Survey: Vulnerability Analysis of Low-Cost ECC-Based RFID Protocols against Wireless and Side-Channel Attacks
Abstract
:1. Introduction
2. RFID Technology
2.1. Working Principle
- The RFID reader is responsible for identifying the tag. It consists of a transmitter, a receiver, a microprocessor, and an antenna that sends an electromagnetic wave carrying a signal towards the element to be identified. In return, it receives the signals containing the information from the tags. The reader can be fixed or mobile, and its antenna can take several forms [35].
- The RFID tag, associated with the identified element, includes an electronic chip with a memory containing a unique EPC (electronic product code) identifier. Besides, to communicate to the reader in a given frequency band [35], the chip connects to an antenna.
2.2. RFID Tag Types
- Actives tags: the actives tags are used when reading ranges are greater than 10 m, and they can achieve ranges in the order of 50 to 100 m. The active term comes from the fact that the tags embed a battery to power both its logic electronics and its transmitter. Therefore, this implementation enables the tags to respond in different frequencies in the transmitting and receiving channel; consequently, it is possible for the active tags to communicate full duplex.The presence of a battery makes data writing possible, with a memory of up to 10 Kbits. They are given blank and can be several times written, deleted, modified, and read. The frequencies used by active tags are in the 433 MHz band, as well as in the 2.45 GHz and 5.8 GHz bands. Among the disadvantages of active tags, the very high cost reduces their use in different applications [35].
- Semi-actives tags: similar to active tags, semi-active tags also contain an energy source, but they do not use their battery to emit signals. They act as passive tags at the communication level. However, their battery allows them to record data during the transport of merchandise (temperature change, etc.).The cost of this type of tag is, therefore, lower than active tags. Generally, this type of tag has a simple design; however, they have several disadvantages:
- ✓
- Reliability: it is impossible to know if their batteries are still operational.
- ✓
- Cost: the connection of their batteries with their circuits increases the cost compared to a passive tag.
- ✓
- Environmental impact: their battery contains highly polluting substances [36].
- Passives tags: passive tags, unlike active tags, work thanks to the energy provided by the reader. They integrate a dipole antenna that allows it to receive electromagnetic radiation from the reader. This radiation gives the passive tags enough power to authenticate themselves to the reader by transmitting their unique identification code. These passive tags are programmed with unmodifiable data for a capacity of 32 to 128 bits. They provide much lower unit costs than other technologies.In most cases, they are provided blank to the user, who will write the identification information and place them on the object that needs to be traced. This information can be read during the subsequent life of the tag but cannot be modified or completed. Passive tags are cheap and have an unlimited lifetime.
2.3. Operating Frequency Bands
2.4. Communication Initiation
2.5. Application Domains
3. Security Attacks of RFID Protocols
3.1. Network Attacks
3.1.1. Impersonation Attacks
- Eavesdropping attack: the attacker is placed between the tag and the reader and listens to conversations to obtain important identification data. In this type of attack, the attacker is considered an unauthorized RFID reader [45].
- Replay attack: this attack is based on the principle of eavesdropping. After listening to the message, the attacker records a part of the conservation and replays it after a certain delay to the receiving device in order to steal information or gain access [46].
- Relay attack: the attacker is placed between the tag and the reader to relay word for word the message sent. The principle of this attack is that the two legitimate entities believe they are communicating directly with each other and do not realize that an illegitimate system is relaying between them.
- Man in the middle attack (MITMA): the attacker is placed between the tag and the reader to listen to the communication. Then he intercepts and manipulates the information. The attacker modifies the original signal and sends his incorrect signal while pretending to be a normal component in the RFID system.
- Cloning attack: this type of attack aims to imitate the identity of the tags. Indeed, the attacker borrows the identity of a reader, sends a request to the tag, then obtains the response from it. When the legitimate reader interrogates the tag, the attacker sends the response to the reader and identifies himself as the legitimate tag.
- Server spoofing attack: for this type of attack, the attacker presents himself as an authorized user of the system. The attacker impersonates a reader, sends a request to a tag, and then gets the response from the tag. When the legitimate reader queries the tag, the attacker sends the response to the reader to identify himself as the legitimate tag.
3.1.2. Tracking Attacks
3.1.3. DoS Attacks
- Kill command attack: it is a command used to disable the tag. The attacker issues more commands to permanently disable the tag [48].
- Jamming: since RFID tags listen to each radio signal within their range, an attacker can send electromagnetic signals in the form of noises to disrupt communication and prevent the tags from communicating with the reader [49].
- Tag data modification: DoS can cause the tag modification attack by allowing the attacker to modify the EPC (electronic product code) data on RFID tags to a random number that is not recognized by the reader [48].
- De-synchronization attack: this attack prevents the updating of secret quantities transmitted between the tag and the reader. A desynchronization attack is performed when the opponent can destroy the synchronous state between the tag and the server by blocking message updates which makes the values stored in the tag and the server different [49]. Indeed, a DoS attack could lead to a desynchronization attack.
3.2. Vulnerability Analysis to Network Attacks
3.3. Security Requirements of RFID Systems
- Mutual authentication: during reader-tag communication, the attacker may react as a legitimate reader to obtain unauthorized information from the tag. Mutual authentication is the solution to this problem. Indeed, in addition to the authentication of the tag, the RFID system must also ensure the authentication of the reader. As a result, the reader and the tag authenticate each other.
- Confidentiality: to ensure data confidentiality, the identity of the tag must be secured and known only by the tag itself. Indeed, if an attacker obtains the tag’s identifier, he can easily trace its location and know its behavior. Confidentiality ensures that secret information cannot be obtained by an unauthorized user.
- Anonymity: the responses of tags should be randomized, so that it is infeasible to extract any information in communications between a tag and a reader.
- Availability: the variables communicated between the tag and the reader must be updated after each successful session. To ensure availability, the system must be successfully executed.
- Forward security: implies that the data transmitted from the tag must be independent and not linked to any other authentication session. This means that even if an attacker gets the current data from a tag, the past data remains secure and hidden, and the history of the tag’s movements remains known only by the tag.
- Integrity: this is translated into the fact that no private information is sent in clear text from the tag to guarantee the integrity of the messages transmitted between the reader and the tags. Data integrity is achieved by cryptographic systems based on elliptic curves.
3.4. Side-Channel Analysis Attacks
3.4.1. Timing Attack
3.4.2. Power Attacks
- Simple Power Analysis (SPA): a SPA attack is based on the observation of the current consumption produced (or the electromagnetic radiation emitted) during a single execution of the targeted algorithm. This observation allows the attacker to deduce the information about the private by analyzing the consumption of extracted trace [61]. When calculating scalar multiplication, if the addition and doubling formulas are different, the attacker can easily differentiate them on a consumption trace. For example, when performing scalar multiplication with the double-and-add algorithm, we can find the private key bits used by distinguishing the power consumed by the doubling operation from the one consumed by the addition operation. The timing analysis attack against the double-and-add algorithm allows only to find the Hamming weight of the private key, while a SPA attack enables the retrieval of all the bits of the scalar. In addition, the calculation period of the doubling operation is half of the addition period. By analyzing a single trace of a scalar multiplication execution, the attacker can easily distinguish each operation used and determine the secret key’s value.
- Differential Power Analysis (DPA): the implementation of a DPA attack requires the collection of several consumption traces of a scalar multiplication operation using the same secret key. These types of SCA attacks use statistical analysis on a large number of samples to reduce noise by performing average calculations. For this reason, they are sometimes named statistical attacks [62]. The DPA attack requires knowledge of the computational algorithm used and a large amount of data to understand the relationship between the energy consumption of this processed data and the private key. During the scalar multiplication operation, the attacker needs a large number of power consumption traces for different points using the same private key . By performing a statistical analysis of the processed data used and the corresponding consumption traces collected, the attacker can succeed to recover a part or the whole private key used [63]. The general principle of DPA is as follows [64]:
- -
- First, the attacker must choose a manageable part of the key, and then he conducts statistical analysis for any value that can take that manageable part.
