An efficient mutual authentication RFID scheme based on elliptic curve cryptography

被引:1
|
作者
Jue-Sam Chou
机构
[1] Nanhua University,Department of Information Management
来源
关键词
RFID; Location privacy; Forward privacy; Mutual authentication; Untraceable privacy; ECDLP;
D O I
暂无
中图分类号
学科分类号
摘要
Radio frequency identification (RFID) tags have been widely deployed in many applications, such as supply chain management, inventory control, and traffic card payment. However, these applications can suffer from security issues or privacy violations when the underlying data-protection techniques are not properly designed. Hence, many secure RFID authentication protocols have been proposed. According to the resource usage of the tags, secure RFID protocols are classified into four types: full-fledged, simple, lightweight, and ultra-lightweight. In general, non-full-fledged protocols are vulnerable to desynchronization, impersonation, and tracking attacks, and they also lack scalability. If the tag resources allow more flexibility, full-fledged protocols seem to be an attractive solution. In this study, we examine full-fledged RFID authentication protocols and discuss their security issues. We then design a novel RFID authentication protocol based on elliptic curve cryptography, to avoid these issues. In addition, we present a detailed security analysis and a comparison with related studies; the results show that our scheme is more resistant to a variety of attacks and that it has the best scalability, while maintaining competitive levels of efficiency.
引用
收藏
页码:75 / 94
页数:19
相关论文
共 50 条
  • [1] An efficient mutual authentication RFID scheme based on elliptic curve cryptography
    Chou, Jue-Sam
    [J]. JOURNAL OF SUPERCOMPUTING, 2014, 70 (01): : 75 - 94
  • [2] Cryptanalysis and improvement of an efficient mutual authentication RFID scheme based on elliptic curve cryptography
    Mohammad Sabzinejad Farash
    [J]. The Journal of Supercomputing, 2014, 70 : 987 - 1001
  • [3] Cryptanalysis and improvement of an efficient mutual authentication RFID scheme based on elliptic curve cryptography
    Farash, Mohammad Sabzinejad
    [J]. JOURNAL OF SUPERCOMPUTING, 2014, 70 (02): : 987 - 1001
  • [4] An Efficient RFID Authentication Scheme Based on Elliptic Curve Cryptography for Internet of Things
    Mustapha Benssalah
    Izza Sarah
    Karim Drouiche
    [J]. Wireless Personal Communications, 2021, 117 : 2513 - 2539
  • [5] An Efficient RFID Authentication Scheme Based on Elliptic Curve Cryptography for Internet of Things
    Benssalah, Mustapha
    Sarah, Izza
    Drouiche, Karim
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2021, 117 (03) : 2513 - 2539
  • [6] Secure Mutual Authentication Protocol for RFID Based on Elliptic Curve Cryptography
    Alamr, Amjad Ali
    Kausar, Firdous
    Kim, Jong Sung
    [J]. 2016 INTERNATIONAL CONFERENCE ON PLATFORM TECHNOLOGY AND SERVICE (PLATCON), 2016,
  • [7] Elliptic curve cryptography based mutual authentication scheme for session initiation protocol
    R. Arshad
    N. Ikram
    [J]. Multimedia Tools and Applications, 2013, 66 : 165 - 178
  • [8] Elliptic curve cryptography based mutual authentication scheme for session initiation protocol
    Arshad, R.
    Ikram, N.
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2013, 66 (02) : 165 - 178
  • [9] An Elliptic Curve-based Mutual Authentication Scheme for RFID Implant Systems
    Moosavi, Sanaz Rahimi
    Nigussie, Ethiopia
    Virtanen, Seppo
    Isoaho, Jouni
    [J]. 5TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT-2014), THE 4TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2014), 2014, 32 : 198 - 206
  • [10] An Advanced Elliptic Curve Cryptography based Mutual Authentication Scheme for Session Initiation Protocol
    Lu, Yanrong
    Li, Lixiang
    Peng, Haipeng
    Yang, Yixian
    [J]. INFORMATION TECHNOLOGY AND CONTROL, 2016, 45 (04): : 393 - 400