Paper Title:
A Novel ECC-Based RFID Authentication Protocol
  Abstract

RFID technology plays an important role in our daily life nowadays. It widely used in the automatic identification system by embedding the tag into product. However, some security risks presented due to radio frequency signal channel between the tag and the reader which may lead privacy disclosure for the user. Various solutions are proposed to resole to security issues in RFID system, but there still presented some limitations. A security elliptic curve cryptography based authentication protocol is presented in this paper to preserve the privacy of the RFID system. The proposed protocol provides mutual authentication and a security communication channel between the tag and the reader. By the security analysis, our protocol can resist common passive and active attack; moreover, it also can provide forward security.

  Info
Periodical
Key Engineering Materials (Volumes 474-476)
Edited by
Garry Zhu
Pages
1764-1769
DOI
10.4028/www.scientific.net/KEM.474-476.1764
Citation
M. W. Fang, J. J. Wu, X. F. Zhang, H. Chen, "A Novel ECC-Based RFID Authentication Protocol", Key Engineering Materials, Vols. 474-476, pp. 1764-1769, 2011
Online since
April 2011
Export
Price
$32.00
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

Authors: Lei He, Yong Gan, Na Na Li, Tao Zhang
Abstract:Information security problem has become one of the hottest issues in RFID system. More and more researchers begin to study how to provide...
2267
Authors: Lin Tang, En Jian Bai, Wen Qiang Wu
Chapter 8: Nanomaterials and Nanomanufacturing
Abstract:With the development of e-business market, radio frequency identification (RFID) technology is becoming more and more importance. It is often...
1845
Authors: Yu Zhong Zhang
Chapter 4: Mathematical Analysis, Computer Science, Communication and Information Technologies
Abstract:With the progress of computer and communication technology, electronic commerce flourished. Security is a key problem in the development of...
856