A secure ECC-based mobile RFID mutual authentication protocol and its application

被引:6
|
作者
Chiou, Shin-Yan [1 ]
Ko, Wen-Tsai [1 ]
Lu, Erl-Huei [1 ]
机构
[1] Department of Electrical Engineering, Chang Gung University, 259, Wen-Hwa 1st Road, Kwei-Shan, Tao-Yuan, Taiwan
来源
关键词
Cryptography; -; Authentication;
D O I
10.6633/IJNS.2018xx.20(2).21
中图分类号
学科分类号
摘要
Mobile RFID applications combine RFID technologies and mobile device to create a new convenient application area. However, most of the applications suffer from the security issues due to insecure communication channels among tags, readers and servers. In 2012, Zhou et al. proposed an ECC-based mutual authentication protocol to promote mobile RFID applications security. However, we found their protocol faces to OTRUTS (one time reading and unlimited times service) problem, which means once a reader read the data of a certain tags from a server successfully, the reader can read it unlimited times without reading those tags again. Therefore, their protocol cannot securely support some mobile RFID applications such as the security patrolling application. In this paper, we propose a new secure ECC-based mobile RFID mutual authentication protocol for the safety of mobile RFID applications such as security patrolling.
引用
收藏
页码:396 / 402
相关论文
共 50 条
  • [31] Mutual authentication protocol for mobile RFID systems
    Zhou, Jingxian
    Zhou, Yajian
    Xiao, Feng
    Niu, Xinxin
    [J]. Journal of Computational Information Systems, 2012, 8 (08): : 3261 - 3268
  • [32] Secure Mutual Authentication Protocol for RFID Based on Elliptic Curve Cryptography
    Alamr, Amjad Ali
    Kausar, Firdous
    Kim, Jong Sung
    [J]. 2016 INTERNATIONAL CONFERENCE ON PLATFORM TECHNOLOGY AND SERVICE (PLATCON), 2016,
  • [33] A Robust ECC-Based Provable Secure Authentication Protocol With Privacy Preserving for Industrial Internet of Things
    Li, Xiong
    Niu, Jianwei
    Bhuiyan, Md Zakirul Alam
    Wu, Fan
    Karuppiah, Marimuthu
    Kumari, Saru
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (08) : 3599 - 3609
  • [34] An Effective Ultralightweight RFID Secure Protocol with Mutual Authentication
    Jia, Qingxuan
    Wang, Xin
    Gao, Xin
    Gao, Panpan
    Zhao, Bing
    [J]. ADVANCES IN MECHATRONICS AND CONTROL ENGINEERING, PTS 1-3, 2013, 278-280 : 1966 - +
  • [35] ERAP: ECC based RFID Authentication Protocol
    Ahamed, Sheikh Iqbal
    Rahman, Farzana
    Hoque, Md. Endadul
    [J]. 12TH IEEE INTERNATIONAL WORKSHOP ON FUTURE TRENDS OF DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2008, : 219 - 225
  • [36] On the Security of an ECC Based RFID Authentication Protocol
    Babaheidarian, Parisa
    Delavar, Mahshid
    Mohajeri, Javad
    [J]. 2012 9TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2012, : 111 - 114
  • [37] A new ECC-based wireless authentication and key agreement protocol
    Zhang, Juan
    Chen, Guanghui
    Deng, Fangmin
    [J]. FIFTH WUHAN INTERNATIONAL CONFERENCE ON E-BUSINESS, VOLS 1-3: INTEGRATION AND INNOVATION THROUGH MEASUREMENT AND MANAGEMENT, 2006, : 1219 - 1225
  • [38] RFID System Mutual Authentication Protocols Based on ECC
    Feng, Li
    Yao, Xuanxia
    [J]. IEEE 12TH INT CONF UBIQUITOUS INTELLIGENCE & COMP/IEEE 12TH INT CONF ADV & TRUSTED COMP/IEEE 15TH INT CONF SCALABLE COMP & COMMUN/IEEE INT CONF CLOUD & BIG DATA COMP/IEEE INT CONF INTERNET PEOPLE AND ASSOCIATED SYMPOSIA/WORKSHOPS, 2015, : 1644 - 1649
  • [39] A Lightweight ECC-based Three-Factor Mutual Authentication and Key Agreement Protocol for WSNs in IoT
    Fariss, Meriam
    El Gafif, Hassan
    Toumanari, Ahmed
    [J]. International Journal of Advanced Computer Science and Applications, 2022, 13 (06): : 491 - 501
  • [40] ECC-based Secure and Provable Authentication Mechanism for Smart Healthcare Ecosystem
    Garg, Sahil
    Kaur, Kuljeet
    Kaddoum, Georges
    Chen, Min
    [J]. ICC 2020 - 2020 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2020,