Identyfikatory
Warianty tytułu
Języki publikacji
Abstrakty
The Internet of Things (IoT) has now permeated every aspect of modern life, requiring that all things be connected to one another and to the Internet using proper protocols. IoT, being an essential component of today's smart society is experiencing enormous problems from various security and interoperability attacks. Traditional encryption is unsuitable for low-cost IoTs because they are vulnerable to physical attacks. This paper proposes Lightweight mutual Authentication Protocol for IoT devices based on hash function using Elliptical Curve approach in which mutual authentication between RFID Tag and Reader is established through several rounds of communication. We also compare the proposed approach of authentication at both ends (Tag and Reader) in terms of efficiency and security.
Słowa kluczowe
Rocznik
Tom
Strony
785--790
Opis fizyczny
Bibliogr. 25 poz., rys., tab.
Twórcy
Bibliografia
- [1] M. Shukla, J. Lin, and O. Seneviratne, “BlockIoT: Blockchain-based Health Data Integration using IoT Devices,” in AMIA Annu Symp Proc.2021, 2021, pp. 1119-1128. Accessed: Jan. 30, 2023. [Online]. Available: https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8861710/
- [2] M. M. Modiri, J. Mohajeri, and M. Salmasizadeh, “GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication,” The ISC International Journal of Information Security, vol. 12, no. 2, pp. 101-111, Jul. 2020, http://doi.org/10.22042/ISECURE.2020.213482.507
- [3] M. El-hajj, H. Mousawi, and A. Fadlallah, “Analysis of Lightweight Cryptographic Algorithms on IoT Hardware Platform,” Future Internet 2023, Vol. 15, Page 54, vol. 15, no. 2, p. 54, Jan. 2023, http://doi.org/10.3390/FI15020054
- [4] X. Yao, Z. Chen, and Y. Tian, “A lightweight attribute-based encryption scheme for the Internet of Things,” Future Generation Computer Systems, vol. 49, pp. 104-112, Aug. 2015, http://doi.org/10.1016/J.FUTURE.2014.10.010
- [5] Y. Yang, X. Zheng, and C. Tang, “Lightweight distributed secure data management system for health internet of things,” Journal of Network and Computer Applications, vol. 89, pp. 26-37, Jul. 2017, http://doi.org/10.1016/J.JNCA.2016.11.017
- [6] S. Singh, P. K. Sharma, S. Y. Moon, and J. H. Park, “Advanced lightweight encryption lgorithms for IoT devices: survey, challenges and solutions,” J Ambient Intell Humaniz Comput, pp. 1-18, May 2017, http://doi.org/10.1007/S12652-017-0494-4/METRICS
- [7] S. Al Salami, J. Baek, K. Salah, and E. Damiani, “Lightweight encryption for smart home,” Proceedings - 2016 11th International Conference on Availability, Reliability and Security, ARES 2016, pp. 382-388, Dec. 2016, http://doi.org/10.1109/ARES.2016.40
- [8] A. Biryukov and L. Perrin, “State of the Art in Lightweight Symmetric Cryptography,” ArXiv, 2017.
- [9] V. Verma and D. Gupta, “An efficient signcryption algorithm using bilinear mapping,” in Proceedings of the 10th INDIACom; 2016 3rd International Conference on Computing for Sustainable Global Development, INDIACom 2016, 2016.
- [10] P. Mishra, Renuka, and V. Verma, “Identity Based Broadcast Encryption Scheme with Shorter Decryption Keys for Open Networks,” Wirel Pers Commun, vol. 115, no. 2, 2020, http://doi.org/10.1007/s11277-020-07606-6
- [11] X. Jia, Q. Feng, T. Fan, and Q. Lei, “RFID technology and its applications in Internet of Things (IoT),” in 2012 2nd International Conference on Consumer Electronics, Communications and Networks, CECNet 2012 - Proceedings, 2012, pp. 1282-1285. http://doi.org/10.1109/CECNet.2012.6201508
- [12] V. Chegeni, H. Haj Seyyed Javadi, M. Reza, M. Goudarzi, and A. Rezakhani, “Providing a Hybrid Cryptography Algorithm for Lightweight Authentication Protocol in RFID with Urban Traffic Usage Case,” vol. 13, no. 1, pp. 73-85, 2021, http://doi.org/10.22042/isecure.2020
- [13] L. M. Shamala, G. Zayaraz, K. Vivekanandan, and V. Vijayalakshmi, “Lightweight Cryptography Algorithms for Internet of Things enabled Networks: An Overview,” J Phys Conf Ser, vol. 1717, no. 1, p. 012072, Jan. 2021, http://doi.org/10.1088/1742-6596/1717/1/012072
- [14] J. ; Yang, J. Park, H. Lee, K. Ren, and K. Kim, “Mutual authentication protocol for low-cost RFID.,” in In Proceedings of the Workshop on RFID and Lightweight Cryptography, Graz, Austria, Jul. 2005, pp. 17-24.
