Cargando…

Survey: Vulnerability Analysis of Low-Cost ECC-Based RFID Protocols against Wireless and Side-Channel Attacks

The radio frequency identification (RFID) system is one of the most important technologies of the Internet of Things (IoT) that tracks single or multiple objects. This technology is extensively used and attracts the attention of many researchers in various fields, including healthcare, supply chains...

Descripción completa

Detalles Bibliográficos
Autores principales: Gabsi, Souhir, Beroulle, Vincent, Kieffer, Yann, Dao, Hiep Manh, Kortli, Yassin, Hamdi, Belgacem
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2021
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8434319/
https://www.ncbi.nlm.nih.gov/pubmed/34502714
http://dx.doi.org/10.3390/s21175824
_version_ 1783751570419089408
author Gabsi, Souhir
Beroulle, Vincent
Kieffer, Yann
Dao, Hiep Manh
Kortli, Yassin
Hamdi, Belgacem
author_facet Gabsi, Souhir
Beroulle, Vincent
Kieffer, Yann
Dao, Hiep Manh
Kortli, Yassin
Hamdi, Belgacem
author_sort Gabsi, Souhir
collection PubMed
description The radio frequency identification (RFID) system is one of the most important technologies of the Internet of Things (IoT) that tracks single or multiple objects. This technology is extensively used and attracts the attention of many researchers in various fields, including healthcare, supply chains, logistics, asset tracking, and so on. To reach the required security and confidentiality requirements for data transfer, elliptic curve cryptography (ECC) is a powerful solution, which ensures a tag/reader mutual authentication and guarantees data integrity. In this paper, we first review the most relevant ECC-based RFID authentication protocols, focusing on their security analysis and operational performances. We compare the various lightweight ECC primitive implementations designed for RFID applications in terms of occupied area and power consumption. Then, we highlight the security threats that can be encountered considering both network attacks and side-channel attacks and analyze the security effectiveness of RFID authentication protocols against such types of attacks. For this purpose, we classify the different threats that can target an ECC-based RFID system. After that, we present the most promising ECC-based protocols released during 2014–2021 by underlining their advantages and disadvantages. Finally, we perform a comparative study between the different protocols mentioned regarding network and side-channel attacks, as well as their implementation costs to find the optimal one to use in future works.
format Online
Article
Text
id pubmed-8434319
institution National Center for Biotechnology Information
language English
publishDate 2021
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-84343192021-09-12 Survey: Vulnerability Analysis of Low-Cost ECC-Based RFID Protocols against Wireless and Side-Channel Attacks Gabsi, Souhir Beroulle, Vincent Kieffer, Yann Dao, Hiep Manh Kortli, Yassin Hamdi, Belgacem Sensors (Basel) Review The radio frequency identification (RFID) system is one of the most important technologies of the Internet of Things (IoT) that tracks single or multiple objects. This technology is extensively used and attracts the attention of many researchers in various fields, including healthcare, supply chains, logistics, asset tracking, and so on. To reach the required security and confidentiality requirements for data transfer, elliptic curve cryptography (ECC) is a powerful solution, which ensures a tag/reader mutual authentication and guarantees data integrity. In this paper, we first review the most relevant ECC-based RFID authentication protocols, focusing on their security analysis and operational performances. We compare the various lightweight ECC primitive implementations designed for RFID applications in terms of occupied area and power consumption. Then, we highlight the security threats that can be encountered considering both network attacks and side-channel attacks and analyze the security effectiveness of RFID authentication protocols against such types of attacks. For this purpose, we classify the different threats that can target an ECC-based RFID system. After that, we present the most promising ECC-based protocols released during 2014–2021 by underlining their advantages and disadvantages. Finally, we perform a comparative study between the different protocols mentioned regarding network and side-channel attacks, as well as their implementation costs to find the optimal one to use in future works. MDPI 2021-08-30 /pmc/articles/PMC8434319/ /pubmed/34502714 http://dx.doi.org/10.3390/s21175824 Text en © 2021 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Review
Gabsi, Souhir
Beroulle, Vincent
Kieffer, Yann
Dao, Hiep Manh
Kortli, Yassin
Hamdi, Belgacem
Survey: Vulnerability Analysis of Low-Cost ECC-Based RFID Protocols against Wireless and Side-Channel Attacks
title Survey: Vulnerability Analysis of Low-Cost ECC-Based RFID Protocols against Wireless and Side-Channel Attacks
title_full Survey: Vulnerability Analysis of Low-Cost ECC-Based RFID Protocols against Wireless and Side-Channel Attacks
title_fullStr Survey: Vulnerability Analysis of Low-Cost ECC-Based RFID Protocols against Wireless and Side-Channel Attacks
title_full_unstemmed Survey: Vulnerability Analysis of Low-Cost ECC-Based RFID Protocols against Wireless and Side-Channel Attacks
title_short Survey: Vulnerability Analysis of Low-Cost ECC-Based RFID Protocols against Wireless and Side-Channel Attacks
title_sort survey: vulnerability analysis of low-cost ecc-based rfid protocols against wireless and side-channel attacks
topic Review
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8434319/
https://www.ncbi.nlm.nih.gov/pubmed/34502714
http://dx.doi.org/10.3390/s21175824
work_keys_str_mv AT gabsisouhir surveyvulnerabilityanalysisoflowcosteccbasedrfidprotocolsagainstwirelessandsidechannelattacks
AT beroullevincent surveyvulnerabilityanalysisoflowcosteccbasedrfidprotocolsagainstwirelessandsidechannelattacks
AT kiefferyann surveyvulnerabilityanalysisoflowcosteccbasedrfidprotocolsagainstwirelessandsidechannelattacks
AT daohiepmanh surveyvulnerabilityanalysisoflowcosteccbasedrfidprotocolsagainstwirelessandsidechannelattacks
AT kortliyassin surveyvulnerabilityanalysisoflowcosteccbasedrfidprotocolsagainstwirelessandsidechannelattacks
AT hamdibelgacem surveyvulnerabilityanalysisoflowcosteccbasedrfidprotocolsagainstwirelessandsidechannelattacks