- -
- For each encryption operation, the instantaneous consumption of the device is recorded.
In fact, we can divide the implementation of this attack into two main phases: data acquisition and data exploitation.- Data acquisition: during this phase, the processed data must be recorded many times. These data can be either cipher-texts or plain-texts. For example, if you want to extract consumption traces, then, cipher-texts or plain-texts are registered. In addition, the power consumption of the device during the encryption operations must be saved. Consequently, we could obtain a set of pairs , where the pairs and are, respectively, the number of plain-text or cipher-text and the number of recorded traces of each operation.
- Data exploitation: the application of the attack requires the choice of a selection function and the sub-block of the attacked circuit. The result of this selection function must depend on known data and the secret key. Once this selection function has been chosen, it is necessary to divide the curves into two subsets and . This distribution function is generally the Hamming weight of the output of the selection function or the value of one of its bits. For each possible value of the key at the input of the selection function, the set of traces in input is separated according to the distribution function. For each of these distributions, the bias of the differential analysis is determined as the difference of the averages of the current curves over the two subsets. The key is determined by the assumption that generated the bias curve with the highest peaks. If none of the curves is different from the others, the attack has failed; this may be due to the insufficient number of traces [65].
- Correlation Power Analysis (CPA): the CPA attack is an improvement of the DPA attack previously explained. The statistical tool used in this attack is the Pearson correlation coefficient. This Pearson coefficient is used to determine the compatibility between two elements. The operating principle of this attack is based on the dependency between the current consumption of the circuit and the Hamming distance of the manipulated data. The CPA attack is based on the assumption that data leakage through an auxiliary channel depends on the number of bit variations from one state to another at a given time [66]. When applying the algorithm that produces the predictable result , the attacker calculates the Hamming distance between and the various mi messages. Subsequently, the Pearson Correlation coefficient is calculated between the hamming distance matrix and the consumption trace matrix . According to this model, the Pearson coefficient for the calculation of the correlation between and is given by the following formula:
3.5. Vulnerability Analysis to Hardware Attacks
- -
- Know either the inputs or the outputs.
- -
- Execute a certain cryptographic algorithm that uses a certain unknown secret key.
- -
- Use the same secret key for each execution.
- -
- Know a cryptographic device model to estimate certain intermediate values that are related to the secret key.
- -
- Estimate a part of the secret key.
4. Elliptic Curve Cryptography
4.1. Introduction
- If char then is a large prime number, and the equation of the curve is given in [69] by:
- If char , then , is a prime number, and the equationof the curve, presented in [69], is given by:
- If char , then and the curve equation, given in [69], becomes:
4.2. Group Lows
- We have for any point ∈ .
- The opposite of point is the point of coordinates , with .
- If and are not opposed, then with:
4.3. Scalar Multiplication
4.4. Elliptic Curve Suitable for Low-Cost Applications
4.4.1. Choice of Finite Field
4.4.2. Elliptic Curve Forms
- Elliptic curve forms over the prime field
- Montgomery curves: the first type of elliptic curves defined on prime field () is the Montgomery model [75]. This model of curves is defined by the following equation [75]:
- Edwards curves: The Edwards model presents an alternative form of elliptic curves, which admits a complete and uniform group law [76]. Either d or c are two elements of , with not squared, the Edwards curves are defined by the following equation [76]:The Edwards and Montgomery curves have the advantage of being bi-rational to a Weierstrass curve; this property is important in cryptographic applications, such as IoT [77]. For example, the calculation of the point exponentiation operation in an Edwards curve is 1.5 times more efficient than that performed in a Weierstrass curve [78].
- Twisted Edwards curves: twisted Edwards curves are defined as a generalization of the Edwards curves. By incorporating a new parameter , the equation of this curve looks as follows [76]:
- Hessian curves: Marc Joye et al. presented, in their paper [80], the Hessian curves defined by the following equation [80]:
- Huff curves: Huff’s curves were proposed by Huff et al. in 1948 [81] and were later revisited by Joye et al. in 2010 [82] to have as final equation:
- Elliptic curve forms over the binary fieldThe majority of alternative models of elliptic curves in binary fields are an adaptation of pre-existing prime field models.
- Binary Edwards curves: the Edwards binary curves present an adaptation of the Edwards curves defined on the prime field. They are proposed by Bernstein et al. [84] by the equation:
- Binary Huff curves: in the same paper [82], Joye et al. also defined the equation of binary version of Huff’s curves by:However, the opposite case is not always possible, in fact, not all binary curves can be expressed as a Huff curve.Binary Hessian curves: in binary fields , the Hessian curves are defined by their generalized equation presented in [80] by:
4.4.3. Point Representation System
5. Lightweight ECC Implementations
6. Analysis of Proposed ECC-Based RFID Protocols
6.1. Liao et al. Protocol
6.1.1. Setup Phase
6.1.2. Authentication Phase
- Step1: the server randomly chooses a number and calculates . Then, it sends the value of to the tag.
- Step2: when is received, the tag, in turn, chooses a random number and calculates . The tag also calculates two temporary secret keys and . To encrypt the value of , the tag then calculates the quantity and sends and to the server.
- Step3: the server calculates its temporary keys and . It uses these two keys to extract the value of by the following equation:Then, the reader searches for the value of the tag identifier in its database. If found, the reader confirms the validity of the tag and obtains the corresponding private key . Then, the server calculates and transmits to be authenticated by the tag.
- Step4: finally, the tag calculates the quantity and checks if the value is equal to the received value. If the two quantities are equal, the tag confirms that the server is authentic. As we can see, the Liao et al. protocol ensures mutual authentication between the server and the tag.
6.2. Zhao et al. Protocol
6.2.1. Setup Phase
6.2.2. Authentication Phase
- Step1: the server chooses a random number , calculates , and sends the message to the tag.
- Step2: after receiving , the tag also chooses a random number and calculates . Then, it calculates its two temporary keys and and . The tag then sends the message to the server.
- Step3: after receiving and , the server calculates the two keys and and checks if . Then, the server checks if the calculated is in its database. If it was the case, the server obtains the value of , calculates the quantity and send the message to the tag. Else, the server stops the process.
- Step4: when receiving the message, the tag checks if the value of . If they are equal, the server is authentic; otherwise, the protocol stops.
6.3. Alamr et al. Protocol
6.3.1. Setup Phase
6.3.2. Authentication Phase
- Step1: the reader generates a random number and calculates . Then, it sends the value of to the tag.
- Step2: after receiving the tag chooses a random number and calculates . Then the tag calculates its two secret keys; and . Lastly, to encrypt its two secret keys, the tag calculates and sends the message to the reader.
- Step3: the reader, after receiving and , calculates its two temporary keys; and . Then, it calculates and compares it with the value of . If they are equal, the reader authenticates the tag, and then it calculates . After that, the reader generates a number and calculates and it sends and to the tag.
- Step4: during this step, the tag calculates and compares it with the value of . If they are equal, the tag authenticates the reader.
- Step5: at the end of this phase, the two entities fix the key agreement transmitted between them. The key agreement of the tag and this of the reader key .
6.4. Naeem et al. Protocol
6.4.1. Setup Phase
6.4.2. Authentication Phase
- Step1: the reader generates a random number to calculate the point . Then, it sends the value of to the tag.
- Step2: the tag in its turn produces a random number and calculates . Then it calculates and . Then the tag sends the message to the reader.
- Step3: using the two quantities and , the reader calculates and and it checks the value of in its database. If the value of calculated is equal to the one stored, the reader authenticates the tag and then calculates and . At the end of this step, the reader sends to the tag and calculates its key agreement .
- Step4: when it receives , the tag calculates . If the value of is equal to , the tag authenticates the reader. Consequently, if the authentication is successful, the tag calculates its key agreement .
6.5. Dinarvand et al. Protocol
6.5.1. Setup Phase
6.5.2. Authentication Phase
- Step1: the server selects a random number , calculates , and sends to the tag.
- Step2: the tag chooses a number to calculate and sends the message to the server.
