Skip to main content
Erschienen in: The Journal of Supercomputing 1/2014

01.10.2014

An efficient mutual authentication RFID scheme based on elliptic curve cryptography

verfasst von: Jue-Sam Chou

Erschienen in: The Journal of Supercomputing | Ausgabe 1/2014

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Radio frequency identification (RFID) tags have been widely deployed in many applications, such as supply chain management, inventory control, and traffic card payment. However, these applications can suffer from security issues or privacy violations when the underlying data-protection techniques are not properly designed. Hence, many secure RFID authentication protocols have been proposed. According to the resource usage of the tags, secure RFID protocols are classified into four types: full-fledged, simple, lightweight, and ultra-lightweight. In general, non-full-fledged protocols are vulnerable to desynchronization, impersonation, and tracking attacks, and they also lack scalability. If the tag resources allow more flexibility, full-fledged protocols seem to be an attractive solution. In this study, we examine full-fledged RFID authentication protocols and discuss their security issues. We then design a novel RFID authentication protocol based on elliptic curve cryptography, to avoid these issues. In addition, we present a detailed security analysis and a comparison with related studies; the results show that our scheme is more resistant to a variety of attacks and that it has the best scalability, while maintaining competitive levels of efficiency.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Liu AX, Bailey LA (2009) PAP: a privacy and authentication protocol for passive RFID tags. Comput Commun 32(7):1194–1199CrossRef Liu AX, Bailey LA (2009) PAP: a privacy and authentication protocol for passive RFID tags. Comput Commun 32(7):1194–1199CrossRef
3.
Zurück zum Zitat Lin X, Lu R, Kwan D, Shen XS (2010) REACT: an RFID-based privacy-preserving children tracking scheme for large amusement parks. Comput Netw 54(15):2744–2755CrossRef Lin X, Lu R, Kwan D, Shen XS (2010) REACT: an RFID-based privacy-preserving children tracking scheme for large amusement parks. Comput Netw 54(15):2744–2755CrossRef
4.
Zurück zum Zitat Kaya SV, Sava E, Levi A, Erçetin Ö (2009) Public key cryptography based privacy preserving multi-context RFID infrastructure. Ad Hoc Netw 7(1):136–152CrossRef Kaya SV, Sava E, Levi A, Erçetin Ö (2009) Public key cryptography based privacy preserving multi-context RFID infrastructure. Ad Hoc Netw 7(1):136–152CrossRef
5.
Zurück zum Zitat Ryu EK, Takagi T (2009) A hybrid approach for privacy-preserving RFID tags. Comput Stand Interfaces 31(4):812–815CrossRef Ryu EK, Takagi T (2009) A hybrid approach for privacy-preserving RFID tags. Comput Stand Interfaces 31(4):812–815CrossRef
6.
Zurück zum Zitat Cho JS, Yeo SS, Kim SK (2011) Securing against brute-force attack: a hash-based RFID mutual authentication protocol using a secret value. Comput Commun 34(3):391–397CrossRef Cho JS, Yeo SS, Kim SK (2011) Securing against brute-force attack: a hash-based RFID mutual authentication protocol using a secret value. Comput Commun 34(3):391–397CrossRef
7.
Zurück zum Zitat Devadas S, Suh E, Paral S, Sowell R, Ziola T, Khandelwal V (2008) Design and implementation of PUF-based. In: 2008 IEEE international conference on RFID. IEEE, pp 58–64 Devadas S, Suh E, Paral S, Sowell R, Ziola T, Khandelwal V (2008) Design and implementation of PUF-based. In: 2008 IEEE international conference on RFID. IEEE, pp 58–64
8.
Zurück zum Zitat Ohkubo M, Suzuki K, Kinoshita S (2003) Cryptographic approach to “privacy-friendly” tags. In: RFID privacy workshop, vol 82. MIT, