Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
Review
. 2018 Sep 1;18(9):2902.
doi: 10.3390/s18092902.

Comparison and Feasibility of Various RFID Authentication Methods Using ECC

Affiliations
Review

Comparison and Feasibility of Various RFID Authentication Methods Using ECC

Pagán Alexander Jr et al. Sensors (Basel). .

Abstract

Radio frequency identification (RFID) is a technology that has grown in popularity and in the applications of use. However, there are major issues regarding security and privacy with respect to RFID technology which have caught the interest of many researchers. There are significant challenges which must be overcome to resolve RFID security and privacy issues. One reason is the constraints attached to the provision of security and privacy in RFID systems. Along with meeting the security and privacy needs of RFID technology, solutions must be inexpensive, practical, reliable, scalable, flexible, inter-organizational, and long-lasting. To make RFID identifiers effective and efficient they must identify the item(s) while resisting attacks aimed at obtaining the tag's information and compromising the system or making it possible to bypass the protection RFID tags are supposed to provide. Different authentication methods have been proposed, researched, and evaluated in the literature. In this work, we proposed our methodology in evaluating RFID authentication, and a few of the most promising authentication methods are reviewed, compared, and ranked in order to arrive at a possible best choice of protocol to use.

Keywords: IoT; RFID; Random Access Control; authentication; elliptic curve cryptography; lightweight protocol; privacy; security.

PubMed Disclaimer

Conflict of interest statement

The authors declare no conflicts of interest.

Figures

Figure 1
Figure 1
Basic RFID Model.
Figure 2
Figure 2
Authentication phases for Alamr et al. [4].
Figure 3
Figure 3
Authentication phases for Liao et al. [18].
Figure 4
Figure 4
Authentication phases for Zheng et al. [5]
Figure 5
Figure 5
Authentication phases for Zhang et al. [13].
Figure 6
Figure 6
Authentication phases for Zhao [15].
Figure 7
Figure 7
Authentication phases for Jin et al. [16].
Figure 8
Figure 8
Authentication phases for Dinarvand et al. [17].

References

    1. Bhattacharyya M., Gruenwald W., Jansen D., Reindl L., Aghassi-Hagmann J. An Ultra-Low-Power RFID/NFC Frontend IC Using 0.18 µm CMOS Technology for Passive Tag Applications. Sensors. 2018;18:1452. doi: 10.3390/s18051452. - DOI - PMC - PubMed
    1. Gope P., Hwang T. A realistic lightweight authentication protocol preserving strong anonymity for securing RFID system. Comput. Secur. 2015;55:271–280. doi: 10.1016/j.cose.2015.05.004. - DOI
    1. Gope P., Lee J., Quek T.Q.S. Lightweight and Practical Anonymous Authentication Protocol for RFID Systems Using Physically Unclonable Functions. IEEE Trans. Inf. Forensics Secur. 2018;13:2831–2843. doi: 10.1109/TIFS.2018.2832849. - DOI
    1. Alamr A.A., Kausar F., Kim J.S. Secure mutual authentication protocol for RFID based on elliptic curve cryptography; Proceedings of the 2016 International Conference on Platform Technology and Service (PlatCon); Jeju, Korea. 15–17 February 2016; pp. 1–7.
    1. Zheng L., Xue Y., Zhang L., Zhang R. Mutual Authentication Protocol for RFID based on ECC; Proceedings of the IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC); Guangzhou, China. 21–24 July 2017; pp. 320–323.