Analysis and improvement of ECC-based fig.-proof protocol for RFID

被引:0
|
作者
机构
[1] [1,Hong-Yan, Kang
来源
Hong-Yan, Kang (khyky@sina.com) | 1600年 / Science and Engineering Research Support Society卷 / 09期
关键词
Public key cryptography;
D O I
10.14257/ijca.2016.9.7.32
中图分类号
学科分类号
摘要
RFID grouping-proof protocols draw high attention as RFID technology is being widely applied. This paper proposes an improved ECC-based grouping-proof protocol on the basis of studying the grouping-proof protocol proposed by Batina et al. to solve the problems of existing grouping-proof protocols, such as low grouping-proof efficiency and being vulnerable to impersonation attacks, tracking attacks, and other security threats. First of all, this paper proved that the protocol by Batina et al. is vulnerable to impersonation attacks and tracking attacks. Secondly, the proposed improved grouping-proof protocol was described and analyzed. Malicious query of tags has been prevented because a new function of reader verification by tags is added to the existing protocols. Finally, the security performance of the proposed protocol was proved and a comparison with the protocols proposed in the references was made. As the theoretical analysis and comparison reveal, the scheme, with a significantly enhanced security and performance compared with similar schemes, meets the requirements for security and privacy. © 2016 SERSC.
引用
收藏
相关论文
共 50 条
  • [1] Analysis and design of ECC-based RFID grouping-proof protocol
    Hong-Yan, Kang
    Open Automation and Control Systems Journal, 2015, 7 : 1523 - 1527
  • [2] ECC-Based RFID Authentication Protocol
    Yang X.-C.
    Xu C.-X.
    Li C.-R.
    Journal of Electronic Science and Technology, 2020, 18 (04) : 320 - 329
  • [3] ECC-Based RFID Authentication Protocol
    Xing-Chun Yang
    Chun-Xiang Xu
    Chao-Rong Li
    Journal of Electronic Science and Technology, 2020, 18 (04) : 320 - 329
  • [4] Hierarchical ECC-Based RFID Authentication Protocol
    Batina, Lejia
    Seys, Stefaan
    Singelee, Dave
    Verbanwhede, Ingrid
    RFID SECURITY AND PRIVACY, 2012, 7055 : 183 - 201
  • [5] A Novel ECC-based RFID Authentication Protocol
    Fang Mingwei
    Wu Junjun
    Zhang Xinfang
    Chen Hong
    ADVANCED MATERIALS AND COMPUTER SCIENCE, PTS 1-3, 2011, 474-476 : 1764 - +
  • [6] Hierarchical ECC-Based RFID Authentication Protocol
    Batina, Lejla
    Seys, Stefaan
    Singelee, Dave
    Verbauwhede, Ingrid
    RFID: SECURITY AND PRIVACY: 7TH INTERNATIONALWORKSHOP, RFIDSEC 2011, 2012, 7055 : 183 - 201
  • [7] A Highly Efficient ECC-Based Authentication Protocol for RFID
    Alaoui, Hasnae Lamrani
    El Ghazi, Abdellatif
    Zbakh, Mustapha
    Touhafi, Abdellah
    Braeken, An
    JOURNAL OF SENSORS, 2021, 2021
  • [8] ECC-based RFID/NFC Mutual Authentication Protocol
    Huo, Weiguang
    Dong, Qingkuan
    Chen, Yuan
    PROCEEDINGS OF THE 2015 2ND INTERNATIONAL WORKSHOP ON MATERIALS ENGINEERING AND COMPUTER SCIENCES (IWMECS 2015), 2015, 33 : 169 - 177
  • [9] ECC-Based Grouping-Proof RFID for Inpatient Medication Safety
    Qiping Lin
    Fangguo Zhang
    Journal of Medical Systems, 2012, 36 : 3527 - 3531
  • [10] ECC-Based Grouping-Proof RFID for Inpatient Medication Safety
    Lin, Qiping
    Zhang, Fangguo
    JOURNAL OF MEDICAL SYSTEMS, 2012, 36 (06) : 3527 - 3531