ECC-Based RFID Authentication Protocol

被引:0
|
作者
Xing-Chun Yang [1 ,2 ]
Chun-Xiang Xu [2 ]
Chao-Rong Li [3 ]
机构
[1] Department of Computer Science and Technology, Sichuan Police College
[2] School of Computer Science and Engineering, University of Electronic Science and Technology of China
[3] Department of Computer Science and Information Engineering,Yibin University
基金
中国国家自然科学基金; 中国博士后科学基金;
关键词
D O I
暂无
中图分类号
TP391.44 []; TN918.4 [密码的加密与解密];
学科分类号
摘要
The radio frequency identification(RFID) technology has been widely used so far in industrial and commercial applications. To develop the RFID tags that support elliptic curve cryptography(ECC), we propose a scalable and mutual authentication protocol based on ECC. We also suggest a tag privacy model that provides adversaries exhibiting strong abilities to attack a tag’s privacy. We prove that the proposed protocol preserves privacy under the privacy model and that it meets general security requirements. Compared with other recent ECCbased RFID authentication protocols, our protocol provides tag privacy and performs the best under comprehensive evaluation of tag privacy, tag computation cost, and communications cost.
引用
收藏
页码:320 / 329
页数:10
相关论文
共 50 条
  • [31] ERASMIS: An ECC-based robust authentication protocol suitable for medical IoT systems
    Servati, Mohammad Reza
    Safkhani, Masoumeh
    Rahmani, Amir Masoud
    Hosseinzadeh, Mehdi
    COMPUTER NETWORKS, 2025, 258
  • [32] An high-speed ECC-based wireless authentication protocol on an ARM microprocessor
    Aydos, M
    Yanik, T
    Koç, CK
    16TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2000, : 401 - 409
  • [33] An Improved Security Authentication Protocol for Lightweight RFID Based on ECC
    Wei, Guo-heng
    Qin, Yan-lin
    Fu, Wei
    JOURNAL OF SENSORS, 2022, 2022
  • [34] A CRC-Based Authentication Model and ECC-Based Authentication Protocol for Resource-Constrained IoT Applications
    Keshta, Ismail
    IEEE ACCESS, 2024, 12 : 156765 - 156784
  • [35] ECC-based untraceable authentication for large-scale active-tag RFID systems
    Chen, Yalin
    Chou, Jue-Sam
    ELECTRONIC COMMERCE RESEARCH, 2015, 15 (01) : 97 - 120
  • [36] Cryptanalysis of Aydos et al.'s ECC-based wireless authentication protocol
    Sun, HM
    Hsieh, BT
    Tseng, SM
    2004 IEEE INTERNATIONAL CONFERNECE ON E-TECHNOLOGY, E-COMMERE AND E-SERVICE, PROCEEDINGS, 2004, : 563 - 566
  • [37] High-speed implementation of an ECC-based wireless authentication protocol on an ARM microprocessor
    Aydos, M
    Yanik, T
    Koç, ÇK
    IEE PROCEEDINGS-COMMUNICATIONS, 2001, 148 (05): : 273 - 279
  • [38] A provably secure ECC-based access and handover authentication protocol for space information networks
    Guo, Junyan
    Du, Ye
    Zhang, Yahang
    Li, Meihong
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2021, 193
  • [39] ECC-based untraceable authentication for large-scale active-tag RFID systems
    Yalin Chen
    Jue-Sam Chou
    Electronic Commerce Research, 2015, 15 : 97 - 120
  • [40] ECC-Based Authentication Protocol for Military Internet of Drone (IoD): A Holistic Security Framework
    Choe, Hyeon
    Kang, Dongsu
    IEEE ACCESS, 2025, 13 : 21503 - 21519