Survey: Vulnerability Analysis of Low-Cost ECC-Based RFID Protocols against Wireless and Side-Channel Attacks.

Autor: Gabsi S; Electronic and Micro-Electronic Laboratory, Faculty of Sciences of Monastir, University of Monastir, Monastir 5019, Tunisia., Beroulle V; LCIS Laboratory, Grenoble INP, University Grenoble Alpes, 26000 Valence, France., Kieffer Y; LCIS Laboratory, Grenoble INP, University Grenoble Alpes, 26000 Valence, France., Dao HM; LCIS Laboratory, Grenoble INP, University Grenoble Alpes, 26000 Valence, France., Kortli Y; Electronic and Micro-Electronic Laboratory, Faculty of Sciences of Monastir, University of Monastir, Monastir 5019, Tunisia., Hamdi B; Electronic and Micro-Electronic Laboratory, Faculty of Sciences of Monastir, University of Monastir, Monastir 5019, Tunisia.
Jazyk: angličtina
Zdroj: Sensors (Basel, Switzerland) [Sensors (Basel)] 2021 Aug 30; Vol. 21 (17). Date of Electronic Publication: 2021 Aug 30.
DOI: 10.3390/s21175824
Abstrakt: The radio frequency identification (RFID) system is one of the most important technologies of the Internet of Things (IoT) that tracks single or multiple objects. This technology is extensively used and attracts the attention of many researchers in various fields, including healthcare, supply chains, logistics, asset tracking, and so on. To reach the required security and confidentiality requirements for data transfer, elliptic curve cryptography (ECC) is a powerful solution, which ensures a tag/reader mutual authentication and guarantees data integrity. In this paper, we first review the most relevant ECC-based RFID authentication protocols, focusing on their security analysis and operational performances. We compare the various lightweight ECC primitive implementations designed for RFID applications in terms of occupied area and power consumption. Then, we highlight the security threats that can be encountered considering both network attacks and side-channel attacks and analyze the security effectiveness of RFID authentication protocols against such types of attacks. For this purpose, we classify the different threats that can target an ECC-based RFID system. After that, we present the most promising ECC-based protocols released during 2014-2021 by underlining their advantages and disadvantages. Finally, we perform a comparative study between the different protocols mentioned regarding network and side-channel attacks, as well as their implementation costs to find the optimal one to use in future works.
Databáze: MEDLINE