation of our proposed protocol, it is
clear that no synchronous update of the private key is
required in protocol execution. Therefore execution of
the proposed protocol can be completed among the
server and the tag. Therefore, availability is provided by
our proposed protocol.
5.4 Theorem 4: Forward Security
Suppose in any case secret key of tag, x, can be fetched.
However, it cannot be determined if the messages R1 and
R2 are being transmitted between the tag and the server
since he has no idea about r1 and r2 for them being
random numbers. So, tag cannot be traced and hence
forward security could be exhibited by proposed
protocol.
5.5 Theorem 5: Replay Attack
Inferring that the data R1 is being intercepted and
replayed to tag. However, R4 cannot be generated upon
receiving the message C1 and R since r2 being the new
randomized number is being produced by tag and tag’s
private data x is not known. Thus, the tag is unable to
find the attacker by checking the R4 correctness measure.
Similarly, we can show how the server could find the
replay attack by checking the R3 correctness measure.
Therefore, replay attack can be held back by our
proposed protocol.
5.6 Theorem 6: Impersonation Attack
The legal message C1, R1 has to be generated by the
attacker, to imitate the tag to the server. Though, the
adversary cannot generate C1 and R1 because he does not
know r2 and x. Thus, the proposed protocol can combat
the impersonation attack.
5.7 Theorem 7: Server Spoofing Attack
To imitate the server to the tag, the adversary can
generate a random number r1, compute R’ but he cannot
generate R2 as they does not know the server’s secret key
y, neither they know the tag’s secret key x. Hence, the
attacker cannot imitate the server to the tag and the
illustrated scheme can combat server spoofing attack.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1193
5.8 Theorem 8: DoS Attack
In the given scheme, the tag’s secret key x needs no
concurrently update after the scheme is executed as the
tag’s secret key is well secured. Thus, the proposed
scheme can combat DoS attack.
5.9 Theorem 9: Location Tracking Attack
Assume that the tag’s secret key x can be hacked by the
attacker and seize the messages. To get the server’s
secret key y and two random values r 1 and r2, the
attacker does not have the capabilities to obtain that
secret key, hence it cannot confirm that either those
messages are communicated between the server and the
tag. Thus, the illustrated scheme can overcome the
location tracking attack.
5.10 Theorem 10: Cloning Attack
In the illustrated scheme, we know that each tag consists
of their own private data x. Suppose this private
data/key of various number tags can be hacked by the
attacker. Since, there is no correlation among tag’s secret
key, so that he cannot get the private data of another tag.
Therefore, the proposed protocol can combat cloning
attack.
6. Performance Analysis
The computational cost, the communicational cost and
the memory requirement of the proposed scheme is
being analysed in this module. The Liao and Hsiao’s
scheme [26] is also compared here. We imagine that an
elliptic curve with length of 160bits are used in
associated schemes, In order to get the same security
level. Then the length of an elliptic curve point is 320
bits. The running time of an elliptic curve scale
multiplication operation on a 5-MHz tag and a PIV 3 GHZ
server is 0.064s and 0.83ms separately [29, 30]. The
mandatory running time for the server and the tag when
they execute the verification scheme shows the
estimation costs. The most complicated operation in
both of the proposed scheme and Liao et al.’s scheme is
elliptic curve scale multiplication. Here, the estimation
cost of those operations could be ignored because we
have to compare the number of such operations. Let TEM
represents the running time of an elliptic curve scale
multiplication operation. We confirm that the
recommended authentication scheme provides a 40 %
reduction of the estimation cost compared with Liao and
Hsiao’s scheme because the computational comparisons
between the proposed scheme and Liao et al.’s scheme
are listed in Table 1.
Table 1- Computational Cost Comparisons.
The cost gives the wide-range of the communicational
messages which communicate among the tags and the
servers when they execute the verification scheme. The
server in the suggested plan sends the message m1 ={R1}
and m3 ={R4} to the tag. Then the server’s circulation
cost is 320+320=640 bits. The tag in the proposed
scheme sends the message m 2 = {R2, C1} to the server.
Then the communicational cost of the tag’s is
320+320=640 bits. Below here the proposed scheme and
Liao et al.’s scheme as listed in Table 2 shows the
communicational comparison.
Table-2: Communicational Cost Comparisons.
When the authentication scheme is performed the
memory requirement represents the required memory
space of the data in the tag side and the server side. To
store system parameters params={q,a,b,P,n}, the tag in
the proposed scheme is used.
To store system parameters params={q,a,b,P,n}, its
private key y and its public key R’, the server in the
illustrated scheme is used . The ID-verifier R’’ for each
tag is also stored. Then the storage requirement of the
tag is 160+160+160+320+160+160+320+320 w
=(1,440+320 w) bits, where w denotes the number of
tags in the system. The proposed scheme and Liao’s
scheme are listed in Table 3 represents the storage
requirements comparison.
Table-3: Storage Cost Comparisons
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1194
7. Conclusion
In our proposed scheme, we have provided with a ECC-
based RFID authentication and identification protocol.
The proposed protocol can withstand multiple security
threats and attacks with much greater efficiency. The
results from this analysis can be further used to make
sure, the proposed protocol is able to provide robust
security and privacy properties and it is able to
withstand numerous attacks while it can also overcome
various drawbacks seen in previously proposed
protocols.
