A Secured RFID Lightweight Authentication Protocol based on Elliptic Curve Cryptography using modified PRNG Algorithm

被引:0
|
作者
Origines, Domingo V., Jr. [1 ]
Sison, Ariel M. [2 ]
Medina, Ruji P. [1 ]
机构
[1] Technol Inst Philippines, Grad Sch, Quezon City, Philippines
[2] Emilio Aguinaldo Coll, Manila, Philippines
来源
2019 2ND INTERNATIONAL CONFERENCE ON COMPUTING AND BIG DATA (ICCBD 2019) | 2019年
关键词
Elliptic Curve Cryptography; Pseudo-Random Number Generator; Linear Congruential Generator; RFID; MUTUAL-AUTHENTICATION; SCHEME;
D O I
10.1145/3366650.3366664
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, the goal is to enhance the lightweight Authentication Protocol using Epoch Timestamp as Seed for PRNG Protocol based on Elliptic Curve Cryptography. The proposed enhancement uses PRNG Algorithm where randomness is generated using real-time system clock converted into running epoch timestamp as Seed for PRNG on LCG Algorithm that will do Bootstrap Iteration in generating a Random Number as keys for ECC Mutual Authentication Protocol. The result shows that the enhanced ECC Protocol utilizes smaller storage requirements of 2560bits + 640w bits, communication cost of 1,120bits faster response time and throughput, and lesser computational cost of 207ms for the Tag and the Server was achieved compared to Zheng Protocol. Also, the performance of this proposed Protocol has many advantages in terms of confidentiality, mutual authentication, availability, forward security, anonymity, spoofing/cloning, scalability and so on, which can resist tracking attacks, denial of service attacks, and system internal attack. It is therefore suggested that some practical applications using a RFID system that requires security for the lightweight authentication protocol should be introduced and more appropriate.
引用
收藏
页码:73 / 80
页数:8
相关论文
共 50 条
  • [1] A Lightweight RFID Authentication Protocol based on Elliptic Curve Cryptography
    Liu, Ya-Li
    Qin, Xiao-Lin
    Wang, Chao
    Li, Bo-Han
    JOURNAL OF COMPUTERS, 2013, 8 (11) : 2880 - 2887
  • [2] SLEC: A Novel Serverless RFID Authentication Protocol Based on Elliptic Curve Cryptography
    Baashirah, Rania
    Abuzneid, Abdelshakour
    ELECTRONICS, 2019, 8 (10)
  • [3] An efficient and secure RFID authentication protocol using elliptic curve cryptography
    Negin Dinarvand
    Hamid Barati
    Wireless Networks, 2019, 25 : 415 - 428
  • [4] An efficient and secure RFID authentication protocol using elliptic curve cryptography
    Dinarvand, Negin
    Barati, Hamid
    WIRELESS NETWORKS, 2019, 25 (01) : 415 - 428
  • [5] Secure Mutual Authentication Protocol for RFID Based on Elliptic Curve Cryptography
    Alamr, Amjad Ali
    Kausar, Firdous
    Kim, Jong Sung
    2016 INTERNATIONAL CONFERENCE ON PLATFORM TECHNOLOGY AND SERVICE (PLATCON), 2016,
  • [6] A Novel Authentication Management RFID Protocol Based on Elliptic Curve Cryptography
    Liu, Guoliang
    Zhang, Huichuan
    Kong, Fanyue
    Zhang, Lei
    WIRELESS PERSONAL COMMUNICATIONS, 2018, 101 (03) : 1445 - 1455
  • [7] Elliptic Curve Cryptography Based Authentication Protocol for Small Computational Capacity RFID Systems
    Godor, Gyozo
    Szendi, Peter
    Imre, Sandor
    Q2SWINET 2010: PROCEEDINGS OF THE SIXTH ACM SYMPOSIUM ON QOS AND SECURITY FOR WIRELESS AND MOBILE NETWORKS, 2010, : 98 - 105
  • [8] An Efficient RFID Authentication Protocol to Enhance Patient Medication Safety Using Elliptic Curve Cryptography
    Zhang, Zezhong
    Qi, Qingqing
    JOURNAL OF MEDICAL SYSTEMS, 2014, 38 (05)
  • [9] A Secured Authentication Protocol for SIP Using Elliptic Curves Cryptography
    Chen, Tien-ho
    Yeh, Hsiu-lien
    Liu, Pin-chuan
    Hsiang, Han-chen
    Shih, Wei-kuan
    COMMUNICATION AND NETWORKING, PT I, 2010, 119 : 46 - 55
  • [10] A secure user authentication protocol using elliptic curve cryptography
    Kumari, Adesh
    Abbasi, M. Yahya
    Kumar, Vinod
    Khan, Akber Ali
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2019, 22 (04) : 521 - 530