A Novel ECC-Based RFID Authentication Protocol

Article Preview

Abstract:

RFID technology plays an important role in our daily life nowadays. It widely used in the automatic identification system by embedding the tag into product. However, some security risks presented due to radio frequency signal channel between the tag and the reader which may lead privacy disclosure for the user. Various solutions are proposed to resole to security issues in RFID system, but there still presented some limitations. A security elliptic curve cryptography based authentication protocol is presented in this paper to preserve the privacy of the RFID system. The proposed protocol provides mutual authentication and a security communication channel between the tag and the reader. By the security analysis, our protocol can resist common passive and active attack; moreover, it also can provide forward security.

You might also be interested in these eBooks

Info:

Periodical:

Key Engineering Materials (Volumes 474-476)

Pages:

1764-1769

Citation:

Online since:

April 2011

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2011 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Z. Ding, J. Li, B. Feng: Reaserch on Hash-Based RFID Security Authenticaton Protocol. Journal of Computer Research and Development, 46(4), 2009, pp.583-592.

Google Scholar

[2] G. Gaubatz, J. -P. Kaps, and B. Sunar: Public Key Cryptography in Sensor Networks- Revisited. In 1st European Workshop on Security in Ad-Hoc and Sensor Networks (ESAS 2004), Heidelberg, Germany, August (2004).

DOI: 10.1007/978-3-540-30496-8_2

Google Scholar

[3] J. Wolkerstorfer: Scaling ECC Hardware to a Minimum. In ECRYPT workshop - Cryptographic Advances in Secure Hardware - CRASH 2005, September 6-7 2005. invited talk.

Google Scholar

[4] L. Batina, J. Guajardo, T. Kerins and et al: An Elliptic Curve Processor Suitable for RFID-Tags. Cryptology ePrint Archive, Report 2006/227, (2006).

Google Scholar

[5] Daniel Hein: Elliptic-curve cryptography suitable for RFID systems. Master's thesis, IAIK, Technical University of Graz, 2008. http: /www. iaik. tugraz. at/teaching/11_diplomarbeiten/archive/hein. htm.

Google Scholar

[6] D. Hein, J. Wolkerstorfer, and N. Felber: ECC is Ready for RFID – A Proof in Silicon. Selected Areas in Cryptography (SAC 2008), LNCS 5381, pp.401-413. Springer, (2009).

DOI: 10.1007/978-3-642-04159-4_26

Google Scholar

[7] S. Martinez, M, Valls C. Roig and et al: A Secure Elliptic Curve-Based RFID Protocol. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 24 (2): 309 – 318. Mar, (2009).

DOI: 10.1007/s11390-009-9226-3

Google Scholar

[8] S. I. Ahamed, F. Rahman, and E. Hoque: ERAP: ECC based RFID Authentication Protocol. 12th IEEE International Workshop on Future Trends of Distributed Computing Systems, 2008, pp.219-225.

DOI: 10.1109/ftdcs.2008.20

Google Scholar

[9] G. Godor, N. Giczi and S. I. Dr: Elliptic Curve Cryptography Based Mutual Authentication Protocol for Low Computational Capacity RFID Systems - Performance Analysis by Simulations. Wireless Communications, Networking and Information Security (WCNIS), 2010 IEEE International Conference on Digital Object Identifier. pp.650-657.

DOI: 10.1109/wcins.2010.5541860

Google Scholar

[10] D. Hankerson, A. J. Menezes, and S. Vanstone: Guide to Elliptic Curve Cryptography. Springer-Verlag Inc., Berlin, Germany, (2004).

Google Scholar

[11] T. Okamoto, in: Provably Secure and Practical Identication Schemes and Corresponding Signature Schemes, edtied by Brickell, Advances in Cryptology CRYPTO'92, volume 740 of LNCS, pp.31-53. Springer, (1992).

DOI: 10.1007/3-540-48071-4_3

Google Scholar