- Step3: as soon as it receives the server searches this value in its database. If it finds it, the server takes the corresponding secret key and the point from its database and calculates: , , and , and sends the message to the tag. Otherwise, if the value of is not in the database of the server, the corresponding tag is assumed invalid.
- Step4: after receiving , the tag calculates , , then it checks the equation:If they are equal, the tag authenticates the server. Then, it calculates and sends it to the server.
- Step5: during this phase, the server checks if the received value is equal to . If they are equal, the server authenticates the tag. Otherwise, the process stops.
6.5.3. Updating Phase
- For the tag, the update of and is done as follows:
- And for the server, the update of and is as follows:If is received:
- If is received:
6.6. Benssalah et al. Protocol
6.6.1. Authentication Phase
- Step1: the server chooses a random number and sends it directly to the tag.
- Step2: the tag chooses a random number , then it calculates , , and and it sends, afterwards, , , and the to the server.
- Step3: once it receives , , and , the server uses its secret key to compute and . Then, based on the pseudonym sent by the tag, the server looks for the value in its database to authenticate the tag. After that, the server computes and transmits it to the tag.
- Step4: the tag calculates , then it compares it to the received value. If the two values are equal, the tag authenticates the server and updates the value of , otherwise, the authentication process is stopped.
6.6.2. Updating Phase
- For the tag:
- For the server:If is received:
- If is received:
6.7. Zheng et al. Protocol
6.7.1. Setup Phase
6.7.2. Authentication Phase
- Step1: the server randomly chooses a number and calculates . It sends to the tag.
- Step2: the tag selects a random number and calculates , , and , then it sends the message to the server.
- Step3: the server calculates and searches for the tag based on the value of stored in its database. The server then checks if . If they are equal, the tag authentication is successfully performed; otherwise, the process stops.
- Step4: the server generates the value and sends it to the tag.
- Step5: the tag checks if . If they are equal, the server authentication is performed; otherwise, the authentication does not pass.
6.8. Yang et al. Protocol
6.8.1. Setup Phase
6.8.2. Authentication Phase
- Step1: the server, first, obtains a current temporary variable and the identity of the tag that it wants to interrogate. Then, it calculates , and ). The server then transmits the message to the tag.
- Step2: when it receives , the tag first checks the freshness of the time variable . If is over the set expiration time, the tag does not consider this message. Otherwise, the tag test if its identity checks the equation . If the identity checks the value of , the authentication process continues.
- Step3: the tag calculates and tests if this value verifies the equation . If it’s, the server is authenticated by the tag. Otherwise, the tag treats the message as a modified message and deletes it.
- Step4: the tag then obtains the current time variable and calculates , , and ). Then, it sends the message to the server.
- Step5: as soon as the server receives the message , it first checks the freshness of . Then it determines if the public key corresponding to the identity checks the equation . If this assumption is verified, the equation is maintained. So, the tag is successfully authenticated by the server.
6.9. Alaoui et al. Protocol
6.9.1. Setup Phase
6.9.2. Authentication Phase
- Step1: the server chooses a random number and computes = ( The server then transmits to the tag.
- Step2: the tag also chooses a random number to compute the point ).G. Then, in order to compute , the tag derives the quantity . Next, the tag computes and transmits the message {, , } to the reader.
- Step3: using its private key and the random generated number , the reader calculates the quantity to find the tag secret key and searches it in its data base. If the reader cannot find any correspondence to this key in its database, the protocol stops. Otherwise, it recovers the identity of the tag related to this key and the second secret key and computes . If the calculated value matches the received value, the reader authorizes the request and sends to the tag.
- Step4: in the last step, the tag compares the stored value with the value received from the reader. If the two values are similar, the authentication is successfully approved, otherwise the tag quits the process.
6.10. Izza et al. Protocol
6.10.1. Initialization Phase
6.10.2. Authentication Phase
- Step1: the server generates a random number to calculate and sends it to the tag .
- Step2: when the tag receives , it first chooses a random number and calculates and . Then, the tag initializes the value and calculate , where represents the current timestamp. At the end of this step, the tag transmits the messages {, , } to the reader.
- Step3: after receiving the messages, the reader first checks the time spent. If the spent time is less than , the reader does not stop the session. Subsequently, using its private key, the reader extracts the tag’s pseudo identifier and search for it in its database. If the reader finds the identity of the tag in its database, the tag is successfully authenticated. Next, it calculates .Then, the reader communicates with the medical server (MS). it calculates the message and initializes and , where is a random number selected by the MS and also inserted in the reader and tag memories during the initialization phase. The message {, , } is sent to the MS, where corresponds to the new timestamp.
- Step4: after authenticating the reader, the MS generates a random number and calculate and . Then, it replies to the reader with the messages: (the MS’s new timestamp), , and . The reader receives the messages, checks the time interval, and authenticates the MS.
- Step5: by using the previous initialization of the pseudo identifier , the reader computes the message and the message Next, the reader sends the quantities {, , , } to the tag and updates its pseudo-identifiers and those of the tag. Finally, the reader generates its own shared session key
- Step6: The tag further verifies the time interval and authenticates the reader. Finally, the tag generates an ephemeral session key .
6.10.3. Data Transmission Phase
- Step1: the tag generates a message and encrypts it using the shared key . Then, the tag sends the message {, }.
- Step2: the reader finds mi with using its own session key. Subsequently, using the elliptic curve digital signature with message recovery (ECDSMR) mechanism, the reader shares the same message with the MS.
7. Comparative Study of ECC-Based Authentication Protocols: Implementation Cost and Vulnerability
7.1. Implementation Cost
7.2. Security Analysis
7.2.1. Security against Wireless Attacks
- ✓
- All random numbers used are refreshed at each session.
- ✓
- The private key of the tag is kept secret and known only by the tag itself.
- ✓
- The private key of the reader is kept secret and known only by the reader itself.
- ✓
- If an attacker chooses a random number , he can present himself as a legitimate reader and send to the tag.
- ✓
- When the tag receives the value of , it calculates , and and sends the values and to the attacker.
- ✓
- This way, the attacker calculates since both quantities and have been publicly sent.
