ECC-Based RFID Authentication Protocol

被引:0
|
作者
Xing-Chun Yang [1 ,2 ]
Chun-Xiang Xu [2 ]
Chao-Rong Li [3 ]
机构
[1] Department of Computer Science and Technology, Sichuan Police College
[2] School of Computer Science and Engineering, University of Electronic Science and Technology of China
[3] Department of Computer Science and Information Engineering,Yibin University
基金
中国国家自然科学基金; 中国博士后科学基金;
关键词
D O I
暂无
中图分类号
TP391.44 []; TN918.4 [密码的加密与解密];
学科分类号
0811 ; 081101 ; 081104 ; 0839 ; 1402 ; 1405 ;
摘要
The radio frequency identification(RFID) technology has been widely used so far in industrial and commercial applications. To develop the RFID tags that support elliptic curve cryptography(ECC), we propose a scalable and mutual authentication protocol based on ECC. We also suggest a tag privacy model that provides adversaries exhibiting strong abilities to attack a tag’s privacy. We prove that the proposed protocol preserves privacy under the privacy model and that it meets general security requirements. Compared with other recent ECCbased RFID authentication protocols, our protocol provides tag privacy and performs the best under comprehensive evaluation of tag privacy, tag computation cost, and communications cost.
引用
收藏
页码:320 / 329
页数:10
相关论文
共 50 条
  • [1] ECC-Based RFID Authentication Protocol
    Yang X.-C.
    Xu C.-X.
    Li C.-R.
    [J]. Journal of Electronic Science and Technology, 2020, 18 (04) : 320 - 329
  • [2] Hierarchical ECC-Based RFID Authentication Protocol
    Batina, Lejia
    Seys, Stefaan
    Singelee, Dave
    Verbanwhede, Ingrid
    [J]. RFID SECURITY AND PRIVACY, 2012, 7055 : 183 - 201
  • [3] A Novel ECC-based RFID Authentication Protocol
    Fang Mingwei
    Wu Junjun
    Zhang Xinfang
    Chen Hong
    [J]. ADVANCED MATERIALS AND COMPUTER SCIENCE, PTS 1-3, 2011, 474-476 : 1764 - +
  • [4] Hierarchical ECC-Based RFID Authentication Protocol
    Batina, Lejla
    Seys, Stefaan
    Singelee, Dave
    Verbauwhede, Ingrid
    [J]. RFID: SECURITY AND PRIVACY: 7TH INTERNATIONALWORKSHOP, RFIDSEC 2011, 2012, 7055 : 183 - 201
  • [5] A Highly Efficient ECC-Based Authentication Protocol for RFID
    Alaoui, Hasnae Lamrani
    El Ghazi, Abdellatif
    Zbakh, Mustapha
    Touhafi, Abdellah
    Braeken, An
    [J]. JOURNAL OF SENSORS, 2021, 2021
  • [6] ECC-based RFID/NFC Mutual Authentication Protocol
    Huo, Weiguang
    Dong, Qingkuan
    Chen, Yuan
    [J]. PROCEEDINGS OF THE 2015 2ND INTERNATIONAL WORKSHOP ON MATERIALS ENGINEERING AND COMPUTER SCIENCES (IWMECS 2015), 2015, 33 : 169 - 177
  • [7] A secure ECC-based RFID mutual authentication protocol for internet of things
    Amjad Ali Alamr
    Firdous Kausar
    Jongsung Kim
    Changho Seo
    [J]. The Journal of Supercomputing, 2018, 74 : 4281 - 4294
  • [8] A secure ECC-based RFID mutual authentication protocol for internet of things
    Alamr, Amjad Ali
    Kausar, Firdous
    Kim, Jongsung
    Seo, Changho
    [J]. JOURNAL OF SUPERCOMPUTING, 2018, 74 (09): : 4281 - 4294
  • [9] New ECC-Based IoT Authentication Protocol for Securing RFID Systems
    Timouhin H.
    Amounas F.
    Azrour M.
    [J]. SN Computer Science, 4 (6)
  • [10] Vulnerabilities of an ECC-based RFID authentication scheme
    Li, Nan
    Mu, Yi
    Susilo, Willy
    Guo, Fuchun
    Varadharajan, Vijay
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (17) : 3262 - 3270