Table of Contents Author Guidelines Submit a Manuscript
Journal of Sensors
Volume 2017, Article ID 2367312, 10 pages
https://doi.org/10.1155/2017/2367312
Research Article

An Advanced Encryption Standard Powered Mutual Authentication Protocol Based on Elliptic Curve Cryptography for RFID, Proven on WISP

Computer Engineering Department, Dokuz Eylul University, 35160 Izmir, Turkey

Correspondence should be addressed to Alaauldin Ibrahim; moc.liamg@niddalatelved

Received 8 February 2017; Revised 29 June 2017; Accepted 26 July 2017; Published 31 August 2017

Academic Editor: Eduard Llobet

Copyright © 2017 Alaauldin Ibrahim and Gökhan Dalkılıç. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. Y. K. Hung, “The study of adopting RFID technology in medical institute with the perspectives of cost benefit,” in Proceedings of the International Medical Informatics Symposium in Taiwan, 2007.
  2. P. Najera, J. Lopez, and R. Roman, “Real-time location and inpatient care systems based on passive RFID,” Journal of Network and Computer Applications, vol. 34, no. 3, pp. 980–989, 2011. View at Publisher · View at Google Scholar · View at Scopus
  3. J. E. Katz and R. E. Rice, “Public views of mobile medical devices and services: A US national survey of consumer sentiments towards RFID healthcare technology,” International Journal of Medical Informatics, vol. 78, no. 2, pp. 104–114, 2009. View at Publisher · View at Google Scholar · View at Scopus
  4. C. Yu, C. Chen, P. Liao, and Y. Lee, “RFID-based operation room and medicare system for patient safety enhancementa case study of keelung branch,” J Inf Manag, vol. 15, pp. 97–122, 2008. View at Google Scholar
  5. J. G. Leu, The benefit analysis of RFID use in the health management centerThe experience in, Shin Kong Wu Ho-Su Memorial Hospital. National Taiwan University, 2010.
  6. http://www.fda.gov/MedicalDevices/.
  7. Blood bags with RFID chips (2010 picturesphotonews/2010/pn201005.php. Accessed, vol. 23, com/press/en/presspicture/, 2015, http://www.siemens.
  8. WISP5 Wiki, “Welcome to the WISP 5 Wiki!,” http://wisp5.wikispaces.com/WISP+Home, 2015.
  9. T. Instruments, “MSP430FR59xx Mixed Signal Microcontroller Datasheet,” Accessed, vol. 08, 2015, http://www.ti.com/lit/ds/slas704e/slas704e.pdf. View at Google Scholar
  10. I. F. Blake, G. Seroussi, and N. P. Smart, Elliptic curves in cryptography, vol. 265 of London Mathematical Society Lecture Note Series, Cambridge University Press, Cambridge, 2000. View at MathSciNet
  11. H. Tipton and M. KrauseBoca Raton, Information Security Management Handbook, Four Volume Set, Auerbach Publications, 2000. View at Publisher · View at Google Scholar
  12. P. Tuyls and L. Batina, “R{FID}-tags for anti-counterfeiting,” in Topics in cryptology---{CT}-{RSA} 2006, vol. 3860 of Lecture Notes in Comput. Sci., pp. 115–131, Springer, Berlin, 2006. View at Publisher · View at Google Scholar · View at MathSciNet
  13. Y. Lee, L. Batina, and I. Verbauwhede, “EC-RAC (ECDLP based randomized access control): provably secure RFID authentication protocol,” in Proceedings of the IEEE International Conference on RFID, pp. 97–104, Las Vegas, Nev, USA, April 2008. View at Publisher · View at Google Scholar
  14. L. Batina, J. Guajardo, T. Kerins, N. Mentens, P. Tuyls, and I. Verbauwhede, “Public-key cryptography for RFID-tags,” in Proceedings of the 5th Annual IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2007, pp. 217–222, March 2007. View at Publisher · View at Google Scholar · View at Scopus
  15. T. Van Deursen and S. Radomirovic, Attacks on RFID Protocols, IACR Cryptology ePrint Archive, 2009.