7.2.2. Security against Side-Channel Attacks
7.2.3. Security Requirements
8. Conclusions and Perspectives
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Rouchdi, Y.; El Yassini, K.; Oufaska, K. Resolving Security and Privacy Issues in Radio Frequency Identification Middleware. Int. J. Innov. Sci. Eng. Technol. 2018, 5, 97–104. [Google Scholar]
- Alizadeh, M.; Zamani, M.; Rafiei Shahemabadi, A.; Shayan, J.; Azarnik, A. A Survey on Attacks in RFID Networks. Open Int. J. Inform. 2012, 1, 15–24. [Google Scholar]
- Murugan, K.; Suresh, P. Performance Analysis of RSA and Elliptic Curve Cryptography. Int. J. Netw. Secur. 2018, 20, 15. [Google Scholar]
- Lara-Nino, C.A.; Diaz-Perez, A.; Morales-Sandoval, M. Elliptic Curve Lightweight Cryptography: A Survey. IEEE Access 2018, 6, 72514–72550. [Google Scholar] [CrossRef]
- Ibrahim, A.; Dalkılıc, G. Review of different classes of RFID authentication protocols. Wirel. Netw. 2019, 25, 961–974. [Google Scholar] [CrossRef]
- Tseng, Y.M. Efficient authenticated key agreement protocols resistant to a denial-of-service attack. Int. J. Netw. Manag. 2005, 15, 193–202. [Google Scholar] [CrossRef]
- Wang, X.; Gao, Y. A switch-modulated method for chaos digital secure communication based on user-defined protocol. Commun. Nonlinear Sci. Numer. Simul. 2010, 15, 99–104. [Google Scholar] [CrossRef]
- Wang, X.; Zhang, D.; Guo, X. Authentication and recovery of images using standard deviation. J. Electron. Imaging 2013, 22, 033012. [Google Scholar] [CrossRef]
- Niu, Y.; Wang, X. An anonymous key agreement protocol based on chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 2011, 16, 1986–1992. [Google Scholar] [CrossRef]
- Tseng, H.R.; Jan, R.H.; Wuu, Y. A chaotic maps-based key agreement protocol that preserves user anonymity. In Proceedings of the 2009 IEEE International Conference on Communications, Dresden, Germany, 14–18 June 2009. [Google Scholar]
- Gong, P.; Li, P.; Shi, W. A secure chaotic maps-based key agreement protocol without using smart cards. Nonlinear Dyn. 2012, 70, 2401–2406. [Google Scholar] [CrossRef]
- Wang, X.Y.; Luan, D.P. A secure key agreement protocol based on chaotic maps. Chin. Phys. B 2013, 22, 110503. [Google Scholar] [CrossRef]
- Wang, X.; Zhao, J. An improved key agreement protocol based on chaos. Commun. Nonlinear Sci. Numer. Simul. 2010, 15, 4052–4057. [Google Scholar] [CrossRef]
- Tuyls, P.; Batina, L. RFID-Tags for Anti-Counterfeiting. In Lecture Notes in Computer Science, Proceedings of the Cryptographers’ Track at the RSA Conference 2006, San Jose, CA, USA, 13–17 February 2005; Springer: Berlin/Heidelberg, Germany, 2006. [Google Scholar]
- Schnorr, C.P. Efficient identification and signatures for Smart cards. In Proceedings of the Theory and Application of Cryptology, Santa Barbara, CA, USA, 20–24 August 1989; Springer: New York, NY, USA, 2001; pp. 239–252. [Google Scholar]
- Lee, Y.K. EC-RAC (ECDLP Based Randomized Access Control): Provably Secure RFID authentication protocol. In Proceedings of the 2008 IEEE International Conference on RFID, Las Vegas, NV, USA, 16–17 April 2008; pp. 97–104. [Google Scholar]
- Bringer, J.; Chabanne, H.; Icart, T. Cryptanalysis of EC-RAC, a RFID identification protocol. In Lecture Notes in Computer Science, Proceedings of the 7th International Conference, CANS 2008, Hong Kong, China, 2–4 December 2008; Springer: Berlin/Heidelberg, Germany, 2008. [Google Scholar]
- Van Deursen, T.; Radomirović, S. Attacks on RFID Protocols. Cryptol. ePrint Arch. 2009, 2008, 1–56. [Google Scholar]
- Batina, L.; Guajardo, J.; Kerins, T.; Mentens, N.; Tuyls, P.; Verbauwhede, I. Public-Key Cryptography for RFID-Tags. In Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW’07), White Plains, NY, USA, 19–23 March 2007. [Google Scholar]
- Okamoto, T. Provably secure and practical identification schemes and corresponding signature schemes. In Lecture Notes in Computer Science, Proceedings of the 12th Annual International Cryptology Conference, Santa Barbara, CA, USA, 16–20 August 1992; Springer: Berlin/Heidelberg, Germany, 2001; pp. 31–53. [Google Scholar]
- Akishita, T. Fast Simultaneous Scalar Multiplication on Elliptic Curve with Montgomery Form. In Lecture Notes in Computer Science, Proceedings of the 8th Annual International Workshop, SAC 2001, Toronto, ON, Canada, 16–17 August 2001; Springer: Berlin/Heidelberg, Germany, 2001. [Google Scholar]
- Bernstein, D.J. Differential Addition Chains. 2006. Available online: http://cr.yp.to/ecdh/diffchain-20060219.pdf (accessed on 10 August 2021).
- Kawahara, T. Low-voltage embedded RAMs in the nanometer era. In Proceedings of the 2005 International Conference on Integrated Circuit Design and Technology, Austin, TX, USA, 9–11 May 2005. [Google Scholar]
- Liao, Y.P.; Hsiao, C.M. A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol. Ad Hoc Netw. 2014, 18, 133–146. [Google Scholar] [CrossRef]
- Batina, L.; Mentens, N.; Sakiyama, K.; Preneel, B.; Verbauwhede, I. Low-cost Elliptic Curve Cryptography for wireless sensor networks. In Lecture Notes in Computer Science, Proceedings of the Third European Workshop, ESAS 2006, Hamburg, Germany, 20–21 September 2006; Springer: Berlin/Heidelberg, Germany, 2006. [Google Scholar]
- Wenger, E.; Hutter, M. A hardware processor supporting elliptic curve cryptography for less than 9 kGEs. In Lecture Notes in Computer Science, Proceedings of the 10th IFIP WG 8.8/11.2 International Conference, CARDIS 2011, Leuven, Belgium, 14–16 September 2011; Springer: Berlin/Heidelberg, Germany, 2011. [Google Scholar]
- Wenger, E. Hardware Architectures for MSP430-Based Wireless Sensor Nodes Performing Elliptic Curve Cryptography. In Lecture Notes in Computer Science, Proceedings of the 11th International Conference, ACNS 2013, Banff, AB, Canada, 25–28 June 2013; Springer: Berlin/Heidelberg, Germany, 2013. [Google Scholar]
- Ahamed, S.I.; Rahman, F.; Hoque, M.E. ERAP: ECC based RFID authentication protocol. In Proceedings of the 2008 12th IEEE International Workshop on Future Trends of Distributed Computing Systems, Kunming, China, 21–23 October 2008. [Google Scholar]
- Plos, T.; Hutter, M.; Feldhofer, M. Evaluation of Side-Channel Preprocessing Techniques on Cryptographic-Enabled HF and UHF RFID-Tag Prototypes. Workshop on RFID Security. 2008, pp. 114–117. Available online: https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.601.6061&rep=rep1&type=pdf (accessed on 8 August 2021).
- Oren, Y. Remote Power Analysis of RFID Tags. IACR Cryptol. ePrint Arch. 2007, 2007, 330. [Google Scholar]
- Hutter, M.; Mangard, S.; Feldhofer, M. Power and em attacks on passive 13.56 MHz RFID devices. In Lecture Notes in Computer Science, Proceedings of the 9th International Workshop, Vienna, Austria, 10–13 September 2007; Springer: Berlin/Heidelberg, Germany, 2007. [Google Scholar]
- Carluccio, D.; Lemke, K.; Paar, C. Electromagnetic Side Channel Analysis of a Contactless Smart Card: First Results. In Proceedings of the ECrypt Workshop on RFID and Lightweight Crypto, Graz, Austria, 14–15 July 2005. [Google Scholar]
- Kasper, T.; Oswald, D.; Paar, C. Side-channel analysis of cryptographic RFIDs with analog demodulation. In Lecture Notes in Computer Science, Proceedings of the 7th International Workshop, RFIDSec 2011, Amherst, MA, USA, 26–28 June 2011; Springer: Berlin/Heidelberg, Germany, 2011. [Google Scholar]
- Taoufik, S. Fiabilité et Analyse de Défaillance des Tags RFID UHF Passifs Sous Contraintes Environnementales Sévères. Ph.D. Thesis, Normandie Université, Caen, France, 2018. Available online: https://tel.archives-ouvertes.fr/tel-01852572 (accessed on 8 August 2021).
- Finkenzeller, K. RFID Handbook: Fundamentals and Applications in Contactless Smart Cards, Radio Frequency Identification and Near-Field Communication; John Wiley & Sons: Hoboken, NJ, USA, 2010. [Google Scholar]
- Preradovic, S.; Karmakar, N.C. Transponders—A review. In Proceedings of the International Conference on Electrical and Computer Engineering, Dhaka, Bangladesh, 19–21 December 2006. [Google Scholar]
- Abdelnour, A. Development of UHF RFID Tags for Traceability and Quality Control of Food Products, Application: Cheese Production. Ph.D. Thesis, Université Grenoble Alpes, Saint-Martin-d’Hères, France, 2018. Available online: https://tel.archives-ouvertes.fr/tel-02092431 (accessed on 8 August 2021).
