Lightweight ECC Based RFID Authentication Integrated with an ID Verifier Transfer Protocol

被引:81
作者
He, Debiao [1 ]
Kumar, Neeraj [2 ]
Chilamkurti, Naveen [3 ]
Lee, Jong-Hyouk [4 ]
机构
[1] Wuhan Univ, Sch Math & Stat, Wuhan 430072, Peoples R China
[2] Thapar Univ, Dept Comp Sci, Patiala, Punjab, India
[3] La Trobe Univ, Dept Comp Sci & Comp Engn, Melbourne, Vic, Australia
[4] Sangmyung Univ, Dept Comp Software Engn, Cheonan Si, South Korea
基金
新加坡国家研究基金会;
关键词
Radio frequency identification; Authentication; Anonymity; Elliptic curve cryptography; QUADRATIC RESIDUES; SCHEME; SECURITY; PRIVACY;
D O I
10.1007/s10916-014-0116-z
中图分类号
R19 [保健组织与事业(卫生事业管理)];
学科分类号
摘要
The radio frequency identification (RFID) technology has been widely adopted and being deployed as a dominant identification technology in a health care domain such as medical information authentication, patient tracking, blood transfusion medicine, etc. With more and more stringent security and privacy requirements to RFID based authentication schemes, elliptic curve cryptography (ECC) based RFID authentication schemes have been proposed to meet the requirements. However, many recently published ECC based RFID authentication schemes have serious security weaknesses. In this paper, we propose a new ECC based RFID authentication integrated with an ID verifier transfer protocol that overcomes the weaknesses of the existing schemes. A comprehensive security analysis has been conducted to show strong security properties that are provided from the proposed authentication scheme. Moreover, the performance of the proposed authentication scheme is analyzed in terms of computational cost, communicational cost, and storage requirement.
引用
收藏
页数:6
相关论文
共 28 条
[1]  
BRINGER J, 2008, 7 INT C CRYPT NETW S, V5339, P149
[2]   A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges [J].
Cao, Xuefei ;
Kou, Weidong ;
Du, Xiaoni .
INFORMATION SCIENCES, 2010, 180 (15) :2895-2903
[3]   A novel mutual authentication scheme based on quadratic residues for RFID systems [J].
Chen, Yalin ;
Chou, Jue-Sam ;
Sun, Hung-Min .
COMPUTER NETWORKS, 2008, 52 (12) :2373-2380
[4]   Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards [J].
Chien, Hung-Yu ;
Chen, Che-Hao .
COMPUTER STANDARDS & INTERFACES, 2007, 29 (02) :254-259
[5]   Securing against brute-force attack: A hash-based RFID mutual authentication protocol using a secret value [J].
Cho, Jung-Sik ;
Yeo, Sang-Soo ;
Kim, Sung Kwon .
COMPUTER COMMUNICATIONS, 2011, 34 (03) :391-397
[6]  
Deursen T., 2009, TECHNICAL REPORT
[7]   A practical quadratic residues based scheme for authentication and privacy in mobile RFID systems [J].
Doss, Robin ;
Sundaresan, Saravanan ;
Zhou, Wanlei .
AD HOC NETWORKS, 2013, 11 (01) :383-396
[8]  
GODOR G, 2010, IEEE INT C WIR COMM, P650
[9]   RFID security and privacy: A research survey [J].
Juels, A .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2006, 24 (02) :381-394
[10]  
JUELS A, 2004, 1 INT WORKSH PERV CO