Log in

New ECC-Based IoT Authentication Protocol for Securing RFID Systems

  • Original Research
  • Published:
SN Computer Science Aims and scope Submit manuscript

Abstract

Nowadays, the research on security authentication for radio-frequency identification (RFID) systems has become a building block of Internet of Things (IoT). Accordingly, the question how to address the security challenge in RFID systems is a critical topic. Besides, the development of an appropriate RFID authentication protocol should be considered as an important encryption protocol to guarantee the security of the exchanges, since it could provide authentication between the tag and the server. Thus, many research based on ECC have been conducted in this area to address the security requirements of the RFID system. To overcome the limitations of the existing schemes and to achieve both security and efficiency together for the IoT, we introduce a novel and efficient RFID authentication protocol-based Elliptic Curve Cryptography (ECC) to maintain security between RFID cards, card readers, and servers. The proposed protocol ensures security requirements and achieves mutual authentication. A comparison with the most recent protocols is performed in terms of security strength and computational performance. Finally, the suggested protocol is analyzed with the AVISPA tool. Based on the simulation findings, our protocol has demonstrated a high level of security; thus, it will be appropriate for a majority of IoT implementations.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (Germany)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

Data availability

The data are available and you can contact authors if you need to be share it with you.

References

  1. Mohy-eddine M, Guezzaz A, Benkirane S, Azrour M. IoT-enabled smart agriculture: security issues and applications. In: Artificial intelligence and smart environment: ICAISE’2022. Springer; 2023. p. 566–571.

  2. Dargaoui S, et al. An overview of the security challenges in IoT environment. In: Mabrouki J, Mourade A, Irshad A, Chaudhry SA, editors., et al., Advanced technology for smart environment and energy, environmental science and engineering. Cham: Springer International Publishing; 2023. p. 151–60.

    Google Scholar 

  3. Hazman C, Benkirane S, Guezzaz A, Azrour M, Abdedaime M. Intrusion detection framework for IoT-based smart environments security. In: Artificial intelligence and smart environment: ICAISE’2022. Springer; 2023. p. 546–552.

  4. Azrour M, Mabrouki J, Farhaoui Y, Guezzaz A. Security analysis of Nikooghadam et al.’s authentication protocol for cloud-IoT. In: Gherabi N, Kacprzyk J, editors. Intelligent systems in big data, semantic web and machine learning, advances in intelligent systems and computing, vol. 1344. Cham: Springer International Publishing; 2021. p. 261–9.

    Google Scholar 

  5. Bhandari R, Kirubanand VB. Enhanced encryption technique for secure IoT data transmission. Int J Electr Comput Eng. 2019;9(5):3732.

    Google Scholar 

  6. Mohy-eddine M, Guezzaz A, Benkirane S, Azrour M. An efficient network intrusion detection model for IoT security using K-NN classifier and feature selection. Multimed Tools Appl. 2023. https://doi.org/10.1007/s11042-023-14795-2.

    Article  Google Scholar 

  7. Mohy-eddine M, Guezzaz A, Benkirane S, Azrour M. An effective intrusion detection approach based on ensemble learning for IIoT edge computing. J Comput Virol Hacking Tech. 2022. https://doi.org/10.1007/s11416-022-00456-9.

    Article  Google Scholar 

  8. Hazman C, Guezzaz A, Benkirane S, Azrour M. lIDS-SIoEL: intrusion detection framework for IoT-based smart environments security using ensemble learning. Clust Comput. 2022. https://doi.org/10.1007/s10586-022-03810-0.

    Article  Google Scholar 

  9. Guezzaz A, Benkirane S, Azrour M. A novel anomaly network intrusion detection system for internet of things security. In: Azrour M, Irshad A, Chaganti R, editors. IoT and smart devices for sustainable environment. Cham: Springer; 2022. p. 129–38.

    Chapter  Google Scholar 

  10. Douiba M, Benkirane S, Guezzaz A, Azrour M. Anomaly detection model based on gradient boosting and decision tree for IoT environments security. J Reliab Intell Environ. 2022. https://doi.org/10.1007/s40860-022-00184-3.