- Dobkin, D.M. A Comparison of TTF and RTF UHF RFID Protocols; Chalmers Tekniska Hogskola: Göteborg, Sweden, 2020. [Google Scholar]
- Zhao, Y.; Ni, L.M. VIRE: Virtual reference elimination for active RFID-based localization. Ad-Hoc Sens. Wirel. Netw. 2013, 17, 169–191. [Google Scholar]
- Floerkemeier, C.; Lampe, M. RFID middleware design: Addressing application requirements and RFID constraints. In Proceedings of the 2005 Joint Conference on Smart Objects and Ambient Intelligence: Innovative Context-Aware Services: Usages and Technologies, Grenoble, France, 12–14 October 2005. [Google Scholar]
- Huang, Y.; Lui, Z.; Ling, G. An improved Bayesian-based RFID indoor location algorithm. In Proceedings of the 2008 International Conference on Computer Science and Software Engineering, Washington, DC, USA, 12–14 December 2008; Volume 3. [Google Scholar]
- Yue, D.; Wu, X.; Bai, J. RFID application framework for pharmaceutical supply chain. In Proceedings of the 2008 IEEE International Conference on Service Operations and Logistics, and Informatics, Beijing, China, 12–15 October 2008; Volume 1. [Google Scholar]
- Krahnstoever, N.; Rittscher, J.; Tu, P.; Chean, K.; Tomlinson, T. Activity recognition using visual tracking and RFID. In Proceedings of the 2005 Seventh IEEE Workshops on Applications of Computer Vision (WACV/MOTION’05), Breckenridge, CO, USA, 5–7 January 2005; Volume 1. [Google Scholar]
- Kumari, L.; Narsaiah, K.; Grewal, M.K.; Anurag, R.K. Application of RFID in agri-food sector. Trends Food Sci. Technol. 2015, 43, 144–161. [Google Scholar] [CrossRef]
- Monali, S.; Patel, P.A.J. A Novel Approach for Authentication of RFID Devices. IJSRSET 2018, 4, 1095–1098. [Google Scholar]
- Ankele, R.; Plos, T.; Ankele, R. Fault Attacks on an RFID Prototype Chip. In Institute for Applied Information Processing and Communications; Graz University of Technology: Graz, Austria, 2012. [Google Scholar]
- Khattab, A.; Jeddi, Z.; Amini, E.; Bayoumi, M. RFID security threats and basic solutions. In RFID Security; Springer: Cham, Switzerland, 2017; pp. 147–162. [Google Scholar]
- Tagra, D.; Rahman, M.; Sampalli, S. Technique for preventing DoS attacks on RFID systems. In Proceedings of the 18th International Conference on Software, Telecommunications and Computer Networks, Split/Dubrovnik, Croatia, 23–25 September 2010. [Google Scholar]
- Mitrokotsa, A.; Beye, M.; Peris-lopez, P. Classification of RFID Threats Based on Security Principles. 2009. Available online: https://www.semanticscholar.org (accessed on 8 August 2021).
- Shah, S.; Singh, B. RFID based school bus tracking and security system. In Proceedings of the 2016 International Conference on Communication and Signal Processing (ICCSP), Melmaruvathur, India, 6–8 April 2016. [Google Scholar]
- Fernández-Caramés, T.M.; Fraga-Lamas, P.; Suárez-Albela, M.; Castedo, L. Reverse engineering and security evaluation of commercial tags for RFID-based IoT applications. Sensors 2017, 17, 28. [Google Scholar] [CrossRef] [Green Version]
- Baashirah, R.; Abuzneid, A. Survey on Prominent RFID Authentication Protocols for Passive Tags. Sensors 2018, 18, 3584. [Google Scholar] [CrossRef] [Green Version]
- Paise, R.I.; Vaudenay, S. Mutual authentication in RFID: Security and privacy. In Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, Tokyo, Japan, 18–20 March 2008. [Google Scholar]
- Batina, L.; Guajardo, J.; Preneel, B.; Tuyls, P.; Verbauwhede, I. Public key cryptography and RFID tags. In Proceedings of the Cryptographers’ Track at the RSA Conference, San Fancisco, CA, USA, 5–9 February 2007; Springer: Berlin/Heidelberg, Germany, 2007. [Google Scholar]
- Piramuthu, S.; Doss, R. On sensor-based solutions for simultaneous presence of multiple RFID tags. Decis. Support Syst. 2017, 95, 102–109. [Google Scholar] [CrossRef]
- Jiang, Q.; Ma, J.; Li, G.; Yang, L. An enhanced authentication scheme with privacy preservation for roaming service in global mobility networks. Wirel. Pers. Commun. 2013, 68, 1477–1491. [Google Scholar] [CrossRef]
- Majumder, B.; Guha, S.; Ghosh, S. Available Online at www.jgrcs.info—On automorphism of labeled simple connected graph from prescribed degrees. J. Glob. Res. Comput. Sci. 2011, 2, 113–115. [Google Scholar]
- Ryu, E.K.; Kim, D.S.; Yoo, K.Y. On elliptic curve based untraceable RFID authentication protocols. In Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, Portland, OR, USA, 17–19 June 2015. [Google Scholar]
- Kocher, P.C. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems In Proceedings of the Annual International Cryptology Conference, Santa Barbara, CA, USA, 18–22 August 1996.
- Ghosh, S.; Alam, M.; Chowdhury, D.R.; SenGupta, I. A GF(p) elliptic curve group operator resistant against side channel attacks. In Proceedings of the 18th ACM Great Lakes Symposium on VLSI, Orlando, FL, USA, 4–6 May 2008. [Google Scholar]
- Pontie, S.; Pontie, S.; Pontié, S. Sécurisation Matérielle Pour la Cryptographie à Base de Courbes Elliptiques. Ph.D. Thesis, Université Grenoble Alpes, Saint-Martin-d’Hères, France, 2016. Available online: https://hal.archives-ouvertes.fr/tel-01581829/ (accessed on 8 August 2021).
- Diop, I. Méthodologie et Outils Pour la Mise en Pratique des Attaques par Collision et Attaques Horizontales sur L’exponentiation Modulaire. Ph.D. Thesis, Université de Lyon, Lyon, France, 2017. [Google Scholar]
- Bensikaddour, E. Développement d’un Crypto-Système Basé sur le Standard AES et la Théorie du Chaos Pour le Chiffrement des Images Satellitaires à Bord d’un Satellite D’observation de la Terre. Ph.D. Thesis, Djillali Liabes University of Sidi bel Abbes Faculty of Electrical Engineering, Sidi Bel-Abbes, Algeria, 2019. [Google Scholar]
- Abdelaziz, M.; Aabid, E.L. Attaques par Canaux Cachés: Expérimentations Avancées sur les Attaques Template. Ph.D. Thesis, Université Paris VIII, Saint-Denis, France, 2011. [Google Scholar]
- Torres, L. Conception Sécurisée Contre les Attaques par Fautes et par Canaux Cachés. Ph.D. Thesis, Institut National Polytechnique de Grenoble, Grenoble, France, 2009. [Google Scholar]
- Lucas, A. Support Logiciel Robuste aux Attaques Passives et Actives Pour l’Arithmétique de la Cryptographie Asymétrique sur des (très) Petits Cœurs de Calcul. Ph.D. Thesis, Université Rennes 1, Rennes, France, 2019. [Google Scholar]
- Brier, E.; Clavier, C.; Olivier, F. Correlation power analysis with a leakage model. In Proceedings of the International Workshop on Cryptographic Hardware and Embedded Systems, Cambridge, MA, USA, 11–13 August 2004. [Google Scholar]
- Loiseau, A.; Loiseau, A.; Elliptiques, C. Implémentation Légère et Sécurisée Pour la Cryptographie sur Courbes Elliptiques pour l’ Internet des Objets. Ph.D. Thesis, Ecole des Mines of Saint-Etienne, Saint-Étienne, France, 2020. [Google Scholar]
- Méloni, N. Arithmétique pour la Cryptographie basée sur les Courbes Elliptiques. Ph.D. Thesis, Université Montpellier II, Montpellier, France, 2007. [Google Scholar]
- Ballet, S.; Bonecaze, A. Courbes Elliptiques Application à la Cryptographie. Available online: https://alexis-bonnecaze.pedaweb.univ-amu.fr (accessed on 8 August 2021).
