ECC-Based RFID Authentication Protocol

被引:0
|
作者
Xing-Chun Yang [1 ,2 ]
Chun-Xiang Xu [2 ]
Chao-Rong Li [3 ]
机构
[1] Department of Computer Science and Technology, Sichuan Police College
[2] School of Computer Science and Engineering, University of Electronic Science and Technology of China
[3] Department of Computer Science and Information Engineering,Yibin University
基金
中国国家自然科学基金; 中国博士后科学基金;
关键词
D O I
暂无
中图分类号
TP391.44 []; TN918.4 [密码的加密与解密];
学科分类号
摘要
The radio frequency identification(RFID) technology has been widely used so far in industrial and commercial applications. To develop the RFID tags that support elliptic curve cryptography(ECC), we propose a scalable and mutual authentication protocol based on ECC. We also suggest a tag privacy model that provides adversaries exhibiting strong abilities to attack a tag’s privacy. We prove that the proposed protocol preserves privacy under the privacy model and that it meets general security requirements. Compared with other recent ECCbased RFID authentication protocols, our protocol provides tag privacy and performs the best under comprehensive evaluation of tag privacy, tag computation cost, and communications cost.
引用
收藏
页码:320 / 329
页数:10
相关论文
共 50 条
  • [21] On the Security of an ECC Based RFID Authentication Protocol
    Babaheidarian, Parisa
    Delavar, Mahshid
    Mohajeri, Javad
    2012 9TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2012, : 111 - 114
  • [22] A Secure ECC-Based RFID Authentication Scheme Using Hybrid Protocols
    Liao, Yi-Pin
    Hsiao, Chih-Ming
    Liao, Y.-P. (newsun87@mail.sju.edu.tw), 2013, Springer Science and Business Media Deutschland GmbH (21): : 1 - 13
  • [23] A new ECC-based wireless authentication and key agreement protocol
    Zhang, Juan
    Chen, Guanghui
    Deng, Fangmin
    FIFTH WUHAN INTERNATIONAL CONFERENCE ON E-BUSINESS, VOLS 1-3: INTEGRATION AND INNOVATION THROUGH MEASUREMENT AND MANAGEMENT, 2006, : 1219 - 1225
  • [24] An ECC-based enhanced and secured authentication protocol for IoT and cloud server
    Chander, Bhanu
    Gopalakrishnan, Kumaravelan
    INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2023, 29 (04) : 407 - 425
  • [25] Cryptanalysis and Improvement of an ECC-Based Authentication Protocol for Wireless Sensor Networks
    Song, Taeui
    Kang, Dongwoo
    Ryu, Jihyeon
    Kim, Hyoungshick
    Won, Dongho
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS (ICCSA 2018), PT II, 2018, 10961 : 50 - 61
  • [26] ECCbAP: A secure ECC-based authentication protocol for IoT edge devices
    Rostampour S.
    Safkhani M.
    Bendavid Y.
    Bagheri N.
    Pervasive and Mobile Computing, 2020, 67
  • [27] Analysis and improvement of ECC-based fig.-proof protocol for RFID
    Hong-Yan, Kang (khyky@sina.com), 1600, Science and Engineering Research Support Society (09):
  • [28] An ECC-Based Authentication Protocol for Dynamic Charging System of Electric Vehicles
    Wang, Jie
    Wang, Shengbao
    Wen, Kang
    Weng, Bosen
    Zhou, Xin
    Chen, Kefei
    ELECTRONICS, 2024, 13 (06)
  • [29] Design of a mutual authentication protocol for RFID based on ECC
    Department of Computer and Information Engineering, Heze University, Heze
    Shandong
    274015, China
    不详
    Shandong
    274015, China
    Open Autom. Control Syst. J., 1 (1532-1536):
  • [30] Analysis and design of ECC-based RFID grouping-proof protocol
    Hong-Yan, Kang
    Open Automation and Control Systems Journal, 2015, 7 : 1523 - 1527