8. References
[1] Juels, RFID security and privacy: a research survey,
IEEE Journal on Selected Areas in Communication 24
(2006) 381-394.
[2] T. Phillips, T. Karygiannis, R. Kuhn, Security
standards for the RFID market, IEEE Security &
Privacy 3 (6) (2005) 85-89.
[3] C.M. Robert, Radio frequency identification,
Computers and Security 25 (2006) 18-26.
[4] P. Peris-Lopez, A. Orfila, A. Mitrokots, J. van der
Lubbe, A comprehensive RFID solution to enhance
inpatient medication safety,International Journal of
Medical Informatics 80 (2011) 13-24.
[5] S. L. Ting, S. K. Kwok, Albert H. C. Tsang, W. B. Lee,
Critical Elements and Lessons Learnt from the
Implementation of an RFID-enabled Healthcare
Management System in a Medical
Organization,Journal of Medical Systems 35 (4)
(2011) 657-669.
[6] Y. Yen, N. Lo, T. Wu, Two RFID-based solutions for
secure inpatient medication administration, Journal
of Medical Systems 36(5) (2012)2769-2778.
[7] L. Batina, J. Guajardo, T. Kerins, N. Mentens, P. Tuyls,
and I. Verbauwhede, “Public-key cryptography for
rfid-tags,” in Pervasive Computing and
Communications Workshops, 2007. PerCom
Workshops’ 07. Fifth Annual IEEE International
Conference on. IEEE, 2007, pp. 217– 222.
[8] A. Juels, Yoking-proofs for RFID tags, in: First
International Workshop on Pervasive Computing
and Communication Security, 2004.
[9] K. Wong, P. Hui, A. Chan, Cryptography and
authentication on RFID ags for apparels, Computer
in Industry 57 (2005) 342–349.
[10] Y. Chen, J.-S. Chou, H.-M. Sun, A novel mutual
authentication scheme based on quadratic residues
for RFID systems, Computer Networks 52 (2008)
2373–2380.
[11] H.-Y. Chien, C.-H. Chen, Mutual authentication
protocol for RFID conforming to EPC Class 1
Generation 2 standards, Computer Standards and
Interfaces 29 (2007) 254–259.
[12] P. Peris-Lopez, J.C. Hernandez-Castro, J.M.
Estevez-Tapiador, A.Ribagorda, Cryptanalysis of a
novel authentication protocol conforming to epc-
c1g2 standard, Computer Standards and Interfaces
31 (2) (2009) 372–380.
[13] N. Lo, K. Yeh, An efficient mutual authentication
scheme for EPCglobal Class-1 Generation-2 RFID
systems, in: Intenational Conference on Embedded
and Ubiquitous Computing, 2007.
[14] T.-C. Yeh, Y.-J. Wang, T.-C. Kuo, S.-S. Wang,
Securing RFID systems conforming to EPC Class 1
Generation 2 standards, Expert Systems and
Applications 37 (2010) 7678–7683.
[15] J. Cho, S. Yeo, S. Kim, Securing against brute-force
attack: A hash-based RFID mutual authentication
protocol using a secret value, Computer
Communications 34(3) (2011) 391-397.
[16] M. Safkhani, P. Peris-Lopez, J.C. Hernandez-
Castro, N. Bagheri, M. Naderi, Cryptanalysis of Cho et
al.’s protocol, a hash-based mutual authentication
protocol for RFID systems, Cryptology ePrint
Archive, Report 2011/311, 2011.
[17] T. Cao, P. Shen, Cryptanalysis of some RFID
authentication protocols, Journal of Communications
3 (7) (2008) 20–27.
[18] T.-C. Yeh, C.-H. Wu, Y.-M. Tseng, Improvement of
the RFID authentication scheme based on quadratic
residues, Computer Communications (34) (2011)
337–341.
[19] R. Doss, S. Sundaresan, W. Zhou, A practical
quadratic residues based scheme for authentication
and privacy in mobile RFID systems, Ad Hoc
Networks 11(1) (2013) 383-396.
[20] Y. Lee, L. Batina, I. Verbauwhede, EC-RAC
(ECDLP based randomized access control): provably
secure RFID authentication protocol.In IEEE
International Conference on RFID 2008. IEEE, 97–
104,2008.
[21] J. Bringer, H. Chabanne, T. Icart, Cryptanalysis of
EC-RAC, a RFID identification protocol. In 7th
International Conference on Cryptology And
Network Security – CANS’08, Springer, New York
149–161, 2008.
[22] T. Deursen, S. Radomirovic, Attacks on RFID
protocols (version1.1). Technical Report, August
2009.
[23] Y. Lee, I. Batina, I. Verbauwhede, Untraceable
RFID authentication protocols: revision of EC-RAC.
In IEEE International Conference on RFID 2009.
IEEE: Orlando,FL,USA, 178–185, 2009.
[24] T. Deursen, S. Radomirovic, Untraceable RFID
protocols are not trivially composable: attacks on the
evision of EC-RAC. Technical Report, University of
uxembourg, July 2009.