- Le Gluher, A.U.D.E.; Renault, E.P.G. Problème du Logarithme Discret Appliqué à la Cryptanalyse sur Courbes Elliptiques: Algorithme Mov. 2015. Available online: http://perso.eleves.ens-rennes.fr (accessed on 8 August 2021).
- Said, M.; Albahri, S. Efficient Elliptic Curve Cryptography Software Implementation on Embedded Platforms. Ph.D. Thesis, University of Sheffield, Sheffield, UK, 2019. [Google Scholar]
- Fournier, J.J.; Loiseau, A.; Fournier, J. Binary Edwards Curves for Intrinsically Secure ECC Implementations for the IoT. In Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, 26–28 July 2018. [Google Scholar]
- Chen, L.; Moody, D.; Regenscheid, A.; Randall, K. Recommendations for Discrete Logarithm-Based Cryptography: Elliptic Curve Domain Parameters; No. NIST Special Publication (SP) 800-186 (Draft); National Institute of Standards and Technology: Gaithersburg, MD, USA, 2019. [Google Scholar]
- Montgomery, P.L. Speeding the Pollard and Elliptic Curve Methods of Factorization. Math. Comput. 1987, 48, 243–264. [Google Scholar] [CrossRef]
- Edwards, H.M. A normal form for elliptic curves. Bull. Am. Math. Soc. 2007, 44, 393–422. [Google Scholar] [CrossRef] [Green Version]
- Rezaeian Farashahi, R.; Hosseini, M. Isomorphism classes of Doche-Icart-Kohel curves over finite fields. Finite Fields Their Appl. 2016, 39, 111–129. [Google Scholar] [CrossRef] [Green Version]
- El Housni, Y. Edwards Curves. 2018. Available online: https://hal.archives-ouvertes.fr/hal-01942759 (accessed on 10 August 2021).
- Bernstein, D.J.; Birkner, P.; Joye, M.; Lange, T.; Peters, C. Twisted Edwards curves. In Proceedings of the International Conference on Cryptology in Africa, Casablanca, Morocco, 11–14 June 2008; Springer: Berlin/Heidelberg, Germany, 2008. [Google Scholar]
- Farashahi, R.R.; Joye, M. Efficient arithmetic on Hessian curves. In Proceedings of the International Workshop on Public Key Cryptography, Paris, France, 26–28 May 2010; Springer: Berlin/Heidelberg, Germany, 2010; pp. 243–260. [Google Scholar]
- Huff, G.B. Diophantine problems in geometry and elliptic ternary forms. Duke Math. J. 1948, 15, 443–453. [Google Scholar] [CrossRef]
- Orhon, N.G.; Hisil, H. Speeding up Huff form of elliptic curves. Des. Codes Cryptogr. 2011, 86, 2807–2823. [Google Scholar] [CrossRef]
- Lara-Nino, C.A.; Diaz-Perez, A.; Morales-Sandoval, M. Lightweight elliptic curve cryptography accelerator for internet of things applications. Ad Hoc Netw. 2020, 103, 102159. [Google Scholar] [CrossRef]
- Bernstein, D.J.; Lange, T.; Rezaeian Farashahi, R. Binary edwards curves. In Proceedings of the International Workshop on Cryptographic Hardware and Embedded Systems, Washington, DC, USA, 10–13 August 2008. [Google Scholar]
- Devigne, J.; Joye, M. Binary huff curves. In Proceedings of the Cryptographers’ Track at the RSA Conference, San Francisco, CA, USA, 1–5 March 2010. [Google Scholar]
- Koziel, B.; Azarderakhsh, R.; Mozaffari-Kermani, M. Low-resource and fast binary edwards curves cryptography. In Proceedings of the International Conference on Cryptology, Jaipur, India, 3–7 October 2015. [Google Scholar]
- Verri Lucca, A.; Mariano Sborz, G.A.; Leithardt, V.R.Q.; Beko, M.; Albenes Zeferino, C.; Parreira, W.D. A Review of Techniques for Implementing Elliptic Curve Point Multiplication on Hardware. J. Sens. Actuator Netw. 2020, 10, 3. [Google Scholar] [CrossRef]
- Imran, M.; Rashid, M.; Raza Jafri, A.; Najam-Ul-Islam, M. ACryp-Proc: Flexible Asymmetric Crypto Processor for Point Multiplication. IEEE Access 2018, 6, 22778–22793. [Google Scholar] [CrossRef]
- Hossain, M.S.; Saeedi, E.; Kong, Y. Parallel point-multiplication architecture using combined group operations for high-speed cryptographic applications. PLoS ONE 2017, 12, e0176214. [Google Scholar] [CrossRef]
- Azarderakhsh, R.; Reyhani-Masoleh, A. Parallel and high-speed computations of elliptic curve cryptography using hybrid-double multipliers. IEEE Trans. Parallel Distrib. Syst. 2015, 26, 1668–1677. [Google Scholar] [CrossRef]
- Liu, Z.; Liu, D.; Zou, X. An Efficient and Flexible Hardware Implementation of the Dual-Field Elliptic Curve Cryptographic Processor. IEEE Trans. Ind. Electron. 2017, 64, 2353–2362. [Google Scholar] [CrossRef]
- Salarifard, R.; Bayat-sarmadi, S.; Mosanaei-boorani, H. A low-latency and low-complexity point-multiplication in ECC. IEEE Trans. Circuits Syst. I Regul. Pap. 2018, 65, 2869–2877. [Google Scholar] [CrossRef]
- Li, L.; Li, S. High-Performance Pipelined Architecture of Point Multiplication on Koblitz Curves. IEEE Trans. Circuits Syst. II Express Briefs 2018, 65, 1723–1727. [Google Scholar] [CrossRef]
- Rashidi, B.; Sayedi, S.M.; Farashahi, R.R. High-speed hardware architecture of scalar multiplication for binary elliptic curve cryptosystems. Microelectron. J. 2016, 52, 49–65. [Google Scholar] [CrossRef]
- Khan, Z.U.A.; Benaissa, M. High-Speed and Low-Latency ECC Processor Implementation over GF(2m) on FPGA. IEEE Trans. Very Large Scale Integr. Syst. 2017, 25, 165–176. [Google Scholar] [CrossRef] [Green Version]
- Khan, Z.U.A.; Benaissa, M. Throughput/Area-efficient ECC Processor Using Montgomery Point Multiplication on FPGA. IEEE Trans. Circuits Syst. II Express Briefs 2015, 62, 1078–1082. [Google Scholar] [CrossRef]
- Al-Somani, T.F. High-Performance Generic-Point Parallel Scalar Multiplication. Arab. J. Sci. Eng. 2017, 42, 507–512. [Google Scholar] [CrossRef]
- Li, J.; Zhong, S.; Li, Z.; Cao, S.; Zhang, J.; Wang, W. Speed-Oriented Architecture for Binary Field Point Multiplication on Elliptic Curves. IEEE Access 2019, 7, 32048–32060. [Google Scholar] [CrossRef]
- Kumar, N.P.; Shirisha, C. An area-efficient ECC architecture over GF(2m) for resource-constrained applications. AEU Int. J. Electron. Commun. 2020, 125, 153383. [Google Scholar] [CrossRef]
- Zu, Q.; Cai, K. Research and Application of RFID System Security Authentication Protocol Based on ECC Algorithm. In Proceedings of the International Conference on Human Centered Computing, Merida, Mexico, 5–7 December 2018; Springer: Cham, Switzerland, 2018. [Google Scholar]
- Lars, K.; Zhen, Y.; Yawen, W.; Yong, G. Lightweight secure search protocols for low-cost RFID systems. In Proceedings of the 29th IEEE International Conference on Distributed Computing Systems, Montreal, QC, Canada, 22–26 June 2009. [Google Scholar]
- Kumar, S.; Paar, C. Are standards compliant elliptic curve cryptosystems feasible on RFID. In Proceedings of the Workshop on RFID Security, Hiroshima, Japan, 17–20 January 2006. [Google Scholar]
- Lee, Y.K.; Sakiyama, K.; Batina, L.; Verbauwhede, I. Elliptic-curve-based security processor for RFID. IEEE Trans. Comput. 2008, 57, 1514–1527. [Google Scholar] [CrossRef] [Green Version]
- Bock, H.; Braun, M.; Dichtl, M.; Hess, E. A Milestone towards RFID Products Offering Asymmetric Authentication Based on Elliptic Curve Cryptography. Invited Talk at RFIDsec. 2008, pp. 401–413. Available online: https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.453.9024&rep=rep1&type=pdf (accessed on 10 August 2021).