    Article  Google Scholar 

  11. Douiba M, Benkirane S, Guezzaz A, Azrour M. An improved anomaly detection model for IoT security using decision tree and gradient boosting. J Supercomput. 2022;79(3):3392–411.

    Article  Google Scholar 

  12. Chaganti R, Azrour M, Vinayakumar R, Naga V, Dua A, Bhushan B. A particle swarm optimization and deep learning approach for intrusion detection system in internet of medical things. Sustainability. 2022;14:12828.

    Article  Google Scholar 

  13. Mansoor K, Ghani A, Chaudhry SA, Shamshirband S, Ghayyur SAK, Mosavi A. Securing IoT-based RFID systems: a robust authentication protocol using symmetric cryptography. Sensors. 2019;19(21):4752.

    Article  Google Scholar 

  14. Chander B, Gopalakrishnan K. A secured and lightweight RFID-tag based authentication protocol with privacy-preserving in telecare medicine information system. Comput Commun. 2022;191:425–37.

    Article  Google Scholar 

  15. Bendaoud S, Amounas F, El Kinani EH. A new image encryption scheme based on enhanced elliptic curve cryptosystem using DNA computing. In: Proceedings of the 2nd international conference on networking, information systems & security, 2019. p. 1–5.

  16. Bendaoud S, Amounas F, Kinani EHE. Efficient map** method for elliptic curve cryptosystems based on PWLCM. In: Advances in smart technologies applications and case studies: selected papers from the first international conference on smart information and communication technologies, SmartICT 2019, September 26–28, 2019. Saidia, Morocco: Springer; 2020. p. 129–136.

  17. Merabet F, Cherif A, Belkadi M, Blazy O, Conchon E, Sauveron D. New efficient M2C and M2M mutual authentication protocols for IoT-based healthcare applications. Peer-Peer Netw Appl. 2020;13:439–74.

    Article  Google Scholar 

  18. Kumar V, Kumar R, Jangirala S, Kumari S, Kumar S, Chen C-M. An enhanced RFID-based authentication protocol using PUF for vehicular cloud computing. Secur Commun Netw. 2022;2022:1–18.

    Google Scholar 

  19. Ali U, et al. RFID authentication scheme based on hyperelliptic curve signcryption. IEEE Access. 2021;9:49942–59.

    Article  Google Scholar 

  20. Kumar S, Banka H, Kaushik B, Sharma S. A review and analysis of secure and lightweight ECC-based RFID authentication protocol for Internet of vehicles. Trans Emerg Telecommun Technol. 2021;32(11): e4354.

    Article  Google Scholar 

  21. Azrour M, Mabrouki J, Chaganti R. New efficient and secured authentication protocol for remote healthcare systems in cloud-IoT. Secur Commun Netw. 2021;2021:1–12. https://doi.org/10.1155/2021/5546334.

    Article  Google Scholar 

  22. Azrour M, Mabrouki J, Guezzaz A, Kanwal A. Internet of things security: challenges and key issues. Secur Commun Netw. 2021;2021:1–11. https://doi.org/10.1155/2021/5533843.

    Article  Google Scholar 

  23. Azrour M, Mabrouki J, Guezzaz A, Farhaoui Y. New enhanced authentication protocol for internet of things. Big Data Min Anal. 2021;4(1):1–9. https://doi.org/10.26599/BDMA.2020.9020010.

    Article  Google Scholar 

  24. Radan A, Samimi H, Moeni A. A new lightweight authentication protocol in IoT environment for RFID tags. Int J Eng Technol. 2018. https://doi.org/10.14419/ijet.v7i4.7.23028.

    Article  Google Scholar 

  25. Alamr AA, Kausar F, Kim J, Seo C. A secure ECC-based RFID mutual authentication protocol for internet of things. J Supercomput. 2018;74:4281–94.

    Article  Google Scholar 

  26. Naeem M, Chaudhry SA, Mahmood K, Karuppiah M, Kumari S. A scalable and secure RFID mutual authentication protocol using ECC for internet of things. Int J Commun Syst. 2019;33(13): e3906. https://doi.org/10.1002/dac.3906.