[25] Y. Lee, L. Batina, I. Verbauwhede, Privacy
challenges in RFID systems. In The Internet of
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1195
Things, Giusto D, Lera A, Morabito G,Atzori L (eds):
Springer New York, 397–407, 2010.
[26] C. Lv, H. Li, J. Ma, Y. Zhang, Vulnerability analysis
of elliptic curve cryptography–based RFID
authentication protocols, Transactions on Emerging
Telecommunications Technologies 23(7) (2012)
618-624.
[27] Y. Liao, C. Hsiao, A secure ECC-based RFID
authentication scheme integrated with ID-verifier
transfer protocol, Ad Hoc Networks, 2013, doi:
10.1016/j.adhoc.2013.02.004.
[28] R. Peeters, J. Hermans, Attack on Liao and
Hsiao’s Secure ECC- based RFID Authentication
Scheme integrated with ID-Verifier Transfer
Protocol. Cryptology ePrint Archive, Report
2013/399, 2013.
[29] G. Godor, N. Giczi, S. Imre, Elliptic curve
cryptography based mutual authentication protocol
for low computational capacity RFID systems-
performance analysis by simulations. In: IEEE inter-
national conference on wireless communications,
networking and information security (WCNIS), IEEE,
pp 650–657, 2010.
[30] X. Cao, W. Kou, A Pairing-free Identity-based
Authenticated Key Agreement Protocol with Minimal
Message Exchanges, Information Sciences, 180 (15),
2895–2903, 2010.

More Related Content

PDF
A research survey rfid security & privacy issue
PDF
A sector analysis for rfid human implantation
PDF
Enhancement of security in rfid using rsa algorithm
PDF
A Security Framework in RFID
PPTX
Machine Readable Travel Documents (MRTD) - Biometric Passport
DOC
Classroom locking-system (1)
PDF
A Novel RFID Readers Employee Management System
PDF
Ijarcet vol-2-issue-3-867-869
A research survey rfid security & privacy issue
A sector analysis for rfid human implantation
Enhancement of security in rfid using rsa algorithm
A Security Framework in RFID
Machine Readable Travel Documents (MRTD) - Biometric Passport
Classroom locking-system (1)
A Novel RFID Readers Employee Management System
Ijarcet vol-2-issue-3-867-869

What's hot (18)

PDF
An Online secure ePassport Protocol
PDF
Radio Frequency Identification (RFID) Security issues and possible solutions
PDF
RFID Technology An Overview
PDF
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
PDF
The Design and Implementation of Intelligent Campus Security Tracking System
PDF
Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...
PDF
Study of Various Techniques to Filter Spam Emails
PDF
Radio Frequency Identification (RFID) Based Employee Management System (EMS)
PDF
IRJET- Configurable Intelligent Secures - 3FA Smart Lock
PPTX
Iot Security
PDF
Qualitative Assessment on Effectiveness of Security Approaches towards Safegu...
PDF
PDF
Security Issues and Challenges in Internet of Things – A Review
PPTX
5 Things You Should Know About Ethical Hacking
PDF
Authentication System Based on the Combination of Voice Biometrics and OTP Ge...
PDF
3.[13 21]framework of smart mobile rfid networks
PDF
IRJET - Analyzing Need of Secure Forensic Report System using Blockchain
PDF
Dual Authentication For Bluetooth Connection
An Online secure ePassport Protocol
Radio Frequency Identification (RFID) Security issues and possible solutions
RFID Technology An Overview
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
The Design and Implementation of Intelligent Campus Security Tracking System
Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...
Study of Various Techniques to Filter Spam Emails
Radio Frequency Identification (RFID) Based Employee Management System (EMS)
IRJET- Configurable Intelligent Secures - 3FA Smart Lock
Iot Security
Qualitative Assessment on Effectiveness of Security Approaches towards Safegu...
Security Issues and Challenges in Internet of Things – A Review
5 Things You Should Know About Ethical Hacking
Authentication System Based on the Combination of Voice Biometrics and OTP Ge...
3.[13 21]framework of smart mobile rfid networks
IRJET - Analyzing Need of Secure Forensic Report System using Blockchain
Dual Authentication For Bluetooth Connection
Ad

Similar to IRJET - Lightweight ECC based RFID Authentication Protocol (20)

PDF
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...
PDF
A Survey Of RFID Authentication Protocols Based On Hash-Chain Method
PDF
IRJET- Automated Face Detection and Recognition for Detecting Impersonation o...
PDF
IRJET- Automated Face Detection and Recognition for Detecting Impersonati...
PDF
A sector analysis for rfid human implantation
PDF
Secured authentication of radio-frequency identification system using PRESENT...
PDF
A novel integrated approach for handling anomalies in RFID data
PDF
A novel integrated approach for handling anomalies in RFID data
PDF
Demonetization in Indian Currency – Illegal Money - IoT: Effective Identifica...
PPTX
Questions in iot
PDF
Smart Security System Using R.F.I.D.
PDF
Analysis of VoIP Forensics with Digital Evidence Procedure
PDF
IoT Based Smart Attendance System Using RFID and Google Sheet
PDF
A RESEARCH SURVEY: RFID SECURITY & PRIVACY ISSUE
PPTX
RFID security ppt
PDF
Deep Learning and Big Data technologies for IoT Security
PDF
IRJET- Security Analysis and Improvements to IoT Communication Protocols ...
