A Secured RFID Lightweight Authentication Protocol based on Elliptic Curve Cryptography using modified PRNG Algorithm

被引:0
|
作者
Origines, Domingo V., Jr. [1 ]
Sison, Ariel M. [2 ]
Medina, Ruji P. [1 ]
机构
[1] Technol Inst Philippines, Grad Sch, Quezon City, Philippines
[2] Emilio Aguinaldo Coll, Manila, Philippines
关键词
Elliptic Curve Cryptography; Pseudo-Random Number Generator; Linear Congruential Generator; RFID; MUTUAL-AUTHENTICATION; SCHEME;
D O I
10.1145/3366650.3366664
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, the goal is to enhance the lightweight Authentication Protocol using Epoch Timestamp as Seed for PRNG Protocol based on Elliptic Curve Cryptography. The proposed enhancement uses PRNG Algorithm where randomness is generated using real-time system clock converted into running epoch timestamp as Seed for PRNG on LCG Algorithm that will do Bootstrap Iteration in generating a Random Number as keys for ECC Mutual Authentication Protocol. The result shows that the enhanced ECC Protocol utilizes smaller storage requirements of 2560bits + 640w bits, communication cost of 1,120bits faster response time and throughput, and lesser computational cost of 207ms for the Tag and the Server was achieved compared to Zheng Protocol. Also, the performance of this proposed Protocol has many advantages in terms of confidentiality, mutual authentication, availability, forward security, anonymity, spoofing/cloning, scalability and so on, which can resist tracking attacks, denial of service attacks, and system internal attack. It is therefore suggested that some practical applications using a RFID system that requires security for the lightweight authentication protocol should be introduced and more appropriate.
引用
收藏
页码:73 / 80
页数:8
相关论文
共 50 条
  • [21] A secure user authentication protocol using elliptic curve cryptography
    Kumari, Adesh
    Abbasi, M. Yahya
    Kumar, Vinod
    Khan, Akber Ali
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2019, 22 (04): : 521 - 530
  • [22] A Roaming Authentication Protocol based on Elliptic Curve Cryptography in IOV
    Shen Cen
    Mu Haibing
    PROCEEDINGS OF 2017 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2017, : 400 - 404
  • [23] Efficient RFID Authentication Using Elliptic Curve Cryptography for the Internet of Things
    Shen, Han
    Shen, Jian
    Khan, Muhammad Khurram
    Lee, Jong-Hyouk
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 96 (04) : 5253 - 5266
  • [24] Efficient RFID Authentication Using Elliptic Curve Cryptography for the Internet of Things
    Han Shen
    Jian Shen
    Muhammad Khurram Khan
    Jong-Hyouk Lee
    Wireless Personal Communications, 2017, 96 : 5253 - 5266
  • [25] An efficient mutual authentication RFID scheme based on elliptic curve cryptography
    Chou, Jue-Sam
    JOURNAL OF SUPERCOMPUTING, 2014, 70 (01): : 75 - 94
  • [26] An efficient mutual authentication RFID scheme based on elliptic curve cryptography
    Jue-Sam Chou
    The Journal of Supercomputing, 2014, 70 : 75 - 94
  • [27] A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
    Yeh, Hsiu-Lien
    Chen, Tien-Ho
    Liu, Pin-Chuan
    Kim, Tai-Hoo
    Wei, Hsin-Wen
    SENSORS, 2011, 11 (05) : 4767 - 4779
  • [28] Robust smart card secured authentication scheme on SIP using Elliptic Curve Cryptography
    Yeh, Hsiu-Lien
    Chen, Tien-Ho
    Shih, Wei-Kuan
    COMPUTER STANDARDS & INTERFACES, 2014, 36 (02) : 397 - 402
  • [29] A Mutual Authentication Protocol for IoT Devices using Elliptic Curve Cryptography
    Tewari, Aakanksha
    Gupta, B. B.
    PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE CONFLUENCE 2018 ON CLOUD COMPUTING, DATA SCIENCE AND ENGINEERING, 2018, : 716 - 720
  • [30] An Asymmetric Authentication Protocol for Mobile Devices Using Elliptic Curve Cryptography
    Ganesan, S. Prasanna
    2ND IEEE INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER CONTROL (ICACC 2010), VOL. 4, 2010, : 107 - 109