A Secure ECC-Based RFID Authentication Scheme Using Hybrid Protocols

被引:0
|
作者
Liao, Yi-Pin [1 ]
Hsiao, Chih-Ming [1 ]
机构
[1] Department of Computer Science and Information Engineering, University of St. John, Taipei
来源
Liao, Y.-P. (newsun87@mail.sju.edu.tw) | 2013年 / Springer Science and Business Media Deutschland GmbH卷 / 21期
关键词
Elliptic Curve Cryptosystem; ID-Verifier Transfer; Radio Frequency Identification;
D O I
10.1007/978-3-642-35473-1_1
中图分类号
学科分类号
摘要
Radio Frequency Identification (RFID) has grown tremendously and has been widely applied in various applications. RFID tags are becoming very attractive devices installed a small microchip for identification of products. This chip functionality makes it possible to verify the authenticity of a product. It is well known that elliptic curve cryptosystem (ECC) receive much attention due to their small key sizes and efficient computations. Recently, some ECC-based authentication schemes are proposed to apply well to the limited resources of the tags. Unfortunately, these schemes ignore some security and operational issues. In this paper, we proposed a secure ECC-based RFID authentication scheme to achieve mutual authentication using both secure ID-verifier transfer and challenge-response protocols. Moreover, the proposed scheme can satisfy the security requirements of RFID. Performance analysis and function comparisons demonstrate that the proposed scheme is well suited for RFID tags with the scarceness of resources. © 2013 Springer-Verlag Berlin Heidelberg.
引用
收藏
页码:1 / 13
页数:12
相关论文
共 36 条
  • [21] A lightweight secure authentication approach based on stream ciphering for RFID-based Internet of Things
    Ghasemi, Fereshteh
    Babaie, Shahram
    COMPUTERS & ELECTRICAL ENGINEERING, 2022, 102
  • [22] Three elliptic curve cryptography-based RFID authentication protocols for Internet of Things
    An, Rui
    Feng, Hui
    Liu, Qin
    Li, Li
    ADVANCES ON BROAD-BAND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS, 2017, 2 : 857 - 878
  • [23] A Secure RFID Mutual Authentication Protocol for Healthcare Environments Using Elliptic Curve Cryptography
    Jin, Chunhua
    Xu, Chunxiang
    Zhang, Xiaojun
    Zhao, Jining
    JOURNAL OF MEDICAL SYSTEMS, 2015, 39 (03)
  • [24] A Secure RFID Mutual Authentication Protocol for Healthcare Environments Using Elliptic Curve Cryptography
    Chunhua Jin
    Chunxiang Xu
    Xiaojun Zhang
    Jining Zhao
    Journal of Medical Systems, 2015, 39
  • [25] A SECURE TIME-BOUND HIERARCHICAL KEY MANAGEMENT SCHEME BASED ON ECC FOR MOBILE AGENTS
    Huang, Jen-Yan
    Chung, Yu-Fang
    Chen, Tzer-Shyong
    Liao, I-En
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2010, 6 (05): : 2159 - 2170
  • [26] A SECURE AND EFFICIENT AUTHENTICATION WITH KEY AGREEMENT SCHEME BASED ON ELLIPTIC CURVE CRYPTOSYSTEM
    Qu, Juan
    Feng, Yuming
    Huang, Yi
    ITALIAN JOURNAL OF PURE AND APPLIED MATHEMATICS, 2015, (34): : 101 - 112
  • [27] Fast and secure tag authentication in large-scale RFID systems using skip graphs
    Komori, Yudai
    Sakai, Kazuya
    Pukumoto, Satoshi
    COMPUTER COMMUNICATIONS, 2018, 116 : 77 - 89
  • [28] Enhance Safety of Telecare Medicine Information System With A RFID-based Authentication Scheme
    He Jialiang
    Xu Zhiqiang
    Xu Xiaoke
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (08): : 165 - 174
  • [29] Secure Identity-based Authentication Scheme Suitable for Limited-resource Devices
    Toan-Thinh Truong
    Vi-Minh Luong
    Minh-Triet Tran
    Anh-Duc Duong
    PROCEEDINGS OF 2016 12TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2016, : 271 - 276
  • [30] A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography
    He, Debiao
    Chen, Jianhua
    Chen, Yitao
    SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (12) : 1423 - 1429