- Texas Instruments. MSP430C11x1—Mixed Signal Microcontroller. 2008. Available online: http://focus.ti.com (accessed on 10 August 2021).
- Roy, S.S.; Järvinen, K.; Verbauwhede, I. Lightweight coprocessor for koblitz curves: 283-bit ecc including scalar conversion with only 4300 gates. In Proceedings of the International Workshop on Cryptographic Hardware and Embedded Systems, Saint-Malo, France, 13–16 September 2015; Springer: Berlin/Heidelberg, Germany, 2015. [Google Scholar]
- Azarderakhsh, R.; Järvinen, K.U.; Mozaffari-Kermani, M. Efficient algorithm and architecture for elliptic curve cryptography for extremely constrained secure applications. IEEE Trans. Circuits Syst. I Regul. Pap. 2014, 61, 1144–1155. [Google Scholar] [CrossRef]
- Liu, Y.L.; Qin, X.L.; Wang, C.; Li, B.H. A lightweight RFID authentication protocol based on elliptic curve cryptography. J. Comput. 2013, 8, 2880–2887. [Google Scholar] [CrossRef]
- Zhao, Z. A Secure RFID Authentication Protocol for Healthcare Environments Using Elliptic Curve Cryptosystem. J. Med. Syst. 2014, 38, 1–7. [Google Scholar] [CrossRef] [PubMed]
- Alamr, A.A.; Kausar, F.; Kim, J.; Seo, C. A secure ECC-based RFID mutual authentication protocol for internet of things. J. Supercomput. 2018, 74, 4281–4294. [Google Scholar] [CrossRef]
- Naeem, M.; Chaudhry, S.A.; Mahmood, K.; Karuppiah, M.; Kumari, S. A scalable and secure RFID mutual authentication protocol using ECC for Internet of Things. Int. J. Commun. Syst. 2019, 33, e3906. [Google Scholar] [CrossRef]
- Dinarvand, N.; Barati, H. An efficient and secure RFID authentication protocol using elliptic curve cryptography. Wirel. Netw. 2019, 25, 415–428. [Google Scholar] [CrossRef]
- Benssalah, M.; Sarah, I.; Drouiche, K. An Efficient RFID Authentication Scheme Based on Elliptic Curve Cryptography for Internet of Things. Wirel. Pers. Commun. 2020, 117, 2513–2539. [Google Scholar] [CrossRef]
- Zheng, L.; Xue, Y.; Zhang, L.; Zhang, R. Mutual Authentication Protocol for RFID Based on ECC. In Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC), Guangzhou, China, 21–24 July 2017. [Google Scholar]
- Yang, X.; Yi, X.; Zeng, Y.; Khalil, I.; Huang, X.; Nepal, S. An improved lightweight RFID authentication protocol for Internet of Things. In Proceedings of the International Conference on Web Information Systems Engineering; Zayed University, Dubai, United Arab Emirates, 12–15 November 2018; Springer: Cham, Switzerland, 2018. [Google Scholar]
- Alaoui, H.L.; El Ghazi, A.; Zbakh, M.; Touhafi, A. Research Article A Highly Efficient ECC-Based Authentication Protocol for RFID. J. Sens. 2021, 2021, 8876766. [Google Scholar]
- Izza, S.; Benssalah, M.; Drouiche, K. An enhanced scalable and secure RFID authentication protocol for WBAN within an IoT environment. J. Inf. Secur. Appl. 2021, 58, 102705. [Google Scholar]
- Baashirah, R.; Abuzneid, A. SLEC: A novel serverless RFID authentication protocol based on elliptic curve cryptography. Electronics 2019, 8, 1166. [Google Scholar] [CrossRef] [Green Version]
- Peeters, R.; Hermans, J. Attack on Liao and Hsiao’s Secure ECC-basedRFID Authentication Scheme integrated withID-Verifier Transfer Protocol. IACR ePrint Arch. 2013, 2013, 399. [Google Scholar]
- Alexander, P.; Baashirah, R.; Abuzneid, A. Comparison and feasibility of various RFID authentication methods using ECC. Sensors 2018, 18, 2902. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Arslan, A.; Bingöl, M.A. Cryptanalysis of Izza et al.’s Protocol: An Enhanced Scalable and Secure RFID Authentication Protocol for WBAN Within An IoT Environment. IACR Cryptol. ePrint Arch. 2021, 2021, 519. [Google Scholar]
- Okeya, K.; Kurumatani, H.; Sakurai, K. Elliptic curves with the montgomery-form and their cryptographic applications. In Proceedings of the International Workshop on Public Key Cryptography; Melbourne, Victoria, Australia, 18–20 January 2000; Springer: Berlin/Heidelberg, Germany, 2000. [Google Scholar]
- Coron, J.S. Resistance against differential power analysis for elliptic curve cryptosystems. In Proceedings of the International Workshop on Cryptographic Hardware and Embedded Systems, Worcester, MA, USA, 12–13 August 1999; Springer: Berlin/Heidelberg, Germany, 1999. [Google Scholar]
- Hoerder, S.; Wójcik, M.; Tillich, S.; Page, D. An evaluation of hash functions on a power analysis resistant processor architecture. In Proceedings of the IFIP International Workshop on Information Security Theory and Practices, Heraklion, Greece, 1–3 June 2011; Springer: Berlin/Heidelberg, Germany, 2011. [Google Scholar]
- Das, M.L. Strong security and privacy of RFID system for internet of things infrastructure. In Proceedings of the International Conference on Security, Privacy, and Applied Cryptography Engineering, Kharagpur, India, 19–23 October 2013; Springer: Berlin/Heidelberg, Germany, 2013. [Google Scholar]
Nomination | Frequency | Read Ranges | Type of Tag | Cost | Application |
---|---|---|---|---|---|
LF | 125–134 Khz | 10–150 cm | Passive | Low | Animal identification |
HF | 13.56 Mhz | Up to 5 m | Passive | Low | Access control |
UHF | 433–960 Mhz | Up to 10 m | Passive\active | High | Logistics, stock management |
Coordinates | [88] | [89] | [90] | [91] | [92] | [93] | [94] | [95] | [96] | [97] | [98] | [99] |
---|---|---|---|---|---|---|---|---|---|---|---|---|
Affine coordinates | √ | √ | √ | |||||||||
Standard projective | √ | |||||||||||
Jacobian projective | √ | |||||||||||
Lopez and Dahab | √ | √ | √ | √ | √ | √ | √ |
Work | Curve | Tech [µm] | Area [Gate] | Power [µW] | Cycles | Energy [µJ] | ||
---|---|---|---|---|---|---|---|---|
Batina [25] | B-131 | d = 1 | 0.18 | 6718 | Under 30 | 210,600 | - | |
d = 2 | 7191 | 109,200 | ||||||
d = 3 | 7645 | 74,880 | ||||||
d = 4 | 8104 | 57,720 | ||||||
