| Literature DB >> 30200493 |
Pagán Alexander1, Rania Baashirah2, Abdelshakour Abuzneid3.
Abstract
Radio frequency identification (RFID) is a technology that has grown in popularity and in the applications of use. However, there are major issues regarding security and privacy with respect to RFID technology which have caught the interest of many researchers. There are significant challenges which must be overcome to resolve RFID security and privacy issues. One reason is the constraints attached to the provision of security and privacy in RFID systems. Along with meeting the security and privacy needs of RFID technology, solutions must be inexpensive, practical, reliable, scalable, flexible, inter-organizational, and long-lasting. To make RFID identifiers effective and efficient they must identify the item(s) while resisting attacks aimed at obtaining the tag's information and compromising the system or making it possible to bypass the protection RFID tags are supposed to provide. Different authentication methods have been proposed, researched, and evaluated in the literature. In this work, we proposed our methodology in evaluating RFID authentication, and a few of the most promising authentication methods are reviewed, compared, and ranked in order to arrive at a possible best choice of protocol to use.Entities:
Keywords: IoT; RFID; Random Access Control; authentication; elliptic curve cryptography; lightweight protocol; privacy; security
Year: 2018 PMID: 30200493 PMCID: PMC6164036 DOI: 10.3390/s18092902
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1Basic RFID Model.
Figure 2Authentication phases for Alamr et al. [4].
Figure 3Authentication phases for Liao et al. [18].
Figure 4Authentication phases for Zheng et al. [5]
Figure 5Authentication phases for Zhang et al. [13].
Figure 6Authentication phases for Zhao [15].
Figure 7Authentication phases for Jin et al. [16].
Figure 8Authentication phases for Dinarvand et al. [17].
Comparison of scalar multiplication costs in each protocol.
| Elliptic Scalar Multiplication Costs | |||||
|---|---|---|---|---|---|
| Protocol | Tag | Reader | Calculation Speed on 5 MHz Tag (ms) | Total Tag Calculation Time (ms) | Total Reader Calculation Time (ms) |
| Alamr et al. [ | 4 | 5 | 64 | 256 | 320 |
| Liao et al. [ | 5 | 5 | 64 | 320 | 320 |
| Zheng et al. [ | 3 | 4 | 64 | 192 | 256 |
| Zhang et al. [ | 4 | 2 | 64 | 256 | 128 |
| Zhao [ | 5 | 5 | 64 | 320 | 320 |
| Jin et al. [ | 4 | 3 | 64 | 256 | 192 |
| Dinarvand et al. [ | 3 | 3 | 64 | 192 | 192 |
Cost of communications between tag and reader.
| Communication Cost (bits) | ||
|---|---|---|
| Protocol | Tag | Reader |
| Alamr et al. [ | 640 | 960 |
| Liao et al. [ | 640 | 640 |
| Zheng et al. [ | 640 | 640 |
| Zhang et al. [ | 960 | 160 |
| Zhao [ | 640 | 640 |
| Jin et al. [ | 640 | 640 |
| Dinarvand et al. [ | 800 | 640 |
Comparison of storage needed in tag and reader/server.
| Parameter Storage Cost (bits) | ||
|---|---|---|
| Protocol | Tag | Reader |
| Alamr et al. [ | 1920 | 1120 + 320T |
| Liao et al. [ | 1920 | 1280 + 800T |
| Zheng et al. [ | 2080 | 1760 + 320T |
| Zhang et al. [ | 1600 | 1440 + 480T |
| Zhao [ | 1760 | 1120 + 480T |
| Jin et al. [ | 1600 | 1120 + 320T |
| Dinarvand et al. [ | 1760 | 1120 + 800T |
Comparison of security features met by the various protocols.
| Security Features Comparison | |||||||
|---|---|---|---|---|---|---|---|
| Feature | Alamr et al. [ | Liao et al. [ | Zheng et al. [ | Zhang et al. [ | Zhao [ | Jin et al. [ | Dinarvand et al. [ |
| Mutual Authentication | Y | Y | Y | N | Y | Y | Y |
| Confidentiality | Y | Y | Y | Y | Y | Y | Y |
| Anonymity | Y | Y | Y | Y | Y | Y | Y |
| Availability | N | Y | Y | Y | Y | Y | Y |
| Scalability | N | Y | Y | N | Y | Y | Y |
| Forward Security | Y | Y | Y | Y | Y | Y | Y |
| Location Privacy | Y | Y | Y | Y | Y | Y | Y |
| Data Integrity | N | Y | Y | Y | N | N | Y |
Comparison of each protocol’s resistance to various attacks.