    Article  Google Scholar 

  27. Khan MA, Quasim MT, Alghamdi NS, Khan MY. A secure framework for authentication and encryption using improved ECC for IoT-based medical sensor data. IEEE Access. 2020;8:52018–27.

    Article  Google Scholar 

  28. Gabsi S, Kortli Y, Beroulle V, Kieffer Y, Alasiry A, Hamdi B. Novel ECC-based RFID mutual authentication protocol for emerging IoT applications. IEEE Access. 2021;9:130895–913.

    Article  Google Scholar 

  29. Izza S, Benssalah M, Drouiche K. An enhanced scalable and secure RFID authentication protocol for WBAN within an IoT environment. J Inf Secur Appl. 2021;58: 102705. https://doi.org/10.1016/j.jisa.2020.102705.

    Article  Google Scholar 

  30. Noori D, Shakeri H, Niazi Torshiz M. An elliptic curve cryptosystem-based secure RFID mutual authentication for Internet of things in healthcare environment. EURASIP J Wirel Commun Netw. 2022;2022(1):64.

    Article  Google Scholar 

  31. Gao M, Lu Y. URAP: a new ultra-lightweight RFID authentication protocol in passive RFID system. J Supercomput. 2022;78(8):10893–905. https://doi.org/10.1007/s11227-021-04252-y.

    Article  Google Scholar 

  32. Meher BK, Amin R, Das AK, Khan MK. KL-RAP: an efficient key-less RFID authentication protocol based on ECDLP for consumer warehouse management system. IEEE Trans Netw Sci Eng. 2022;9(5):3411–20. https://doi.org/10.1109/TNSE.2022.3179830.

    Article  MathSciNet  Google Scholar 

  33. Lee T-F, Lin K-W, Hsieh Y-P, Lee K-C. Lightweight cloud computing-based RFID authentication protocols using PUF for e-healthcare systems. IEEE Sens J. 2023;23(6):6338–49. https://doi.org/10.1109/JSEN.2023.3242132.

    Article  Google Scholar 

  34. Maurya PK, Bagchi S. Quadratic residue-based unilateral authentication protocol for RFID system. Multimed Tools Appl. 2023;82(11):16533–54. https://doi.org/10.1007/s11042-022-14170-7.

    Article  Google Scholar 

  35. Sravana Kumar D. Encryption of data using elliptic curve over finite fields. Int J Distrib Parallel Syst. 2012;3(1):301–8. https://doi.org/10.5121/ijdps.2012.3125.

    Article  Google Scholar 

  36. Amounas F, Kinani EHE, Chillali A. An application of discrete algorithms in asymmetric cryptography. Int Math Forum. 2011;6(49):2409–18.

    MathSciNet  MATH  Google Scholar 

  37. Dinarvand N, Barati H. An efficient and secure RFID authentication protocol using elliptic curve cryptography. Wirel Netw. 2019;25(1):415–28.

    Article  Google Scholar 

  38. Armando A, et al. The AVISPA tool for the automated validation of internet security protocols and applications. In: Etessami K, Rajamani SK, editors., et al., Computer aided verification, lecture notes in computer science. Berlin, Heidelberg: Springer; 2005. p. 281–5.

    Chapter  Google Scholar 

  39. Viganò L. Automated security protocol analysis with the AVISPA tool. Electron Notes Theor Comput Sci. 2006;155:61–86. https://doi.org/10.1016/j.entcs.2005.11.052.

    Article  Google Scholar 

  40. Lone TA, et al. Securing communication by attribute-based authentication in HetNet used for medical applications. EURASIP J Wirel Commun Netw. 2020;2020:1–21.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mourade Azrour.

Ethics declarations

Conflict of Interest

On behalf of all authors, the corresponding author states that there is no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article is part of the topical collection “Research Trends in Communication and Network Technologies” guest edited by Anshul Verma, Pradeepika Verma, and Kiran Kumar Pattanaik.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Timouhin, H., Amounas, F. & Azrour, M. New ECC-Based IoT Authentication Protocol for Securing RFID Systems. SN COMPUT. SCI. 4, 785 (2023). https://doi.org/10.1007/s42979-023-02220-2

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s42979-023-02220-2

Keywords

Navigation