TY - JOUR
T1 - A Highly Efficient ECC-Based Authentication Protocol for RFID
AU - Lamrani Alaoui, Hasnae
AU - El Ghazi, Abdellatif
AU - Zbakh, Mostapha
AU - Touhafi, Abdellah
AU - Braeken, An
PY - 2021
Y1 - 2021
N2 - The availability of safety has always been a challenge in all fields of computing and networking, and the development of reliable security measures for low operating power systems has been a continuous task for researchers. This paper focuses on Radio Frequency Identification (RFID) systems, whose market is tremendously growing due to the increasing need for efficient supply chain and healthcare management. Two protocols are proposed that offer mutual authentication, confidentiality, forward security, anonymity, unlinkability, scalability, and resistance against the most important security attacks. They differ in storage requirements at the server side. Both proposed protocols are very efficient as the number of required elliptic curve multiplications is limited to two at the tag side. Moreover, the schemes are also more effective and secure than other related work presented in literature. In addition, we show how to extend the protocols in order to provide authentication with respect to multiple readers.
AB - The availability of safety has always been a challenge in all fields of computing and networking, and the development of reliable security measures for low operating power systems has been a continuous task for researchers. This paper focuses on Radio Frequency Identification (RFID) systems, whose market is tremendously growing due to the increasing need for efficient supply chain and healthcare management. Two protocols are proposed that offer mutual authentication, confidentiality, forward security, anonymity, unlinkability, scalability, and resistance against the most important security attacks. They differ in storage requirements at the server side. Both proposed protocols are very efficient as the number of required elliptic curve multiplications is limited to two at the tag side. Moreover, the schemes are also more effective and secure than other related work presented in literature. In addition, we show how to extend the protocols in order to provide authentication with respect to multiple readers.
UR - http://www.scopus.com/inward/record.url?scp=85110142553&partnerID=8YFLogxK
U2 - 10.1155/2021/8876766
DO - 10.1155/2021/8876766
M3 - Article
VL - 2021
JO - Journal of Sensors
JF - Journal of Sensors
SN - 1687-725X
M1 - 8876766
ER -