Elliptic Curve Cryptography Based Mutual Authentication Protocol for Low Computational Capacity RFID Systems - Performance Analysis by Simulations

被引:21
作者
Godor, Gyozo [1 ]
Giczi, Norbert [1 ]
Imdr, Sandor [1 ]
机构
[1] Budapest Univ Technol & Econ, Dept Telecommun, H-1117 Budapest, Hungary
来源
2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1 | 2010年
关键词
elliptic curve cryptography; authentication; RFID;
D O I
10.1109/WCINS.2010.5541860
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
RFID technology can be found in the most fields of our daily life, e.g. personal identification, supply-chain management, access control etc. For the sake of small computational capacity of RFID Tags, at first, only mathematical and logical operations and lightweight authentication methods could be used. However, thanks to the evolution of RFID technology, nowadays PKI infrastructure is also usable in this environment. In this paper we present our elliptic curve cryptography based mutual authentication protocol which proofs against the well-known attacks. We give a brief comparison with other EC based protocols in the point of view of security. Moreover, we show that our protocol is better than the others in case of performance, too. In order to measure the performance characteristics of our proposed ECC based authentication protocol and to make a comparison with others we implemented these algorithms in OMNeT++.
引用
收藏
页码:650 / 657
页数:8
相关论文
共 14 条
[1]  
Ahamed S. I., 2008, 12 IEEE INT WORKSH F
[2]   Public-key cryptography for RFID-tags [J].
Batina, L. ;
Guajardo, J. ;
Kerins, T. ;
Mentens, N. ;
Tuyls, P. ;
Verbauwhede, I. .
FIFTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, 2007, :217-+
[3]  
Batina L., 2006, An Elliptic Curve Processor Suitable For RFID-Tags
[4]  
Braun M., 2008, IJCSNS INT J COMPUTE, V8
[5]  
DIMITRIOU T, 2005, C SEC PRIV EM AR COM
[6]  
Godor G., 2009, MOMM 2009
[7]   Mutual Authentication Protocol for Low Computational Capacity RFID Systems [J].
Godor, Gyozo ;
Antal, Matyas ;
Imre, Sandor .
GLOBECOM 2008 - 2008 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2008,
[8]  
Gura N, 2004, LECT NOTES COMPUT SC, V3156, P119
[9]  
Joye M, 2002, LECT NOTES COMPUT SC, V2523, P291
[10]  
Matsumoto M., 1998, ACM Transactions on Modeling and Computer Simulation, V8, P3, DOI 10.1145/272991.272995