
Existing ECC-based RFID authentication protocols exhibit vulnerabilities to various attacks. A new ECCbased authentication protocol is proposed to address these issues, ensuring mutual authentication, confidentiality, and resistance to SCA. The proposed protocol minimizes computational time and enhances privacy features without additional calculations. Security and privacy comparisons with existing schemes show the improved protocol’s effectiveness in mitigating threats. The study emphasizes practical implementation and detailed security analysis, highlighting the protocol’s efficiency and security enhancements. Further, it discusses emerging security solutions, including encryption algorithms, secure key exchange protocols, and anomaly detection techniques, t o mitigate potential risks and enhance the overall security posture of IoT and RFID systems. By understanding and addressing these security concerns, organizations and individuals can fully leverage the transformative power of IoT and RFID technologies while safeguarding sensitive data and ensuring the integrity and reliability of interconnected systems. ARTICLE HISTORY Received 1 September 2024 Accepted 4 April 2025 KEYWORDS Internet of things; ECC; RFID; side channel attack; authentication method; AVISPA tool 1. Introduction The Internet of Things (IoT) refers to a connected network of physical objects, devices, and sensors capable of gathering, transmitting, and exchanging data through the Internet. The
Download PDF: https://edgard.eu.org/4S5a7D