ECC-Based RFID Authentication Protocol

被引:0
|
作者
Xing-Chun Yang [1 ,2 ]
Chun-Xiang Xu [2 ]
Chao-Rong Li [3 ]
机构
[1] Department of Computer Science and Technology, Sichuan Police College
[2] School of Computer Science and Engineering, University of Electronic Science and Technology of China
[3] Department of Computer Science and Information Engineering,Yibin University
基金
中国国家自然科学基金; 中国博士后科学基金;
关键词
D O I
暂无
中图分类号
TP391.44 []; TN918.4 [密码的加密与解密];
学科分类号
摘要
The radio frequency identification(RFID) technology has been widely used so far in industrial and commercial applications. To develop the RFID tags that support elliptic curve cryptography(ECC), we propose a scalable and mutual authentication protocol based on ECC. We also suggest a tag privacy model that provides adversaries exhibiting strong abilities to attack a tag’s privacy. We prove that the proposed protocol preserves privacy under the privacy model and that it meets general security requirements. Compared with other recent ECCbased RFID authentication protocols, our protocol provides tag privacy and performs the best under comprehensive evaluation of tag privacy, tag computation cost, and communications cost.
引用
收藏
页码:320 / 329
页数:10
相关论文
共 50 条
  • [41] An ECC-based authentication protocol for fog-IoT enabled smart home environment
    Mohanta B.K.
    Jena D.
    Patnaik S.
    Mohanta, Bhabendu Kumar (C116004@iiit-bh.ac.in), 1600, Inderscience Publishers (20): : 25 - 46
  • [42] Lightweight Authentication Protocol for RFID-enabled Systems based on ECC
    Kaur, Kuljeet
    Kumar, Neeraj
    Singh, Mukesh
    Obaidat, Mohammad S.
    2016 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2016,
  • [43] An Anonymous and Efficient ECC-Based Authentication Scheme for SIP
    Zhou, Yousheng
    Chen, Xinyun
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2020, 2020
  • [44] On the Security of an ECC-Based Authentication Scheme for Internet of Drones
    Zhang, Min
    Xu, Chunxiang
    Li, Shanshan
    Jiang, Changsong
    IEEE SYSTEMS JOURNAL, 2022, 16 (04): : 6425 - 6428
  • [45] An Untraceable ECC-Based Remote User Authentication Scheme
    Mehmood, Zahid
    Chen, Gongliang
    Li, Jianhua
    Albeshri, Aiiad
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2017, 11 (03): : 1742 - 1760
  • [46] ECC-Based Authentication Scheme for Cloud-Based Robots
    Saurabh Jain
    C. Nandhini
    Rajesh Doriya
    Wireless Personal Communications, 2021, 117 : 1557 - 1576
  • [47] ECCPWS: An ECC-based protocol for WBAN systems
    Pirmoradian, Fatemeh
    Safkhani, Masoumeh
    Dakhilalian, Seyed Mohammad
    COMPUTER NETWORKS, 2023, 224
  • [48] ECC-Based Authentication Scheme for Cloud-Based Robots
    Jain, Saurabh
    Nandhini, C.
    Doriya, Rajesh
    WIRELESS PERSONAL COMMUNICATIONS, 2021, 117 (02) : 1557 - 1576
  • [49] ERMAP: ECC-based robust mutual authentication protocol for smart grid communication with AVISPA simulations
    Rajaram, Sangeetha
    Vollala, Satyanarayana
    Ramasubramanian, N.
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2022, 41 (04) : 232 - 245
  • [50] A Robust ECC-Based Provable Secure Authentication Protocol With Privacy Preserving for Industrial Internet of Things
    Li, Xiong
    Niu, Jianwei
    Bhuiyan, Md Zakirul Alam
    Wu, Fan
    Karuppiah, Marimuthu
    Kumari, Saru
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (08) : 3599 - 3609