| Attack Resistance Comparison | |||||||
|---|---|---|---|---|---|---|---|
| Feature | Alamr et al. [ | Liao et al. [ | Zheng et al. [ | Zhang et al. [ | Zhao [ | Jin et al. [ | Dinarvand et al. [ |
| MIMA | Y | Y | Y | Y | Y | Y | Y |
| Replay | Y | Y | Y | Y | Y | Y | Y |
| Impersonation | Y | N | Y | Y | Y | Y | Y |
| Key Compromise | Y | N | Y | Y | Y | Y | Y |
| Location Tracking | Y | Y | Y | Y | Y | Y | Y |
| DoS | N | Y | Y | N | Y | Y | Y |
| Cloning | Y | Y | Y | Y | Y | Y | Y |
| Server Spoofing | Y | Y | Y | N | Y | Y | Y |
| Desynchronization | N | Y | Y | NA | Y | Y | Y |
Ranking based on tag computational cost.
| Computational Ranking | ||
|---|---|---|
| Protocol | Total Tag Calculation Time (ms) | Rank Order |
| Zheng et al. [ | 192 | 1 |
| Dinarvand et al. [ | 192 | 1 |
| Alamr et al. [ | 256 | 2 |
| Zhang et al. [ | 256 | 2 |
| Jin et al. [ | 256 | 2 |
| Liao et al. [ | 320 | 3 |
| Zhao [ | 320 | 3 |
Ranking based on reader/server computational cost.
| Computational Ranking | ||
|---|---|---|
| Protocol | Total Tag Calculation Time (ms) | Rank Order |
| Zhang et al. [ | 128 | 1 |
| Jin et al. [ | 192 | 2 |
| Dinarvand et al. [ | 192 | 2 |
| Zheng et al. [ | 256 | 3 |
| Alamr et al. [ | 320 | 4 |
| Liao et al. [ | 320 | 4 |
| Zhao [ | 320 | 4 |
Ranking based on tag to reader/server communication cost.
| Communication Ranking | ||
|---|---|---|
| Protocol | Tag | Rank Order |
| Alamr et al. [ | 640 | 1 |
| Liao et al. [ | 640 | 1 |
| Zheng et al. [ | 640 | 1 |
| Zhao [ | 640 | 1 |
| Jin et al. [ | 640 | 1 |
| Dinarvand et al. [ | 800 | 2 |
| Zhang et al. [ | 960 | 3 |
Ranking based on reader/server to tag communication cost.
| Communication Ranking | ||
|---|---|---|
| Protocol | Reader | Rank Order |
| Zhang et al. [ | 160 | 1 |
| Liao et al. [ | 640 | 2 |
| Zheng et al. [ | 640 | 2 |
| Zhao [ | 640 | 2 |
| Jin et al. [ | 640 | 2 |
| Dinarvand et al. [ | 640 | 2 |
| Alamr et al. [ | 960 | 3 |
Ranking based on tag storage of required protocol parameters.
| Storage Ranking | ||
|---|---|---|
| Protocol | Tag | Rank Order |
| Zhang et al. [ | 1600 | 1 |
| Jin et al. [ | 1600 | 1 |
| Zhao [ | 1760 | 2 |
| Dinarvand et al. [ | 1760 | 2 |
| Alamr et al. [ | 1920 | 3 |
| Liao et al. [ | 1920 | 3 |
| Zheng et al. [ | 2080 | 4 |
Ranking based on reader/server storage of required protocol parameters.
| Storage Ranking | ||
|---|---|---|
| Protocol | Tag | Rank Order |
| Alamr et al. [ | 1120 + 320T | 1 |
| Jin et al. [ | 1120 + 320T | 1 |
| Zheng et al. [ | 1760 + 320T | 2 |
| Zhao [ | 1120 + 480T | 3 |
| Zhang et al. [ | 1440 + 480T | 4 |
| Dinarvand et al. [ | 1120 + 800T | 5 |
| Liao et al. [ | 1280 + 800T | 6 |
Ranking based on the number of security features each protocol provides.
| Security Features Ranking | ||
|---|---|---|
| Protocol | Number of Features Met | Rank Order |
| Liao et al. [ | 8 | 1 |
| Zheng et al. [ | 8 | 1 |
| Dinarvand et al. [ | 8 | 1 |
| Zhao [ | 7 | 2 |
| Jin et al. [ | 7 | 2 |
| Zhang et al. [ | 6 | 3 |
| Alamr et al. [ | 5 | 4 |
Ranking based on the number of different types of attacks each protocol can resist.
| Attack Resistance Ranking | ||
|---|---|---|
| Protocol | Number of Attacks Able to Resist | Rank Order |
| Zheng et al. [ | 9 | 1 |
| Zhao [ | 9 | 1 |
| Jin et al. [ | 9 | 1 |
| Dinarvand et al. [ | 9 | 1 |
| Alamr et al. [ | 7 | 2 |
| Liao et al. [ | 7 | 2 |
| Zhang et al. [ | 6 | 3 |
Sorted rank of each protocol based on the average of all their rankings.
| Overall Protocol Rank | |
|---|---|
| Protocol | Average Rank |
| Jin et al. [ | 1.5 |
| Zheng et al. [ | 1.875 |
| Dinarvand et al. [ | 2 |
| Zhang et al. [ | 2.25 |
| Zhao [ | 2.25 |
| Alamr et al. [ | 2.5 |
| Liao et al. [ | 2.75 |