PDF
PRIVACY-PRESERVING MACHINE AUTHENTICATED KEY AGREEMENT FOR INTERNET OF THINGS
PDF
3.[13 21]framework of smart mobile rfid networks
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...
A Survey Of RFID Authentication Protocols Based On Hash-Chain Method
IRJET- Automated Face Detection and Recognition for Detecting Impersonation o...
IRJET- Automated Face Detection and Recognition for Detecting Impersonati...
A sector analysis for rfid human implantation
Secured authentication of radio-frequency identification system using PRESENT...
A novel integrated approach for handling anomalies in RFID data
A novel integrated approach for handling anomalies in RFID data
Demonetization in Indian Currency – Illegal Money - IoT: Effective Identifica...
Questions in iot
Smart Security System Using R.F.I.D.
Analysis of VoIP Forensics with Digital Evidence Procedure
IoT Based Smart Attendance System Using RFID and Google Sheet
A RESEARCH SURVEY: RFID SECURITY & PRIVACY ISSUE
RFID security ppt
Deep Learning and Big Data technologies for IoT Security
IRJET- Security Analysis and Improvements to IoT Communication Protocols ...
PRIVACY-PRESERVING MACHINE AUTHENTICATED KEY AGREEMENT FOR INTERNET OF THINGS
3.[13 21]framework of smart mobile rfid networks
Ad

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
PDF
Kiona – A Smart Society Automation Project
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
PDF
Breast Cancer Detection using Computer Vision
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Kiona – A Smart Society Automation Project
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
BRAIN TUMOUR DETECTION AND CLASSIFICATION
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Breast Cancer Detection using Computer Vision
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...

Recently uploaded (20)

PPTX
additive manufacturing of ss316l using mig welding
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PPT
Project quality management in manufacturing
PPTX
Construction Project Organization Group 2.pptx
PPTX
Internet of Things (IOT) - A guide to understanding
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PDF
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PDF
III.4.1.2_The_Space_Environment.p pdffdf
PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
PPT
Mechanical Engineering MATERIALS Selection
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PPTX
OOP with Java - Java Introduction (Basics)
PPTX
Fundamentals of safety and accident prevention -final (1).pptx
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
DOCX
573137875-Attendance-Management-System-original
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
additive manufacturing of ss316l using mig welding
Operating System & Kernel Study Guide-1 - converted.pdf
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
Project quality management in manufacturing
Construction Project Organization Group 2.pptx
Internet of Things (IOT) - A guide to understanding
CYBER-CRIMES AND SECURITY A guide to understanding
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
Foundation to blockchain - A guide to Blockchain Tech
III.4.1.2_The_Space_Environment.p pdffdf
Automation-in-Manufacturing-Chapter-Introduction.pdf
Mechanical Engineering MATERIALS Selection
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
OOP with Java - Java Introduction (Basics)
Fundamentals of safety and accident prevention -final (1).pptx
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
573137875-Attendance-Management-System-original
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx

IRJET - Lightweight ECC based RFID Authentication Protocol

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1189 Lightweight ECC based RFID Authentication Protocol Aditya M Pillai1, Amulya Bhardwaj2, Gopesh Mittal3, Prof. Sanjeev Kumar4 1Aditya M. Pillai, Dept. of Computer Science and Engineering, ABESIT, Ghaziabad, India. 2Amulya Bhardwaj, Dept. of Computer Science and Engineering, ABESIT, Ghaziabad, India. 3Gopesh Mittal, Dept. of Computer Science and Engineering, ABESIT, Ghaziabad, India. 4Professor Sanjeev Kumar, Dept. of Computer Science and Engineering, ABESIT, Ghaziabad, India. ----------------------------------------------------------------------***--------------------------------------------------------------------- ABSTRACT:- The RFID (radio frequency identification) technology is being extensively accepted and used as a governing recognizing technology in medical management domain like information corroboration, patient records, blood transmission, etc. With more rigid security concern to RFID based authentication protocols, ECC (elliptic curve cryptography) established Radio Frequency Identification verification protocols is being expected to fit the prerequisite of security and privacy. However, abounding new published ECC based RFID protocols have severe security vulnerability. In the following paper, we have reviewed few RFID verification and authentication protocols and has compared its strengths, fragility and proposed less complex and more efficient authentication protocol. Key words: Lightweight ECC, light weight elliptical curve cryptography, RFID, radio frequency identification, authentication protocol, automatic verification, standard encryption, decryption, random cyclic redundancy analysis, authentication code functions, hash functions, server-identification, tag-identification. 1. Introduction The RFID (radio frequency identification) technology allows the automated, noncontact and exclusive recognition of objects using radio waves and it is studied as the finest reinstatement of the existing barcode technologies. [1] RFID technology is being accepted in an extensive diversity of corporation and being progressively used in various fields, like manufacturing, management, supply chain, inventory management, e- passport processing, etc. [2]. Inclusion to various utilization in our day to day life, the RFID is already a big part of the health care field. For example, it is being used for location tracking of medical and health capitals, in-patient and out-patient identification and validation, health treatments progress tracking, locating patients and procedure administration at the wellbeing place, and surgical management [3–6]. The main peripheral of RFID systems are back-end servers, tags and readers. RFID tag is a recognition gear affixed to object that is to be recognized, which makes use of RF (radio frequency) to connect and establish identification of item being read. RFID reader is also a gear which can be used to observe the presence of RFID tags on any object nearby and collect the data being supplied by tag to reader. The reader identifies the tags by transmitting radio frequency signals, and tag acknowledge to the reader with a particular number or any other identifying data. The reader promote the RFID tag response data to the back-end of the RFID device i.e. servers. The server has several databases containing tags information and its related data and is capable of retrieving complete facts and information required related to the tag from the tag response/data being fed. The main assets of RFID devices are that, it gives automated and various identification seizure and system performance analysis. RFID readers can automatically scan numerous tags at the same time, also be used to track important items. However, RFID systems makes the security and privacy of the holder of the tag vulnerable, as the result of automated verification and identification .