2019
DOI: 10.1002/dac.3906
|View full text |Cite
|
Sign up to set email alerts
|

A scalable and secure RFID mutual authentication protocol using ECC for Internet of Things

Abstract: SummaryVery recently, Alamr et al (J. Supercomput 1‐14 doi: 10.1007/s11227‐016‐1861‐1) presented a radio frequency identifier (RFID) authentication protocol for the Internet of Things (IoT) through elliptic curve cryptography (ECC). They claimed the protocol to achieve several security properties and thwart all known attacks. However, this paper shows that their scheme is having correctness and scalability issues. The reader in their protocol can accommodate only one tag, which is not desirable in the IoT envi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
50
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
7
1
1

Relationship

1
8

Authors

Journals

citations
Cited by 42 publications
(50 citation statements)
references
References 31 publications
0
50
0
Order By: Relevance
“…Apart from the comparison of Gimli AE with the symmetric schemes discussed above, the evaluation of asymmetric schemes is also presented with respect to the hardware resources utilization and time consumption. Referring to the authentication protocol based on ECC presented by Naeem et al [17], the main operations are point multiplication, point addition and hash function. Out of these main operations, the most hardware expensive and time consuming one is the point multiplication.…”
Section: Comparisonmentioning
confidence: 99%
See 1 more Smart Citation
“…Apart from the comparison of Gimli AE with the symmetric schemes discussed above, the evaluation of asymmetric schemes is also presented with respect to the hardware resources utilization and time consumption. Referring to the authentication protocol based on ECC presented by Naeem et al [17], the main operations are point multiplication, point addition and hash function. Out of these main operations, the most hardware expensive and time consuming one is the point multiplication.…”
Section: Comparisonmentioning
confidence: 99%
“…Tight constraints with respect to lower power consumptions and small hardware footprint demand for highly optimized implementations in hardware. Naeem et al [17] has presented an authentication protocol based on elliptic curve cryptography (ECC), while the information about hardware resource utilization is not provided. Symmetric cryptography is a practical solution for constrained devices due to its lightweight operations, and it is usually hardware friendly.…”
Section: Introductionmentioning
confidence: 99%
“…This protocol used elliptic curve Diffie-Hellman as the main agreement protocol to settle on a common message that is used to encrypt the subsequent messages exchanged to secure the tag data. Nevertheless, recently Naeem et al [20] put forward some scalability and consistency based security concerns. Finally, the paper recommends an update to fix the mentioned problems.…”
Section: Related Workmentioning
confidence: 99%
“…IoT is associated with great prospects of physical objects with the cyber world, such as healthcare devices, intelligent transportation systems, home appliances, sensors, and environmental monitoring [2]. Connected devices to the IoT are exponentially increasing [3], which add more security challenges that must be taken into consideration [4]. Cryptosystems based on asymmetric keys play vital roles in the security of diverse communication systems.…”
Section: Introductionmentioning
confidence: 99%