A Secure ECC-Based RFID Authentication Scheme Using Hybrid Protocols

被引:0
|
作者
Liao, Yi-Pin [1 ]
Hsiao, Chih-Ming [1 ]
机构
[1] Department of Computer Science and Information Engineering, University of St. John, Taipei
来源
Liao, Y.-P. (newsun87@mail.sju.edu.tw) | 2013年 / Springer Science and Business Media Deutschland GmbH卷 / 21期
关键词
Elliptic Curve Cryptosystem; ID-Verifier Transfer; Radio Frequency Identification;
D O I
10.1007/978-3-642-35473-1_1
中图分类号
学科分类号
摘要
Radio Frequency Identification (RFID) has grown tremendously and has been widely applied in various applications. RFID tags are becoming very attractive devices installed a small microchip for identification of products. This chip functionality makes it possible to verify the authenticity of a product. It is well known that elliptic curve cryptosystem (ECC) receive much attention due to their small key sizes and efficient computations. Recently, some ECC-based authentication schemes are proposed to apply well to the limited resources of the tags. Unfortunately, these schemes ignore some security and operational issues. In this paper, we proposed a secure ECC-based RFID authentication scheme to achieve mutual authentication using both secure ID-verifier transfer and challenge-response protocols. Moreover, the proposed scheme can satisfy the security requirements of RFID. Performance analysis and function comparisons demonstrate that the proposed scheme is well suited for RFID tags with the scarceness of resources. © 2013 Springer-Verlag Berlin Heidelberg.
引用
收藏
页码:1 / 13
页数:12
相关论文
共 36 条
  • [1] A Secure ECC-based RFID Mutual Authentication Protocol to Enhance Patient Medication Safety
    Jin, Chunhua
    Xu, Chunxiang
    Zhang, Xiaojun
    Li, Fagen
    JOURNAL OF MEDICAL SYSTEMS, 2016, 40 (01) : 1 - 6
  • [2] A Secure ECC-based RFID Mutual Authentication Protocol to Enhance Patient Medication Safety
    Chunhua Jin
    Chunxiang Xu
    Xiaojun Zhang
    Fagen Li
    Journal of Medical Systems, 2016, 40
  • [3] Novel ECC-Based RFID Mutual Authentication Protocol for Emerging IoT Applications
    Gabsi, Souhir
    Kortli, Yassin
    Beroulle, Vincent
    Kieffer, Yann
    Alasiry, Areej
    Hamdi, Belgacem
    IEEE ACCESS, 2021, 9 : 130895 - 130913
  • [4] Ring signature scheme for ECC-based anonymous signcryption
    Chung, Yu Fang
    Wu, Zhen Yu
    Chen, Tzer Shyong
    COMPUTER STANDARDS & INTERFACES, 2009, 31 (04) : 669 - 674
  • [5] Mutual Authentication Protocol for RFID based on ECC
    Zheng, Lijuan
    Xue, Yujuan
    Zhang, Linhao
    Zhang, Rui
    2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) AND IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC), VOL 2, 2017, : 320 - 323
  • [6] A provably secure anonymous mutual authentication scheme with key agreement for SIP using ECC
    Dongqing Xu
    Shu Zhang
    Jianhua Chen
    Mimi Ma
    Peer-to-Peer Networking and Applications, 2018, 11 : 837 - 847
  • [7] A provably secure anonymous mutual authentication scheme with key agreement for SIP using ECC
    Xu, Dongqing
    Zhang, Shu
    Chen, Jianhua
    Ma, Mimi
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2018, 11 (05) : 837 - 847
  • [8] An extended ECC-based anonymity-preserving 3-factor remote authentication scheme usable in TMIS
    Chandrakar, Preeti
    Om, Hari
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2018, 31 (08)
  • [9] A SECURE CONFERENCE KEY PROTOCOL OVER ECC-BASED GREY SYSTEMS
    Chen, Tzer-Long
    Chung, Yu-Fang
    Lin, Frank Y. S.
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2011, 7 (10): : 5717 - 5730
  • [10] An Enhanced Secure Authentication Scheme With One More Tag for RFID Systems
    Xu, He
    Yin, Xianzhen
    Zhu, Feng
    Li, Peng
    IEEE SENSORS JOURNAL, 2021, 21 (15) : 17189 - 17199