[7] In this paper, we are providing with a RFID protocol that is based on ECC(Elliptic Curve Cryptography). We implemented the protocol in telosb using TinyOS NesC. We also implemented another existing protocol and performed a comparison between our and the existing protocol and thus it can be clearly understood that our protocol provides faster communication. Fig.1: A typical RFID-based system
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1190 2. Problem Statement RFID tags are lightweight and resource constraint. These components have limited amount of battery power, memory. Security issue comes in case of communication with RFID tags. Different authentication protocols have been proposed to secure the data transmission. But due to privacy security issues, all standard encryption decryption algorithms authentication protocols cannot be used. We are proposing a verification and authentication scheme in this paper. Some of the major motivation and scopes are enlisted below: • Resource constraint components have limited amount of battery power, memory. • Secure data transmission between lightweight devices. 3.Existing RFID authentication protocols There are various numbers of research papers and groups that are being burdened by the security and privacy significance of the RFID (Radio Frequency Identification) systems and its various authentication and validation protocols for the same are being designed. In the following paper, we have covered the current works regarding RFID authentication protocols. The way RFID tags and scanner work, they can be categorised into three tags: passive, active and semi active tags. Passive are the one, being used in related protocols. Juels [8] created verification and authentication scheme with the help of message authentication functions and hash code functions to construct protocols for medical applications. Making improvements in his work, Wong al. [9] too used same functions to construct “hash-lock” protocol. sadly, Chen et. [10] discovered that Juel al.’s protocol was unable to provide RFID tag anonymity and can easily fall prey to rep0lay attack by the intruder. He also stated that [10] Wong al.’s protocol was unable to provide with location secrecy along with being prone to the impersonation and the replay attack.[11]. Further to enhance RFID security and performance issues, Chien used the random cyclic redundancy analysis to construct a mutual identification and authentication protocol. With time, Lopez al. [12] discovered that protocol being developed by Chien was unable to ensure forward privacy along with location secrecy. To resolve these issues, Lo al. [13] introduced a better protocol for authentication inspired from Chien’s proposal. Nonetheless, Yeh al. [14] stated that Loal.’s [13] proposal was still not able to provide location secrecy. A new authentication protocol was introduced by Yeh et al. [14] with improved privacy and security. However, Yeh et al.’s was not able to provide security from the server impersonation and the data integrity attacks from the intruder, because of the fact that data was being transferred to server in the plain text format. Cho et al. [15] made use of the similar message authentication code functions and hash functions to create a better and secure authentication protocol. However, Cho et al.’s scheme was very prone to the various attacks like resynchronization, the tag impersonation and the impersonating reader’s attack, which was shown by Safkhani et al. [16] in his proposal. New studies on, the public key cryptography like ECC is also used in the design of RFID identification and authentication protocols. Chen et al. in his paper was the first to propose the RFID identification and authentication protocol with the help of quadratic residues in his work. Later on, Cao and Shen [17] discovered that Chen’s proposal was very much prone to the tag impersonation attack and the replay attack. In order to resolve these security issues, Yeh and Wu [18] provided with enhanced RFID authentication protocol with the help of quadratic residues. Further, for making the system efficiency better, Doss al. [19] developed a new RFID identification and authentication protocol similarly with the quad residues. In comparison with the cryptography using quadric residues, the Elliptic curve cryptography (ECC) was able to provide the equivalent level of privacy and security with much smaller key size as compared to previous approaches. Thus, ECC-based RFID identification and authentication protocol is much more efficient. Lee et al. [20] created an ECC-RFID protocol for authentication and declared that their protocol is probably more secure and efficient. Nonetheless, Bringer [21] and Deursen [22] discovered that Lee’s protocol was prone to the various attacks like tracking attack and the replay attack. Now, for enhancing the privacy and security, Lee [23] created yet other RFID authentication scheme/protocol. Nonetheless, Deursen [24] showed that Lee’s protocol [20] was still defenceless to the tracking attack. Further, a new ECC-based RFID authentication protocol was developed by Lee [25] to conquer vulnerability in various previous protocols. Sadly, later on it was indicated by Lv et al. [26] that Lee’s 3 protocols are very much prone to the tracking attack. Newly introduced work by, Liao and Hsiao [27] gave an ECC-based RFID identification and authentication protocol unified with an ID-verifier transmission scheme and asserted that their protocol can be easily implemented to provide security from various threats. Nonetheless, further it was shown in Peeters and Hermans work [28], that Liao and Hsiao’s proposal was very much prone to the server impersonation attack.