Hierarchical ECC-Based RFID Authentication Protocol

被引:0
|
作者
Batina, Lejia [1 ]
Seys, Stefaan [1 ]
Singelee, Dave [1 ]
Verbanwhede, Ingrid [1 ]
机构
[1] KU Leuven ESAT SCD COSIC, B-3001 Louvain, Belgium
来源
RFID SECURITY AND PRIVACY | 2012年 / 7055卷
关键词
RFID; Authentication; ECC; Hierarchical Croups; Privacy;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
RFID (Radio Frequency identification) technology enables readers to scan remote RFID tags, and label the objects and people to which they are attached. Current cryptographic authentication protocols deployed in heterogeneous environments are often not compatible, or reveal too much information to the RPM readers. To tackle this problem, we introduce the concept of RFID groups and propose a hierarchical RFID authentication protocol. By using this protocol, an RFID tag can tune its identification process to the type of reader it is communicating with. Only a subset of readers can learn the identity of a particular tag, while others can only acquire information on the group to which the tag belongs. Our protocol offers impersonation resistance and is narrow-strong privacy-preserving. Furthermore, we extend the concept to multiple level of subgroups, and demonstrate the feasibility of our proposed protocols for RFID tags.
引用
收藏
页码:183 / 201
页数:19
相关论文
共 50 条
  • [21] ERAP: ECC based RFID Authentication Protocol
    Ahamed, Sheikh Iqbal
    Rahman, Farzana
    Hoque, Md. Endadul
    [J]. 12TH IEEE INTERNATIONAL WORKSHOP ON FUTURE TRENDS OF DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2008, : 219 - 225
  • [22] A new ECC-based wireless authentication and key agreement protocol
    Zhang, Juan
    Chen, Guanghui
    Deng, Fangmin
    [J]. FIFTH WUHAN INTERNATIONAL CONFERENCE ON E-BUSINESS, VOLS 1-3: INTEGRATION AND INNOVATION THROUGH MEASUREMENT AND MANAGEMENT, 2006, : 1219 - 1225
  • [23] A Secure ECC-Based RFID Authentication Scheme Using Hybrid Protocols
    Liao, Yi-Pin
    Hsiao, Chih-Ming
    [J]. Liao, Y.-P. (newsun87@mail.sju.edu.tw), 2013, Springer Science and Business Media Deutschland GmbH (21): : 1 - 13
  • [24] An ECC-based enhanced and secured authentication protocol for IoT and cloud server
    Chander, Bhanu
    Gopalakrishnan, Kumaravelan
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2023, 29 (04) : 407 - 425
  • [25] ECCbAP: A secure ECC-based authentication protocol for IoT edge devices
    Rostampour S.
    Safkhani M.
    Bendavid Y.
    Bagheri N.
    [J]. Pervasive and Mobile Computing, 2020, 67
  • [26] Cryptanalysis and Improvement of an ECC-Based Authentication Protocol for Wireless Sensor Networks
    Song, Taeui
    Kang, Dongwoo
    Ryu, Jihyeon
    Kim, Hyoungshick
    Won, Dongho
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS (ICCSA 2018), PT II, 2018, 10961 : 50 - 61
  • [27] Analysis and improvement of ECC-based fig.-proof protocol for RFID
    [J]. Hong-Yan, Kang (khyky@sina.com), 1600, Science and Engineering Research Support Society (09):
  • [28] An ECC-Based Authentication Protocol for Dynamic Charging System of Electric Vehicles
    Wang, Jie
    Wang, Shengbao
    Wen, Kang
    Weng, Bosen
    Zhou, Xin
    Chen, Kefei
    [J]. ELECTRONICS, 2024, 13 (06)
  • [29] Design of a mutual authentication protocol for RFID based on ECC
    Department of Computer and Information Engineering, Heze University, Heze
    Shandong
    274015, China
    不详
    Shandong
    274015, China
    [J]. Open Autom. Control Syst. J., 1 (1532-1536):
  • [30] Analysis and design of ECC-based RFID grouping-proof protocol
    Hong-Yan, Kang
    [J]. Open Automation and Control Systems Journal, 2015, 7 : 1523 - 1527