- [15] C. C. Tan, B. Sheng, and Q. Li, “Secure and Serverless RFID Authentication and Search Protocols,” IEEE Trans Wirel Commun, vol. 7, no. 4, pp. 1400-1407, Apr. 2008, http://doi.org/10.1109/TWC.2008.061012
- [16] S. Cai, Y. Li, T. Li, and R. H. Deng, “Attacks and Improvements to an RIFD Mutual Authentication Protocol and Its Extensions,” in Proceedings of the Second ACM Conference on Wireless Network Security, in WiSec’09. New York, NY, USA: Association for Computing Machinery, 2009, pp. 51-58. http://doi.org/10.1145/1514274.1514282
- [17] J. S. Cho, Y. S. Jeong, and S. O. Park, “Consideration on the brute-force attack cost and retrieval cost: A hash-based radio-frequency identification (RFID) tag mutual authentication protocol,” Computers & Mathematics with Applications, vol. 69, no. 1, pp. 58-65, Jan. 2015, http://doi.org/10.1016/J.CAMWA.2012.02.025
- [18] P. Gope and T. Hwang, “A Realistic Lightweight Anonymous Authentication Protocol for Securing Real-Time Application Data Access in Wireless Sensor Networks,” IEEE Transactions on Industrial Electronics, vol. 63, no. 11, pp. 7124-7132, 2016, http://doi.org/10.1109/TIE.2016.2585081
- [19] K. Mansoor, A. Ghani, S. A. Chaudhry, S. Shamshirband, S. A. Khan Ghayyur, and A. Mosavi, “Securing IoT-Based RFID Systems: A Robust Authentication Protocol Using Symmetric Cryptography”, http://doi.org/10.3390/s19214752
- [20] H. Shen, J. Shen, M. K. Khan, and J. H. Lee, “Efficient RFID Authentication Using Elliptic Curve Cryptography for the Internet of Things,” Wirel Pers Commun, vol. 96, no. 4, pp. 5253-5266, Oct. 2017, http://doi.org/10.1007/S11277-016-3739-1/METRICS
- [21] Z. Zhang and Q. Qi, “An efficient RFID authentication protocol to enhance patient medication safety using elliptic curve cryptography,” J Med Syst, vol. 38, no. 5, pp. 1-7, Apr. 2014, http://doi.org/10.1007/S10916-014-0047-8/METRICS
- [22] M. S. Farash, O. Nawaz, K. Mahmood, S. A. Chaudhry, and M. K. Khan, “A Provably Secure RFID Authentication Protocol Based on Elliptic Curve for Healthcare Environments,” J Med Syst, vol. 40, no. 7, p. 165, 2016, http://doi.org/10.1007/s10916-016-0521-6
- [23] V. Kumar, R. Kumar, A. A. Khan, V. Kumar, Y. C. Chen, and C. C. Chang, “RAFI: Robust Authentication Framework for IoT-Based RFID Infrastructure,” Sensors, vol. 22, no. 9, May 2022, http://doi.org/10.3390/s22093110
- [24] M. Safkhani, P. Peris-Lopez, J. Cesar Hernandez-Castro, N. Bagheri, and M. Naderi, “Cryptanalysis of Cho et al.’s Protocol, A Hash-Based Mutual Authentication Protocol for RFID Systems,” IACR Cryptology ePrint Archive, vol. 2011, no. 2011, pp. 1-7, 2011, Accessed: Apr. 27, 2022. [Online]. Available: https://eprint.iacr.org/2011/331.pdf
- [25] B. Liu and X. Su, “An Anti-Collision Algorithm for RFID Based on an Array and Encoding Scheme,” Information, vol. 9, no. 3, 2018, http://doi.org/10.3390/info9030063
Uwagi
Opracowanie rekordu ze środków MNiSW, umowa nr POPUL/SP/0154/2024/02 w ramach programu "Społeczna odpowiedzialność nauki II" - moduł: Popularyzacja nauki (2025).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-8999cf9c-1273-4e42-9b39-4467aad654cf
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.