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1191 3.1 Liao and Hsiao Authentication Protocol Fig. 2: Liao and hsiao’s protocol. The writer gave their authentication rules on the basis of public key cryptanalysis but did considered the fact 1) tag-attestation is established on the transmitted privacy ZT, and 2) Identification of the server is established on the transmitted secret data xT. For tag-identification the public data of the tag is masked using an unauthenticated Diffie-Helmann compliance scheme to solve TKT1 = TKS1 and an implicit authenticated variant to compute TKT2= TKS2. For RFID server verification of the value of R1 and R2 is crossed with the tag’s private key xT. 3.2 Debiao He’s Authentication Protocol Fig. 3: Debiao He’s Protocol 3.3 Issues in existing protocols Tag-authentication and secrecy depend on the lack of the attacker knowledge to know the tag’s public component ZT . Nonetheless, it freely can get the information about the tag, without physical attack, Directly by transmitting R2 = −PS. It referes to fact that the tag will convey to tag, AuthT = ZT − r1PS + r1 PS = ZT. The executive ability is to withdraw this unique identifier which enables no secrecy properties can be obtained. Here, the elemental attack prones can easily be reduced by tag analyzing that R2 = −PS . Yet, the intrusion can freely be continued by approximating R2= −PS +αP along α ∈R ZN. The result from the tag will be AuthT = ZT+ r1 (−P S+ αP) + r1 PS = ZT + α r1 P. The mugger thus now easily recovers ZT = AuthT − αR1. Shared secret when used in RFID helps in achieving Server-attestation. Yet, Liao and Hsiao explained in their proposal server spoofing attack as an intrusion where the intruder is able to imitate a server to a tag whose safety is being compromised (i.e. access to the tag’s secret data). Thus, the intruder gains knowledge about xT - tag and transmits xT(R1 + R2 ), strongly verifying as the genuine server. Here, it can be noted that there is no requirement of any data even r2 for this intrusion. For mutual verification theorem of RFID system it can be contend that it is not that important concern for the private RFID verification scheme. Yet, if additional information is to be send by tag or sever, for instance, RFID readings, authentications are vital. Thus both tag and server-attestation is not obtained, thus further it fails to obtain mutual authentication. Therefore, the proposed scheme by Liao and Hsiao is very much prone mainly from existing homomorphic schemes consisting the input-output data which can be easily attacked. Thus resulting into less secure and private functions is obtained by this protocol. 4. Proposed Protocol  F(q): field size is given by q and F(q) defines the finite field.  a,b: two parameters of an elliptic curve E.  y2 =x3 +ax+b represents the elliptic curve E, over the limited field F(q).  P: generator point.  y: Server’s private key.  x: private key for the Tag  R1 , R4: message from server to tag.  C1 , R2 :message from tag to server.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1192 Fig. 3: Proposed Protocol. Information regarding the private and public keys of server and tag are stored in server, whereas, but no access of server’s private key is given to the tag. R’ and R1 values are calculated by server. R1 is sent to the tag. When received, R1 is where tag performs an operation which results in C1, R’’ is calculated and R2, updates C1, C1 and R2 are sent to the server. The server performs operation on C1 and R’ result matching is done with the former. If matching fails, communication is stopped, else on R2 an operation is performed by server which results in R4 which in turn is sent to the tag. The tag, when received, checks are done for if values are matched with R’’. If matching is successful then only communication is further continued, which means both sides have been successfully authenticated, else no communication will take place. 5. Analysis of Security 5.1 Theorem 1: Mutual Authentication No generation of legal message R1 is carried without the information of r1 and y where r1 is the randomized number that is generated by the server and y being the private key of the server. Only server knows both these values and they are not passed during the communication, this maintains the secrecy of the two values, and hence is only stored in server. No generation of legal message R2 can happen without the information of r2 and x, r 2 being a random generated number by tag and x being the tag’s private key. Thus, Mutual Authentication between the tag and the server could be ingrained by the proposed scheme. 5.2 Theorem 2: Anonymity Tag x has a secret key which is known by the tag and server both. In any step, given value never be passed in any occurring step of the process and hence cannot be fetched in any way. Therefore, private key can never be fetched: x for the tag and our proposed protocol can exhibit anonymity. 5.3 Theorem 3: Availability By the representation of our proposed protocol, it is clear that no synchronous update of the private key is required in protocol execution. Therefore execution of the proposed protocol can be completed among the server and the tag. Therefore, availability is provided by our proposed protocol. 5.4 Theorem 4: Forward Security Suppose in any case secret key of tag, x, can be fetched. However, it cannot be determined if the messages R1 and R2 are being transmitted between the tag and the server since he has no idea about r1 and r2 for them being random numbers. So, tag cannot be traced and hence forward security could be exhibited by proposed protocol. 5.5 Theorem 5: Replay Attack Inferring that the data R1 is being intercepted and replayed to tag. However, R4 cannot be generated upon receiving the message C1 and R since r2 being the new randomized number is being produced by tag and tag’s private data x is not known. Thus, the tag is unable to find the attacker by checking the R4 correctness measure. Similarly, we can show how the server could find the replay attack by checking the R3 correctness measure. Therefore, replay attack can be held back by our proposed protocol. 5.6 Theorem 6: Impersonation Attack The legal message C1, R1 has to be generated by the attacker, to imitate the tag to the server. Though, the adversary cannot generate C1 and R1 because he does not know r2 and x. Thus, the proposed protocol can combat the impersonation attack. 5.7 Theorem 7: Server Spoofing Attack To imitate the server to the tag, the adversary can generate a random number r1, compute R’ but he cannot generate R2 as they does not know the server’s secret key y, neither they know the tag’s secret key x. Hence, the attacker cannot imitate the server to the tag and the illustrated scheme can combat server spoofing attack.
