An Improved Secure RFID Authentication Protocol Using Elliptic Curve Cryptography

被引:0
|
作者
Liu, Wan-Rong [1 ]
Ji, Zhi-Yong [1 ]
Chu, Cheng-Chen [1 ]
机构
[1] Shanghai Sixth People’s Hospital, Affiliated to Shanghai Jiao Tong University School of Medicine, Shanghai,201306, China
关键词
Automation - Geometry - Internet of things - Public key cryptography - Radio frequency identification (RFID) - Radio waves;
D O I
10.6633/IJNS.202401_26(1).14
中图分类号
学科分类号
摘要
Radio-frequency identification technology is one of the critical technologies of the Internet of Things. It is a non-contact automatic identification technology. People tend only to pay attention to the accelerated development of its technology and ignore the security problems of the technology; radio-frequency identification technology development is no exception. Its security problems are becoming increasingly prominent. Because the radiofrequency identification system in the Internet of Things carries a large amount of user privacy information, its security problem will directly restrict the promotion and application of the Internet of Things. Therefore, the research of radio-frequency identification security authentication technology is significant to the healthy development of the Internet of Things. We propose an improved secure RFID authentication protocol using elliptic curve cryptography based on Izza et al.’s protocol. BAN logic is used to prove the improved protocol. Meanwhile, we carry out a comparative analysis of performance and efficiency. The results show that the improved protocol has higher security and lower calculation costs. © (2024) All Rights Reserved.
引用
收藏
页码:106 / 115
相关论文
共 50 条
  • [31] An Improved Three-Factor Remote User Authentication Protocol Using Elliptic Curve Cryptography
    Liu, Wan-Rong
    Li, Bin
    Ji, Zhi-Yong
    International Journal of Network Security, 2022, 24 (03) : 521 - 532
  • [32] A Mutual Authentication Protocol for IoT Devices using Elliptic Curve Cryptography
    Tewari, Aakanksha
    Gupta, B. B.
    PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE CONFLUENCE 2018 ON CLOUD COMPUTING, DATA SCIENCE AND ENGINEERING, 2018, : 716 - 720
  • [33] An Asymmetric Authentication Protocol for Mobile Devices Using Elliptic Curve Cryptography
    Ganesan, S. Prasanna
    2ND IEEE INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER CONTROL (ICACC 2010), VOL. 4, 2010, : 107 - 109
  • [34] Elliptic curve cryptography based wireless authentication protocol
    Yongliang, Liu
    Gao, Wen
    Yao, Hongxun
    Yu, Xinghua
    International Journal of Network Security, 2007, 5 (03) : 327 - 337
  • [35] Deniable authentication protocol based on elliptic curve cryptography
    Hwang, MS
    Sung, PC
    Tzeng, SF
    7TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL II, PROCEEDINGS: COMPUTER SCIENCE AND ENGINEERING, 2003, : 65 - 67
  • [36] An Improved Remote User Authentication Scheme Using Elliptic Curve Cryptography
    Chaudhry, Shehzad Ashraf
    Naqvi, Husnain
    Mahmood, Khalid
    Ahmad, Hafiz Farooq
    Khan, Muhammad Khurram
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 96 (04) : 5355 - 5373
  • [37] Design of a secure anonymity-preserving authentication scheme for session initiation protocol using elliptic curve cryptography
    Kumari, Saru
    Karuppiah, Marimuthu
    Das, Ashok Kumar
    Li, Xiong
    Wu, Fan
    Gupta, Vidushi
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2018, 9 (03) : 643 - 653
  • [38] A Secure and Robust Smartcard-Based Authentication Scheme for Session Initiation Protocol Using Elliptic Curve Cryptography
    Dheerendra Mishra
    Ashok Kumar Das
    Sourav Mukhopadhyay
    Mohammad Wazid
    Wireless Personal Communications, 2016, 91 : 1361 - 1391
  • [39] A Secure Two-Factor Mutual Authentication and Session Key Agreement Protocol using Elliptic Curve Cryptography
    Chandrakar, Preeti
    Om, Hari
    2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER GRAPHICS, VISION AND INFORMATION SECURITY (CGVIS), 2015, : 175 - 180
  • [40] A Secure and Robust Smartcard-Based Authentication Scheme for Session Initiation Protocol Using Elliptic Curve Cryptography
    Mishra, Dheerendra
    Das, Ashok Kumar
    Mukhopadhyay, Sourav
    Wazid, Mohammad
    WIRELESS PERSONAL COMMUNICATIONS, 2016, 91 (03) : 1361 - 1391