A Secured RFID Lightweight Authentication Protocol based on Elliptic Curve Cryptography using modified PRNG Algorithm

被引:0
作者
Origines, Domingo V., Jr. [1 ]
Sison, Ariel M. [2 ]
Medina, Ruji P. [1 ]
机构
[1] Technol Inst Philippines, Grad Sch, Quezon City, Philippines
[2] Emilio Aguinaldo Coll, Manila, Philippines
来源
2019 2ND INTERNATIONAL CONFERENCE ON COMPUTING AND BIG DATA (ICCBD 2019) | 2019年
关键词
Elliptic Curve Cryptography; Pseudo-Random Number Generator; Linear Congruential Generator; RFID; MUTUAL-AUTHENTICATION; SCHEME;
D O I
10.1145/3366650.3366664
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, the goal is to enhance the lightweight Authentication Protocol using Epoch Timestamp as Seed for PRNG Protocol based on Elliptic Curve Cryptography. The proposed enhancement uses PRNG Algorithm where randomness is generated using real-time system clock converted into running epoch timestamp as Seed for PRNG on LCG Algorithm that will do Bootstrap Iteration in generating a Random Number as keys for ECC Mutual Authentication Protocol. The result shows that the enhanced ECC Protocol utilizes smaller storage requirements of 2560bits + 640w bits, communication cost of 1,120bits faster response time and throughput, and lesser computational cost of 207ms for the Tag and the Server was achieved compared to Zheng Protocol. Also, the performance of this proposed Protocol has many advantages in terms of confidentiality, mutual authentication, availability, forward security, anonymity, spoofing/cloning, scalability and so on, which can resist tracking attacks, denial of service attacks, and system internal attack. It is therefore suggested that some practical applications using a RFID system that requires security for the lightweight authentication protocol should be introduced and more appropriate.
引用
收藏
页码:73 / 80
页数:8
相关论文
共 50 条
  • [21] Construction of elliptic curve cryptography-based authentication protocol for internet of things
    Chhikara, Deepak
    Rana, Saurabh
    Mishra, Ankita
    Mishra, Dheerendra
    SECURITY AND PRIVACY, 2022, 5 (04)
  • [22] Three elliptic curve cryptography-based RFID authentication protocols for Internet of Things
    An, Rui
    Feng, Hui
    Liu, Qin
    Li, Li
    ADVANCES ON BROAD-BAND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS, 2017, 2 : 857 - 878
  • [23] Elliptic Curve Cryptography Based Mutual Authentication Protocol for Low Computational Capacity RFID Systems - Performance Analysis by Simulations
    Godor, Gyozo
    Giczi, Norbert
    Imdr, Sandor
    2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1, 2010, : 650 - 657
  • [24] An Improved Lightweight Two-Factor Authentication and Key Agreement Protocol with Dynamic Identity Based on Elliptic Curve Cryptography
    Qiu, Shuming
    Xu, Guosheng
    Ahmad, Haseeb
    Xu, Guoai
    Qiu, Xinping
    Xu, Hong
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2019, 13 (02): : 978 - 1002
  • [25] A Mutual Authentication Protocol for IoT Devices using Elliptic Curve Cryptography
    Tewari, Aakanksha
    Gupta, B. B.
    PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE CONFLUENCE 2018 ON CLOUD COMPUTING, DATA SCIENCE AND ENGINEERING, 2018, : 716 - 720
  • [26] Cryptanalysis and improvement of a robust smart card secured authentication scheme on SIP using elliptic curve cryptography
    Farash, Mohammad Sabzinejad
    Kumari, Saru
    Bakhtiari, Majid
    MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (08) : 4485 - 4504
  • [27] An Asymmetric Authentication Protocol for Mobile Devices Using Elliptic Curve Cryptography
    Ganesan, S. Prasanna
    2ND IEEE INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER CONTROL (ICACC 2010), VOL. 4, 2010, : 107 - 109
  • [28] An Efficient RFID Authentication Scheme Based on Elliptic Curve Cryptography for Internet of Things
    Mustapha Benssalah
    Izza Sarah
    Karim Drouiche
    Wireless Personal Communications, 2021, 117 : 2513 - 2539
  • [29] An Efficient RFID Authentication Scheme Based on Elliptic Curve Cryptography for Internet of Things
    Benssalah, Mustapha
    Sarah, Izza
    Drouiche, Karim
    WIRELESS PERSONAL COMMUNICATIONS, 2021, 117 (03) : 2513 - 2539
  • [30] A Secure RFID Authentication Protocol for Healthcare Environments Using Elliptic Curve Cryptosystem
    Zhao, Zhenguo
    JOURNAL OF MEDICAL SYSTEMS, 2014, 38 (05)