  16. J. Bringer, H. Chabanne, and T. Icart, “Cryptanalysis of EC-RAC, a RFID identification protocol,” in Cryptology and Network Security: 7th International Conference, CANS 2008, Hong-Kong, China, December 2–4, 2008. Proceedings, vol. 5339 of Lecture Notes in Computer Science, pp. 149–161, Springer, Berlin, Germany, 2008. View at Publisher · View at Google Scholar
  17. Y. K. Lee, L. Batina, D. Singelee, B. Preneel, and I. Verbauwhede, “Anti-counterfeiting, Untraceability and Other Security Challenges for RFID Systems: Public-Key-Based Protocols and Hardware,” in Towards Hardware-Intrinsic Security, Information Security and Cryptography, pp. 237–257, Springer Berlin Heidelberg, Berlin, Germany, 2010. View at Publisher · View at Google Scholar
  18. X. Zhang, L. Li, Y. Wu, and Q. Zhang, “An ECDLP-based randomized key RFID authentication protocol,” in Proceedings of the 2011 International Conference on Network Computing and Information Security, NCIS 2011, pp. 146–149, May 2011. View at Publisher · View at Google Scholar · View at Scopus
  19. Y.-P. Liao and C.-M. Hsiao, “A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol,” Ad Hoc Networks, vol. 18, pp. 133–146, 2014. View at Publisher · View at Google Scholar · View at Scopus
  20. S. R. Moosavi, E. Nigussie, S. Virtanen, and J. Isoaho, “An elliptic curve-based mutual authentication scheme for RFID implant systems,” Procedia Computer Science, vol. 32, pp. 198–206, 2014. View at Publisher · View at Google Scholar
  21. D. He, N. Kumar, and N. Chilamkurti, “Lightweight ECC based RFID authentication integrated with an ID verifier transfer protocol,” Journal of Medical Systems, vol. 38, article 116, 2014. View at Publisher · View at Google Scholar
  22. Z. Zhao, “A secure RFID authentication protocol for healthcare environments using elliptic curve cryptosystem,” Journal of Medical Systems, vol. 38, no. 5, pp. 1–7, 2014. View at Publisher · View at Google Scholar · View at Scopus
  23. J.-S. Chou, “An efficient mutual authentication RFID scheme based on elliptic curve cryptography,” Journal of Supercomputing, vol. 70, no. 1, pp. 75–94, 2014. View at Publisher · View at Google Scholar · View at Scopus
  24. Z. Zhang and Q. Qi, “An efficient RFID authentication protocol to enhance patient medication safety using elliptic curve cryptography,” Journal of Medical Systems, vol. 38, no. 5, pp. 1–7, 2014. View at Publisher · View at Google Scholar · View at Scopus
  25. C. Jin, C. Xu, X. Zhang, and J. Zhao, “A secure RFID mutual authentication protocol for healthcare environments using elliptic curve cryptography,” Journal of Medical Systems, vol. 39, no. 3, pp. 1–8, 2015. View at Publisher · View at Google Scholar · View at Scopus
  26. C. Lee and H. Chien, “An Elliptic Curve Cryptography-Based RFID Authentication Securing E-Health System,” International Journal of Distributed Sensor Networks, vol. 11, no. 12, p. 642425, 2015. View at Publisher · View at Google Scholar
  27. M. S. Farash, O. Nawaz, K. Mahmood, S. A. Chaudhry, and M. K. Khan, “A Provably Secure RFID Authentication Protocol Based on Elliptic Curve for Healthcare Environments,” Journal of Medical Systems, vol. 40, no. 7, article no. 165, 2016. View at Publisher · View at Google Scholar · View at Scopus
  28. M. Benssalah, M. Djeddou, and K. Drouiche, “A provably secure RFID authentication protocol based on elliptic curve signature with message recovery suitable for m-Health environments,” Transactions on Emerging Telecommunications Technologies, p. e3166, 2017. View at Publisher · View at Google Scholar
  29. M. Li, S. Yu, J. D. Guttman, W. Lou, and K. Ren, “Secure ad hoc trust initialization and key management in wireless body area networks,” ACM Transactions on Sensor Networks, vol. 9, no. 2, article no. 18, 2013. View at Publisher · View at Google Scholar · View at Scopus