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1193 5.8 Theorem 8: DoS Attack In the given scheme, the tag’s secret key x needs no concurrently update after the scheme is executed as the tag’s secret key is well secured. Thus, the proposed scheme can combat DoS attack. 5.9 Theorem 9: Location Tracking Attack Assume that the tag’s secret key x can be hacked by the attacker and seize the messages. To get the server’s secret key y and two random values r 1 and r2, the attacker does not have the capabilities to obtain that secret key, hence it cannot confirm that either those messages are communicated between the server and the tag. Thus, the illustrated scheme can overcome the location tracking attack. 5.10 Theorem 10: Cloning Attack In the illustrated scheme, we know that each tag consists of their own private data x. Suppose this private data/key of various number tags can be hacked by the attacker. Since, there is no correlation among tag’s secret key, so that he cannot get the private data of another tag. Therefore, the proposed protocol can combat cloning attack. 6. Performance Analysis The computational cost, the communicational cost and the memory requirement of the proposed scheme is being analysed in this module. The Liao and Hsiao’s scheme [26] is also compared here. We imagine that an elliptic curve with length of 160bits are used in associated schemes, In order to get the same security level. Then the length of an elliptic curve point is 320 bits. The running time of an elliptic curve scale multiplication operation on a 5-MHz tag and a PIV 3 GHZ server is 0.064s and 0.83ms separately [29, 30]. The mandatory running time for the server and the tag when they execute the verification scheme shows the estimation costs. The most complicated operation in both of the proposed scheme and Liao et al.’s scheme is elliptic curve scale multiplication. Here, the estimation cost of those operations could be ignored because we have to compare the number of such operations. Let TEM represents the running time of an elliptic curve scale multiplication operation. We confirm that the recommended authentication scheme provides a 40 % reduction of the estimation cost compared with Liao and Hsiao’s scheme because the computational comparisons between the proposed scheme and Liao et al.’s scheme are listed in Table 1. Table 1- Computational Cost Comparisons. The cost gives the wide-range of the communicational messages which communicate among the tags and the servers when they execute the verification scheme. The server in the suggested plan sends the message m1 ={R1} and m3 ={R4} to the tag. Then the server’s circulation cost is 320+320=640 bits. The tag in the proposed scheme sends the message m 2 = {R2, C1} to the server. Then the communicational cost of the tag’s is 320+320=640 bits. Below here the proposed scheme and Liao et al.’s scheme as listed in Table 2 shows the communicational comparison. Table-2: Communicational Cost Comparisons. When the authentication scheme is performed the memory requirement represents the required memory space of the data in the tag side and the server side. To store system parameters params={q,a,b,P,n}, the tag in the proposed scheme is used. To store system parameters params={q,a,b,P,n}, its private key y and its public key R’, the server in the illustrated scheme is used . The ID-verifier R’’ for each tag is also stored. Then the storage requirement of the tag is 160+160+160+320+160+160+320+320 w =(1,440+320 w) bits, where w denotes the number of tags in the system. The proposed scheme and Liao’s scheme are listed in Table 3 represents the storage requirements comparison. Table-3: Storage Cost Comparisons
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1194 7. Conclusion In our proposed scheme, we have provided with a ECC- based RFID authentication and identification protocol. The proposed protocol can withstand multiple security threats and attacks with much greater efficiency. The results from this analysis can be further used to make sure, the proposed protocol is able to provide robust security and privacy properties and it is able to withstand numerous attacks while it can also overcome various drawbacks seen in previously proposed protocols. 