Skip to main content
Erschienen in: Wireless Personal Communications 3/2018

05.06.2018

A Novel Authentication Management RFID Protocol Based on Elliptic Curve Cryptography

verfasst von: Guoliang Liu, Huichuan Zhang, Fanyue Kong, Lei Zhang

Erschienen in: Wireless Personal Communications | Ausgabe 3/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The existing RFID (Radio Frequency Identification) security protocol lacks the key establishment mechanism, assuming only that both parties of the authentication protocol have shared their respective session keys. However, key establishment is an integral part of the RFID security system. This article first introduces the elliptic curve related mathematical theory foundation. Then we establish the key negotiation mechanism, and analyze the correctness and rationality of the negotiation mechanism. Finally, we design the authentication protocol based on elliptic curve in mobile RFID system, analyze the protocol authentication process, and compare the security and performance with other protocols, which shows that the authentication protocol has more efficient performance and the ability to resist all kinds of attacks.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Zhao, Z. (2014). A secure RFID authentication protocol for healthcare environments using elliptic curve cryptosystem. Journal of Medical Systems, 38(5), 1–7.CrossRef Zhao, Z. (2014). A secure RFID authentication protocol for healthcare environments using elliptic curve cryptosystem. Journal of Medical Systems, 38(5), 1–7.CrossRef
2.
Zurück zum Zitat Kumar, N., Kaur, K., Misra, S. C., & Iqbal, R. (2016). An intelligent RFID-enabled authentication scheme for healthcare applications in vehicular mobile cloud. Peer-to-Peer Networking and Applications, 9(5), 824–840.CrossRef Kumar, N., Kaur, K., Misra, S. C., & Iqbal, R. (2016). An intelligent RFID-enabled authentication scheme for healthcare applications in vehicular mobile cloud. Peer-to-Peer Networking and Applications, 9(5), 824–840.CrossRef
3.
Zurück zum Zitat Niu, B., Zhu, X., & Li, H. (2013). An ultralightweight and privacy-preserving authentication protocol for mobile RFID systems. In Wireless communications and NETWORKING conference. IEEE, pp. 1864–1869. Niu, B., Zhu, X., & Li, H. (2013). An ultralightweight and privacy-preserving authentication protocol for mobile RFID systems. In Wireless communications and NETWORKING conference. IEEE, pp. 1864–1869.
4.
Zurück zum Zitat Kumar, A., & Om, H. (2016). Lightweight, ECC Based RFID authentication scheme for WLAN. International Journal of Business Data Communications and Networking, 12(2), 89–103.CrossRef Kumar, A., & Om, H. (2016). Lightweight, ECC Based RFID authentication scheme for WLAN. International Journal of Business Data Communications and Networking, 12(2), 89–103.CrossRef
5.
Zurück zum Zitat Cong, G., Zhang, Z. J., Zhu, L. H., et al. (2014). A novel secure group RFID authentication protocol. The Journal of China Universities of Posts and Telecommunications, 21(1), 94–103.CrossRef Cong, G., Zhang, Z. J., Zhu, L. H., et al. (2014). A novel secure group RFID authentication protocol. The Journal of China Universities of Posts and Telecommunications, 21(1), 94–103.CrossRef
6.
Zurück zum Zitat Jin, C., Xu, C., Zhang, X., et al. (2016). A secure ECC-based RFID mutual authentication protocol to enhance patient medication safety. Journal of Medical Systems, 40(1), 1–6.CrossRef Jin, C., Xu, C., Zhang, X., et al. (2016). A secure ECC-based RFID mutual authentication protocol to enhance patient medication safety. Journal of Medical Systems, 40(1), 1–6.CrossRef
7.
Zurück zum Zitat Liao, Y. P., & Hsiao, C. M. (2014). A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol. Ad Hoc Networks, 18(7), 133–146.CrossRef Liao, Y. P., & Hsiao, C. M. (2014). A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol. Ad Hoc Networks, 18(7), 133–146.CrossRef
8.
Zurück zum Zitat Chou, J. S. (2014). An efficient mutual authentication RFID scheme based on elliptic curve cryptography. The Journal of Supercomputing, 70(1), 75–94.CrossRef Chou, J. S. (2014). An efficient mutual authentication RFID scheme based on elliptic curve cryptography. The Journal of Supercomputing, 70(1), 75–94.CrossRef
9.
Zurück zum Zitat Chou, J. S., Chen, Y., Wu, C. L., et al. (2011). An efficient RFID mutual authentication scheme based on ECC. IACR Cryptology Eprint Archive, 2011, 418. Chou, J. S., Chen, Y., Wu, C. L., et al. (2011). An efficient RFID mutual authentication scheme based on ECC. IACR Cryptology Eprint Archive, 2011, 418.
10.
Zurück zum Zitat Chien, H. Y. (2017). Elliptic curve cryptography-based RFID authentication resisting active tracking. Wireless Personal Communications, 94(4), 2925–2936.CrossRef Chien, H. Y. (2017). Elliptic curve cryptography-based RFID authentication resisting active tracking. Wireless Personal Communications, 94(4), 2925–2936.CrossRef
11.
Zurück zum Zitat Chen, Y. L., & Chou, J. S. (2015). ECC-based untraceable authentication for large-scale active-tag RFID systems. Electronic Commerce Research, 15(1), 97–120.CrossRef Chen, Y. L., & Chou, J. S. (2015). ECC-based untraceable authentication for large-scale active-tag RFID systems. Electronic Commerce Research, 15(1), 97–120.CrossRef
12.
13.
Zurück zum Zitat Yong, K. L., Batina, L., & Verbauwhede, I. (2008). EC-RAC (ECDLP Based Randomized Access Control): Provably secure RFID authentication protocol. In IEEE international conference on RFID. IEEE, pp. 97–104. Yong, K. L., Batina, L., & Verbauwhede, I. (2008). EC-RAC (ECDLP Based Randomized Access Control): Provably secure RFID authentication protocol. In IEEE international conference on RFID. IEEE, pp. 97–104.
14.
Zurück zum Zitat Batina, L., Guajardo, J., Kerins, T., et al. (2007). Public-key cryptography for RFID-Tags. In IEEE international conference on pervasive computing and communications workshops, 2007. Percom workshops. IEEE, pp. 217–222. Batina, L., Guajardo, J., Kerins, T., et al. (2007). Public-key cryptography for RFID-Tags. In IEEE international conference on pervasive computing and communications workshops, 2007. Percom workshops. IEEE, pp. 217–222.
15.
Zurück zum Zitat Zhou, J., Zhou, Y., Xiao, F., et al. (2012). Mutual authentication protocol for mobile RFID systems. Journal of Computational Information Systems, 8(8), 3261–3268. Zhou, J., Zhou, Y., Xiao, F., et al. (2012). Mutual authentication protocol for mobile RFID systems. Journal of Computational Information Systems, 8(8), 3261–3268.
Metadaten
Titel
A Novel Authentication Management RFID Protocol Based on Elliptic Curve Cryptography
verfasst von
Guoliang Liu
Huichuan Zhang
Fanyue Kong
Lei Zhang
Publikationsdatum
05.06.2018
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 3/2018
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-018-5771-9

Weitere Artikel der Ausgabe 3/2018

Wireless Personal Communications 3/2018 Zur Ausgabe

Neuer Inhalt