Abstract
The Internet of Things (IoT) is an environment in which “things” (objects, animals or people) are provided with unique identifiers (IPv6 addresses) and the ability to communicate over a network without requiring human-to-human or human-to-computer interaction. Radio-Frequency Identification Technology (RFID) is the key enabler of the IoT. The RFID Implant System considered in the proposed work consists of an implantable, passive RFID tag which is a data carrying device that is attached to the object to be identified, RFID reader which communicates with the tag in order to read or write data to its memory and, the back-end database which stores information related to the identified object. There are several security issues associated with the use of RFID tags in IoT like eavesdropping, impersonation, cloning, replay attack, tag destruction, unauthorized tag reading, tag modification etc. To defend such attacks effectively, efficient security mechanisms are essential. So, the proposed system aims to provide a secure mutual authentication mechanism based on Hyper Elliptic Curve Cryptography (HECC) to authenticate the communication between the RFID tag and reader. The security of Hyper-elliptic Curve Cryptosystem depends on the hardness of solving hyper-elliptic curve discrete logarithm problem (HCDLP). This problem helps to avoid the eavesdropper from breaking into the security of the HECC cryptosystem. The proposed work also uses D-Quark hash algorithm.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Batina, L., Guajardo, J., Kerins, T., Mentens, N., Tuyls, P., Verbauwhede, I.: Public-key cryptography for RFID-tags. In: Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2007, pp. 217–222. IEEE (2007)
Liu, D., Yang, Y., Wang, J., Min, H.: A mutual authentication protocol for RFID using IDEA. Auto-ID Labs White Paper WP-HARDWARE-048, March 2009
Chou, J.-S.: An efficient mutual authentication RFID scheme based on elliptic curve cryptography. J. Supercomput. 70(1), 75–94 (2014). Springer
Lee, Y.K., Batina, L., Singelée, D., Verbauwhede, I.: Wide–weak privacy–preserving RFID authentication protocols. In: Chatzimisios, P., Verikoukis, C., Santamaría, I., Laddomada, M., Hoffmann, O. (eds.) MOBILIGHT 2010. LNICST, vol. 45, pp. 254–267. Springer, Heidelberg (2010)
Lee, Y.K., Batina, L., Singelee, D., Preneel, B., Verbauwhede, I.: An-counterfeiting, untraceability and other security challenges for RFID systems: public-key-based protocols and hardware. In: Sadeghi, A.-R., Naccache, D. (eds.) Towards Hardware-Intrinsic Security, pp. 237–257. Springer, Berlin (2010)
Mitrokotsa, A., Rieback, M.R., Tanenbaum, A.S.: Classification of RFID attacks. G. E. N. 15693, 14443 (2010)
Moosavi, S.R., Nigussie, E., Virtanen, S., Isoaho, J.: An elliptic curve-based mutual authentication scheme for RFID implant systems. Procedia Comput. Sci. 32, 198–206 (2014)
Paise, R.-I., Vaudenay, S.: Mutual authentication in RFID: security and privacy. In: Proceedings of the 2008 ACM symposium on Information, Computer and Communications Security, pp. 292–299. ACM (2008)
Pham, T.A., Hasan, M.S., Yu, H.: An RFID mutual authentication protocol based on AES algorithm. In: 2012 UKACC International Conference on Control, pp. 997–1002. IEEE, September 2012
Tuyls, P., Batina, L.: RFID-tags for anti-counterfeiting. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol. 3860, pp. 115–131. Springer, Heidelberg (2006)
Wankhede Barsgade, M.T., Meshram, S.A.: Comparative study of elliptic and hyper-elliptic curve cryptography in discrete logarithmic problem. IOSR J. Math. 10(2), 61–63 (2014)
Zhang, X., Li, J., Wu, Y., Zhang, Q.: An ECDLP-based randomized key RFID authentication protocol. In: 2011 International Conference on Network Computing and Information Security (NCIS), vol. 2, pp. 146–149 (2011)
Liao, Y.-P., Hsiao, C.-M.: A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol. Ad Hoc Netw. 18, 133–146 (2014)
Pelzl, J., Wollinger, T., Guajardo, J., Paar, C.: Hyperelliptic curve cryptosystems: closing the performance gap to elliptic curves. In: Walter, C.D., Koç, Ç.K., Paar, C. (eds.) CHES 2003. LNCS, vol. 2779, pp. 351–365. Springer, Heidelberg (2003)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
John, A.L., Thampi, S.M. (2016). Mutual Authentication Based on HECC for RFID Implant Systems. In: Mueller, P., Thampi, S., Alam Bhuiyan, M., Ko, R., Doss, R., Alcaraz Calero, J. (eds) Security in Computing and Communications. SSCC 2016. Communications in Computer and Information Science, vol 625. Springer, Singapore. https://doi.org/10.1007/978-981-10-2738-3_2
Download citation
DOI: https://doi.org/10.1007/978-981-10-2738-3_2
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-2737-6
Online ISBN: 978-981-10-2738-3
eBook Packages: Computer ScienceComputer Science (R0)