B-163 | d = 1 | 0.18 | 8214 | - | 353,710 | - | ||
d = 2 | 8791 | 182,071 | ||||||
d = 3 | 9368 | 124,858 | ||||||
d = 4 | 9926 | 95,159 | ||||||
Lee [103] | B-163 | d = 1 | 0.13 | 12,506 | 36.63 | 275,816 | 8.94 | |
d = 2 | 14,064 | 21.55 | 144,842 | 5.29 | ||||
d = 3 | 14,729 | 15.75 | 101,183 | 3.88 | ||||
d = 4 | 15,356 | 12.08 | 78,544 | 2.94 | ||||
Wenger [26] | B-163 | UMC L130 | 8958 | 32.34 | 286,000 | 9.25 | ||
Wenger [27] | Ar1 | B-163 | 0.13 | 14,167 | 49.1 | 7,216,905 | 354.3 | |
Ar2 | 11,778 | 93.8 | 342,724 | 32.1 | ||||
Ar3 | 4114 | 66.1 | 467,370 | 30.9 | ||||
Roy [106] | K-283 | 0.13 | 4323 | 6.11 | 1,566,000 | 9.56 |
Requirement | Liao | Zhao | Alamr | Naeem | Dinarvand | Benssalah | Zheng | Yang | Aloui | Izza | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
T | R | T | R | T | R | T | R | T | R | T | R | T | R | T | R | T | R | T | R | |
Random number | 1 | 1 | 1 | 1 | 1 | 2 | 1 | 2 | 1 | 1 | 1 | 1 | 1 | 1 | 0 | 0 | 1 | 1 | 1 | 1 |
Scalar multiplication | 5 | 5 | 5 | 5 | 4 | 5 | 5 | 5 | 3 | 3 | 3 | 1 | 4 | 4 | 1 | 1 | 2 | 2 | 2 | 4 |
Point addition | 2 | 2 | 2 | 2 | 1 | 1 | 1 | 1 | 0 | 0 | 1 | 1 | 3 | 3 | 0 | 0 | 0 | 0 | 0 | 0 |
XOR operation | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 2 | 2 | 0 | 0 | 0 | 0 | 0 | 0 | 2 | 2 | 1 | 1 |
Hash function | 0 | 0 | 0 | 0 | 0 | 0 | 2 | 2 | 0 | 0 | 3 | 3 | 0 | 0 | 4 | 4 | 2 | 1 | 6 | 7 |
Protocol | Computation Time (ms) | ||
---|---|---|---|
Tag | Reader | Total | |
Liao [24] | 64 × 5 = 320 | 64 × 5 = 320 | 640 |
Zhao [109] | 64 × 5 = 320 | 64 × 5 = 320 | 640 |
Alamr [110] | 64 × 4 = 256 | 64 × 5 = 320 | 576 |
Naeem [111] | 64 × 5 + 2 × TH 1 = 320 + 2 × TH 1 | 64 × 5 + 2 × TH 1 = 320 + 2 × TH 1 | 640 + 4 × TH 1 |
Dinarvand [112] | 64 × 3 = 192 | 64 × 3 = 192 | 384 |
Benssalah [113] | 64 × 3 + 3 × TH 1 = 192 + 3 × TH 1 | 64 + 3 × TH 1 | 256 + 6 × TH 1 |
Zheng [114] | 64 × 4 = 256 | 64 × 4 = 256 | 448 |
Yang [115] | 64 + 4 × TH 1 | 64 + 4 × TH 1 | 128 + 8 × TH 1 |
Aloui [116] | 689.32 | 75.88 | 765.20 |
Izza [117] | 64 × 2 + 6 × TH 1 = 128 + 6 × TH 1 | 64 × 4 + 7 × TH 1 = 256 + 7 × TH 1 | 384 + 13 × TH 1 |
Protocol | Communication Cost (bits) | ||
---|---|---|---|
Tag | Reader | Total | |
Liao [24] | 640 | 640 | 1280 |
Zhao [109] | 640 | 640 | 1280 |
Alamr [110] | 640 | 960 | 1600 |
Naeem [111] | 480 | 480 | 960 |
Dinarvand [112] | 800 | 640 | 1440 |
Benssalah [113] | 320 | 480 | 800 |
Zheng [114] | 640 | 640 | 1280 |
Yang [115] | 224 | 224 | 448 |
Aloui [116] | 768 | 512 | 1280 |
Izza [117] | 1280 | 1280 | 2560 |
Attacks | Liao [24] | Zhao [109] | Alamr [110] | Naeem [111] | Dinarvand [112] | Benssalah [113] | Zheng [114] | Yang [115] | Aloui [116] | Izza [117] |
---|---|---|---|---|---|---|---|---|---|---|
MITMA | Yes | Yes | Yes | Yes | Yes | Yes | Yes | - | - | - |
Replay | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | - |
Impersonation | No | Yes | Yes | No | No | Yes | Yes | Yes | Yes | - |
Key compromise | No | Yes | Yes | Yes | No | Yes | Yes | - | - | - |
Location tracking | Yes | Yes | Yes | Yes | Yes | Yes | Yes | - | - | - |
DoS | Yes | Yes | No | Yes | Yes | Yes | Yes | Yes | No | Yes |
Cloning | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | - | - |
Server spoofing | Yes | Yes | Yes | Yes | Yes | Yes | Yes | - | - | - |
De-synchronization | Yes | Yes | No | Yes | No | Yes | Yes | - | Yes | No |
Attacks | Liao | Zhao | Alamr | Naeem | Dinarvand | Benssalah | Zheng | Yang | Aloui | Izza | |
---|---|---|---|---|---|---|---|---|---|---|---|
Security of Transmitted Data | |||||||||||
SCA | SPA | - | - | - | No | - | No | - | No | Yes | No |
DPA | Yes | Yes | Yes | No | Yes | No | Yes | No | Yes | No | |
DEMA | Yes | Yes | Yes | No | Yes | No | Yes | No | Yes | No | |
Security of Secret Keys | |||||||||||
SCA | SPA | Yes | Yes | - | - | - | - | - | - | - | - |
DPA | No | No | No | No | Yes | No | No | No | No | No | |
DEMA | No | No | No | No | Yes | No | No | No | No | No |
Security Service | Liao [24] | Zhao [109] | Alamr [110] | Naeem [111] | Dinarvand [112] | Benssalah [113] | Zheng [114] | Yang [115] | Aloui [116] | Izza [117] |
---|---|---|---|---|---|---|---|---|---|---|
Confidentiality | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | - | - |
Availability | Yes | Yes | No | Yes | Yes | Yes | Yes | - | Yes | - |
Forward secrecy | Yes | Yes | Yes | - | Yes | Yes | Yes | - | Yes | No |
Mutual authentication | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
Anonymity | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | No |
Scalability | Yes | Yes | No | Yes | Yes | Yes | Yes | - | Yes | Yes |
Location privacy | Yes | Yes | Yes | Yes | No | Yes | Yes | - | - | No |
Data integrity | Yes | No | No | Yes | Yes | Yes | Yes | Yes | - | - |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Gabsi, S.; Beroulle, V.; Kieffer, Y.; Dao, H.M.; Kortli, Y.; Hamdi, B. Survey: Vulnerability Analysis of Low-Cost ECC-Based RFID Protocols against Wireless and Side-Channel Attacks. Sensors 2021, 21, 5824. https://doi.org/10.3390/s21175824
Gabsi S, Beroulle V, Kieffer Y, Dao HM, Kortli Y, Hamdi B. Survey: Vulnerability Analysis of Low-Cost ECC-Based RFID Protocols against Wireless and Side-Channel Attacks. Sensors. 2021; 21(17):5824. https://doi.org/10.3390/s21175824
Chicago/Turabian StyleGabsi, Souhir, Vincent Beroulle, Yann Kieffer, Hiep Manh Dao, Yassin Kortli, and Belgacem Hamdi. 2021. "Survey: Vulnerability Analysis of Low-Cost ECC-Based RFID Protocols against Wireless and Side-Channel Attacks" Sensors 21, no. 17: 5824. https://doi.org/10.3390/s21175824
APA StyleGabsi, S., Beroulle, V., Kieffer, Y., Dao, H. M., Kortli, Y., & Hamdi, B. (2021). Survey: Vulnerability Analysis of Low-Cost ECC-Based RFID Protocols against Wireless and Side-Channel Attacks. Sensors, 21(17), 5824. https://doi.org/10.3390/s21175824