RFID authentication scheme based on hyperelliptic curve signcryption

Ali, Usman and Idris, Mohd Yamani Idna and Ayub, Mohamad Nizam and Ullah, Insaf and Ali, Ihsan and Nandy, Tarak and Yahuza, Muktar and Khan, Nauman (2021) RFID authentication scheme based on hyperelliptic curve signcryption. IEEE Access, 9. pp. 49942-49959. ISSN 2169-3536, DOI https://doi.org/10.1109/ACCESS.2021.3069429.

Full text not available from this repository.

Abstract

The implementation of efficient security mechanisms for Radio Frequency Identification (RFID) system has always been a continuous challenge due to its limited computing resources. Previously, hash-based, symmetric-key cryptography-based and elliptic curve cryptography based security protocols were proposed for RFID system. However, these protocols are not suitable because some of them failed to fulfil the RFID security requirements, and some of them produce high computational overhead. Recently researchers have focused on developing an efficient security mechanism based on Hyper Elliptic Curve Cryptography (HECC) which provides high security with 80 bits lower-key size. In this paper, we propose an efficient RFID authentication scheme (RFID-AS) based on hyperelliptic curve Signcryption. The proposed RFID-AS provides the required security features for the RFID system as well as security from potential attacks. We validated the security of proposed RFID-AS by using formal security analysis techniques, such as the Real-Or-Random (ROR) model and Automated Validation of Internet Security Protocols and Applications (AVISPA). Furthermore, the results reveal that the computational, communication and storage overheads of the proposed RFID-AS is much less than the other recently proposed schemes. Compared to the most recently published work based on ECC Signcryption, our scheme is 70% efficient in terms of computational overhead, 42.7% efficient in terms of communication overhead, and 57.7% efficient in terms of storage overhead. Therefore, the proposed RFID-AS is more efficient as compared to the recently published work in this domain. Hence, it is an attractive solution for resource-limited devices like RFID tags.

Item Type: Article
Funders: University of Malaya Impact Oriented Interdisciplinary Research Grant [Grant No: IIRG003 (A,B,C)-19IISS], Ministry of Higher Education Malaysia Fundamental Research Grant Scheme (FRGS) [Grant No: FP055-2019A]
Uncontrolled Keywords: Radiofrequency identification; Authentication; Protocols; Cryptography; Elliptic curve cryptography; RFID tags; Memory management; Hyperelliptic curve cryptography; RFID; Authentication protocol; AVISPA
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Divisions: Faculty of Computer Science & Information Technology
Depositing User: Ms Zaharah Ramly
Date Deposited: 20 Jun 2022 07:16
Last Modified: 20 Jun 2022 07:16
URI: http://eprints.um.edu.my/id/eprint/34061

Actions (login required)

View Item View Item