A Secured RFID Lightweight Authentication Protocol based on Elliptic Curve Cryptography using modified PRNG Algorithm

In this paper, the goal is to enhance the lightweight Authentication Protocol using Epoch Timestamp as Seed for PRNG Protocol based on Elliptic Curve Cryptography. The proposed enhancement uses PRNG Algorithm where randomness is generated using real-time system clock converted into running epoch timestamp as Seed for PRNG on LCG Algorithm that will do Bootstrap Iteration in generating a Random Number as keys for ECC Mutual Authentication Protocol. The result shows that the enhanced ECC Protocol utilizes smaller storage requirements of 2560bits + 640w bits, communication cost of 1,120bits faster response time and throughput, and lesser computational cost of 207ms for the Tag and the Server was achieved compared to Zheng Protocol. Also, the performance of this proposed Protocol has many advantages in terms of confidentiality, mutual authentication, availability, forward security, anonymity, spoofing/cloning, scalability and so on, which can resist tracking attacks, denial of service attacks, and system internal attack. It is therefore suggested that some practical applications using a RFID system that requires security for the lightweight authentication protocol should be introduced and more appropriate.

[1]  Ying Zhang,et al.  Tree-LSHB+: An LPN-Based Lightweight Mutual Authentication RFID Protocol , 2013, Wirel. Pers. Commun..

[2]  Ethiopia Nigussie,et al.  An Elliptic Curve-based Mutual Authentication Scheme for RFID Implant Systems , 2014, ANT/SEIT.

[3]  Satyajeet Kumar,et al.  Bank Locker Security System based on RFID and GSM Technology , 2016 .

[4]  Feng Xiao,et al.  Security Protocol for RFID System Conforming to EPC-C1G2 Standard , 2013, J. Comput..

[5]  Hung-Min Sun,et al.  A Gen2-Based RFID Authentication Protocol for Security and Privacy , 2009, IEEE Transactions on Mobile Computing.

[6]  Donghoon Lee,et al.  Security Analysis and Improvements of Two-Factor Mutual Authentication with Key Agreement in Wireless Sensor Networks , 2014, Sensors.

[7]  Rui Zhang,et al.  Mutual Authentication Protocol for RFID Based on ECC , 2017, 22017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC).

[8]  Samuel Gorenstein,et al.  Testing a random number generator , 1967, CACM.

[9]  Bruce Schneier,et al.  Cryptanalytic Attacks on Pseudorandom Number Generators , 1998, FSE.

[10]  Omar Salhab,et al.  SURVEY PAPER : PSEUDO RANDOM NUMBER GENERATORS AND SECURITY TESTS , 2018 .

[11]  Juan E. Tapiador,et al.  EMAP: An Efficient Mutual-Authentication Protocol for Low-Cost RFID Tags , 2006, OTM Workshops.

[12]  Hung-Yu Chien Efficient authentication scheme with tag-identity protection for EPC Class 2 Generation 2 version 2 standards , 2017, Int. J. Distributed Sens. Networks.

[13]  Xianghua Xu,et al.  An One-way Hash Function Based Lightweight Mutual Authentication RFID Protocol , 2013, J. Comput..

[14]  Yalin Chen,et al.  An efficient RFID mutual authentication scheme based on ECC , 2011, IACR Cryptol. ePrint Arch..

[15]  Mike Burmester,et al.  The Security of EPC Gen2 Compliant RFID Protocols , 2008, ACNS.

[16]  Fumio Teraoka,et al.  Privacy protection for low-cost RFID tags in IoT systems , 2012, CFI.

[17]  David Pointcheval,et al.  Security analysis of pseudo-random number generators with input: /dev/random is not robust , 2013, CCS.

[18]  R. C. Fairfield,et al.  An LSI Random Number Generator (RNG) , 1985, CRYPTO.

[19]  DOMINGO V. ORIGINES,et al.  A Novel Pseudo-Random Number Generator Algorithm based on Entropy Source Epoch Timestamp , 2019, 2019 International Conference on Information and Communications Technology (ICOIACT).

[20]  Abdelshakour Abuzneid,et al.  Comparison and Feasibility of Various RFID Authentication Methods Using ECC , 2018, Sensors.

[21]  Gökhan Dalkiliç,et al.  An Advanced Encryption Standard Powered Mutual Authentication Protocol Based on Elliptic Curve Cryptography for RFID, Proven on WISP , 2017, J. Sensors.

[22]  Chih-Ming Hsiao,et al.  A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol , 2014, Ad Hoc Networks.

[23]  Ayad Al-Adhami,et al.  A 256 bit implementation of ECC-RFID based system using Shamir secret sharing scheme and Keccak hash function , 2017, 2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN).

[24]  Eun-Jun Yoon Improvement of the securing RFID systems conforming to EPC Class 1 Generation 2 standard , 2012, Expert Syst. Appl..

[25]  Elaine B. Barker,et al.  A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .

[26]  Sarangapani Jagannathan,et al.  EPC Gen2v2 RFID Standard Authentication and Ownership Management Protocol , 2016, IEEE Transactions on Mobile Computing.

[27]  Abu Bakar Ibrahim,et al.  Attendance System using RFID with “Drive Thru” Techniques , 2018 .

[28]  Vidyasagar Potdar,et al.  A Survey of RFID Authentication Protocols , 2008, 22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008).

[29]  Keith Martin,et al.  Ultra-lightweight Mutual Authentication Protocols: Weaknesses and Countermeasures , 2013, 2013 International Conference on Availability, Reliability and Security.

[30]  Zhiyang Li,et al.  A protocol for detecting missing target tags in RFID systems , 2019, J. Netw. Comput. Appl..

[31]  Hamid Barati,et al.  An efficient and secure RFID authentication protocol using elliptic curve cryptography , 2019, Wirel. Networks.

[32]  Chris J. Mitchell,et al.  Scalable RFID security protocols supporting tag ownership transfer , 2011, Comput. Commun..