8. References [1] Juels, RFID security and privacy: a research survey, IEEE Journal on Selected Areas in Communication 24 (2006) 381-394. [2] T. Phillips, T. Karygiannis, R. Kuhn, Security standards for the RFID market, IEEE Security & Privacy 3 (6) (2005) 85-89. [3] C.M. Robert, Radio frequency identification, Computers and Security 25 (2006) 18-26. [4] P. Peris-Lopez, A. Orfila, A. Mitrokots, J. van der Lubbe, A comprehensive RFID solution to enhance inpatient medication safety,International Journal of Medical Informatics 80 (2011) 13-24. [5] S. L. Ting, S. K. Kwok, Albert H. C. Tsang, W. B. Lee, Critical Elements and Lessons Learnt from the Implementation of an RFID-enabled Healthcare Management System in a Medical Organization,Journal of Medical Systems 35 (4) (2011) 657-669. [6] Y. Yen, N. Lo, T. Wu, Two RFID-based solutions for secure inpatient medication administration, Journal of Medical Systems 36(5) (2012)2769-2778. [7] L. Batina, J. Guajardo, T. Kerins, N. Mentens, P. Tuyls, and I. Verbauwhede, “Public-key cryptography for rfid-tags,” in Pervasive Computing and Communications Workshops, 2007. PerCom Workshops’ 07. Fifth Annual IEEE International Conference on. IEEE, 2007, pp. 217– 222. [8] A. Juels, Yoking-proofs for RFID tags, in: First International Workshop on Pervasive Computing and Communication Security, 2004. [9] K. Wong, P. Hui, A. Chan, Cryptography and authentication on RFID ags for apparels, Computer in Industry 57 (2005) 342–349. [10] Y. Chen, J.-S. Chou, H.-M. Sun, A novel mutual authentication scheme based on quadratic residues for RFID systems, Computer Networks 52 (2008) 2373–2380. [11] H.-Y. Chien, C.-H. Chen, Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards, Computer Standards and Interfaces 29 (2007) 254–259. [12] P. Peris-Lopez, J.C. Hernandez-Castro, J.M. Estevez-Tapiador, A.Ribagorda, Cryptanalysis of a novel authentication protocol conforming to epc- c1g2 standard, Computer Standards and Interfaces 31 (2) (2009) 372–380. [13] N. Lo, K. Yeh, An efficient mutual authentication scheme for EPCglobal Class-1 Generation-2 RFID systems, in: Intenational Conference on Embedded and Ubiquitous Computing, 2007. [14] T.-C. Yeh, Y.-J. Wang, T.-C. Kuo, S.-S. Wang, Securing RFID systems conforming to EPC Class 1 Generation 2 standards, Expert Systems and Applications 37 (2010) 7678–7683. [15] J. Cho, S. Yeo, S. Kim, Securing against brute-force attack: A hash-based RFID mutual authentication protocol using a secret value, Computer Communications 34(3) (2011) 391-397. [16] M. Safkhani, P. Peris-Lopez, J.C. Hernandez- Castro, N. Bagheri, M. Naderi, Cryptanalysis of Cho et al.’s protocol, a hash-based mutual authentication protocol for RFID systems, Cryptology ePrint Archive, Report 2011/311, 2011. [17] T. Cao, P. Shen, Cryptanalysis of some RFID authentication protocols, Journal of Communications 3 (7) (2008) 20–27. [18] T.-C. Yeh, C.-H. Wu, Y.-M. Tseng, Improvement of the RFID authentication scheme based on quadratic residues, Computer Communications (34) (2011) 337–341. [19] R. Doss, S. Sundaresan, W. Zhou, A practical quadratic residues based scheme for authentication and privacy in mobile RFID systems, Ad Hoc Networks 11(1) (2013) 383-396. [20] Y. Lee, L. Batina, I. Verbauwhede, EC-RAC (ECDLP based randomized access control): provably secure RFID authentication protocol.In IEEE International Conference on RFID 2008. IEEE, 97– 104,2008. [21] J. Bringer, H. Chabanne, T. Icart, Cryptanalysis of EC-RAC, a RFID identification protocol. In 7th International Conference on Cryptology And Network Security – CANS’08, Springer, New York 149–161, 2008. [22] T. Deursen, S. Radomirovic, Attacks on RFID protocols (version1.1). Technical Report, August 2009. [23] Y. Lee, I. Batina, I. Verbauwhede, Untraceable RFID authentication protocols: revision of EC-RAC. In IEEE International Conference on RFID 2009. IEEE: Orlando,FL,USA, 178–185, 2009. [24] T. Deursen, S. Radomirovic, Untraceable RFID protocols are not trivially composable: attacks on the evision of EC-RAC. Technical Report, University of uxembourg, July 2009. [25] Y. Lee, L. Batina, I. Verbauwhede, Privacy challenges in RFID systems. In The Internet of
  • 7. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1195 Things, Giusto D, Lera A, Morabito G,Atzori L (eds): Springer New York, 397–407, 2010. [26] C. Lv, H. Li, J. Ma, Y. Zhang, Vulnerability analysis of elliptic curve cryptography–based RFID authentication protocols, Transactions on Emerging Telecommunications Technologies 23(7) (2012) 618-624. [27] Y. Liao, C. Hsiao, A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol, Ad Hoc Networks, 2013, doi: 10.1016/j.adhoc.2013.02.004. [28] R. Peeters, J. Hermans, Attack on Liao and Hsiao’s Secure ECC- based RFID Authentication Scheme integrated with ID-Verifier Transfer Protocol. Cryptology ePrint Archive, Report 2013/399, 2013. [29] G. Godor, N. Giczi, S. Imre, Elliptic curve cryptography based mutual authentication protocol for low computational capacity RFID systems- performance analysis by simulations. In: IEEE inter- national conference on wireless communications, networking and information security (WCNIS), IEEE, pp 650–657, 2010. [30] X. Cao, W. Kou, A Pairing-free Identity-based Authenticated Key Agreement Protocol with Minimal Message Exchanges, Information Sciences, 180 (15), 2895–2903, 2010.