Electronic and Micro-Electronic Laboratory, Faculty of Sciences of Monastir, University of Monastir, Monastir 5019, Tunisia.
LCIS Laboratory, Grenoble INP, University Grenoble Alpes, 26000 Valence, France.
Sensors (Basel). 2021 Aug 30;21(17):5824. doi: 10.3390/s21175824.
The radio frequency identification (RFID) system is one of the most important technologies of the Internet of Things (IoT) that tracks single or multiple objects. This technology is extensively used and attracts the attention of many researchers in various fields, including healthcare, supply chains, logistics, asset tracking, and so on. To reach the required security and confidentiality requirements for data transfer, elliptic curve cryptography (ECC) is a powerful solution, which ensures a tag/reader mutual authentication and guarantees data integrity. In this paper, we first review the most relevant ECC-based RFID authentication protocols, focusing on their security analysis and operational performances. We compare the various lightweight ECC primitive implementations designed for RFID applications in terms of occupied area and power consumption. Then, we highlight the security threats that can be encountered considering both network attacks and side-channel attacks and analyze the security effectiveness of RFID authentication protocols against such types of attacks. For this purpose, we classify the different threats that can target an ECC-based RFID system. After that, we present the most promising ECC-based protocols released during 2014-2021 by underlining their advantages and disadvantages. Finally, we perform a comparative study between the different protocols mentioned regarding network and side-channel attacks, as well as their implementation costs to find the optimal one to use in future works.
射频识别 (RFID) 系统是物联网 (IoT) 中最重要的技术之一,用于跟踪单个或多个对象。这项技术被广泛应用,并吸引了包括医疗保健、供应链、物流、资产管理等各个领域的许多研究人员的关注。为了达到数据传输所需的安全性和保密性要求,椭圆曲线密码学 (ECC) 是一种强大的解决方案,它可以确保标签/读写器的相互认证,并保证数据的完整性。在本文中,我们首先回顾了基于 ECC 的最相关的 RFID 认证协议,重点分析了它们的安全性分析和操作性能。我们比较了针对 RFID 应用设计的各种轻量级 ECC 原语实现,从占用面积和功耗方面进行了比较。然后,我们强调了可能遇到的安全威胁,同时考虑了网络攻击和侧信道攻击,并分析了 RFID 认证协议针对这些类型攻击的安全性有效性。为此,我们对可能针对基于 ECC 的 RFID 系统的不同威胁进行了分类。之后,我们介绍了 2014 年至 2021 年期间发布的最有前途的基于 ECC 的协议,强调了它们的优缺点。最后,我们对不同协议进行了网络和侧信道攻击以及实现成本方面的比较研究,以找到在未来工作中使用的最佳协议。