A Highly Efficient ECC-Based Authentication Protocol for RFID
نویسندگان
چکیده
The availability of safety has always been a challenge in all fields computing and networking, the development reliable security measures for low operating power systems continuous task researchers. This paper focuses on Radio Frequency Identification (RFID) systems, whose market is tremendously growing due to increasing need efficient supply chain healthcare management. Two protocols are proposed that offer mutual authentication, confidentiality, forward security, anonymity, unlinkability, scalability, resistance against most important attacks. They differ storage requirements at server side. Both very as number required elliptic curve multiplications limited two tag Moreover, schemes also more effective secure than other related work presented literature. In addition, we show how extend order provide authentication with respect multiple readers.
منابع مشابه
Hierarchical ECC-Based RFID Authentication Protocol
RFID (Radio Frequency Identification) technology enables readers to scan remote RFID tags, and label the objects and people to which they are attached. Current cryptographic authentication protocols deployed in heterogeneous environments are often not compatible, or reveal too much information to the RFID readers. To tackle this problem, we introduce the concept of RFID groups and propose a hie...
متن کاملAn efficient RFID mutual authentication scheme based on ECC
Recently, Radio Frequency Identification (RFID) technique has been widely deployed in many applications, such as medical drugs management in hospitals and missing children searching in amusement parks. The applications basically can be classified into two types: non-public key cryptosystem (PKC)-based and PKC-based. However, many of them have been found to be flawed in the aspect of privacy pro...
متن کاملA Highly Scalable RFID Authentication Protocol
In previous RFID protocols, a hash-chain is used to achieve good privacy. Each tag is associated with a chain of Q hash values. To identify one tag out of a total of N tags, a server searches a table of size NQ. A naive search takes either Θ(NQ) time or Θ(NQ) memory, and therefore it does not scale well. A time-space tradeoff technique can mitigate the scalability problem. However, with the tim...
متن کاملAn Efficient ECC-based Authentication and Key Agreement Protocol
Public-key cryptography is commonly used to authenticate communicating entities in some networks. One of the key tools in this way is to use the elliptic curves cryptography (ECC) which is relatively lightweight due to its shorter key size compared to the conventional River-Shamir-Adleman (RSA) method. This paper is proposing an efficient protocol by analysing two variants of ECC-based wireless...
متن کاملPitfalls in an ECC-based Lightweight Authentication Protocol for Low-Cost RFID
RFID technology has become popular in many applications; however, most of the RFID products lack security related functionality due to the hardware limitation of the low-cost RFID tags. In 2009, Chien and Laih proposed an RFID authentication protocol based on error correction codes (ECC) to secure RFID systems with untraceability, which is one of the most critical privacy issues on RFID. In thi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Sensors
سال: 2021
ISSN: ['1687-725X', '1687-7268']
DOI: https://doi.org/10.1155/2021/8876766