  30. J. Liu, Z. Zhang, X. Chen, and K. S. Kwak, “Certificateless remote anonymous authentication schemes for wireless body area networks,” IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 2, pp. 332–342, 2014. View at Publisher · View at Google Scholar · View at Scopus
  31. Z. Zhao, “An efficient anonymous authentication scheme for wireless body area networks using elliptic curve cryptosystem,” Journal of Medical Systems, vol. 38, article 13, 7 pages, 2014. View at Publisher · View at Google Scholar · View at Scopus
  32. H. Xiong, “Cost-effective scalable and anonymous certificateless remote authentication protocol,” IEEE Transactions on Information Forensics and Security, vol. 9, no. 12, pp. 2327–2339, 2014. View at Publisher · View at Google Scholar
  33. D. He and S. Zeadally, “Authentication protocol for an ambient assisted living system,” IEEE Communications Magazine, vol. 53, no. 1, pp. 71–77, 2015. View at Publisher · View at Google Scholar · View at Scopus
  34. D. He, S. Zeadally, N. Kumar, and J.-H. Lee, “Anonymous authentication for wireless body area networks with provable security,” IEEE Systems Journal, 2016. View at Publisher · View at Google Scholar · View at Scopus
  35. J. W. Liu, L. Zhang, and R. Sun, “1-RAAP: An efficient 1-round anonymous authentication protocol for wireless body area networks,” Sensors (Switzerland), vol. 16, no. 5, article no. 728, 2016. View at Publisher · View at Google Scholar · View at Scopus
  36. X. Li, J. Peng, S. Kumari, F. Wu, M. Karuppiah, and K. Raymond Choo, “An enhanced 1-round authentication protocol for wireless body area networks with user anonymity,” Computers & Electrical Engineering, 2017. View at Publisher · View at Google Scholar
  37. X. Li, M. H. Ibrahim, S. Kumari, A. K. Sangaiah, V. Gupta, and K. R. Choo, “Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks,” Computer Networks, 2017. View at Publisher · View at Google Scholar
  38. A. Liu and P. Ning, “TinyECC: a configurable library for elliptic curve cryptography in wireless sensor networks,” in Proceedings of the 7th International Conference on Information Processing in Sensor Networks (IPSN '08), pp. 245–256, St. Louis, Mo, USA, April 2008. View at Publisher · View at Google Scholar · View at Scopus
  39. D. Hankerson, S. Vanstone, and A. J. Menezes, Guide to Elliptic Curve Cryptography, Springer, New York, NY, USA, 2004. View at MathSciNet
  40. M. Rivain, “Fast and Regular Algorithms for Scalar Multiplication over Elliptic Curves,” in Rivain M (2011) Fast and Regular Algorithms for Scalar Multiplication over Elliptic Curves. IACR Cryptology ePrint Archive, p. 338, IACR Cryptology ePrint Archive, 2011. View at Google Scholar
  41. D. Brown, “SEC 2: Recommended Elliptic Curve Domain Parameters,” Certicom Research. Accessed, vol. 8, 2010, http://www.secg.org/SEC2-Ver-1.0.pdf. View at Google Scholar
  42. X. Cao, W. Kou, and X. Du, “A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges,” Information Sciences. An International Journal, vol. 180, no. 15, pp. 2895–2903, 2010. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  43. L. Marin, A. Jara, and A. Skarmeta Gomez, “Shifting primes: Optimizing elliptic curve cryptography for 16-bit devices without hardware multiplier,” Mathematical and Computer Modelling, vol. 58, no. 5-6, pp. 1155–1174, 2013. View at Publisher · View at Google Scholar · View at Scopus
  44. L. Marin, A. J. Jara, and A. F. G. Skarmeta, “Shifting primes: Extension of pseudo-mersenne primes to optimize ECC for MSP430-based future internet of things devices,” Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 6908, pp. 205–219, 2011. View at Publisher · View at Google Scholar · View at Scopus
  45. Moore, “Moore’s Law,” http://www.mooreslaw.org/, 2017.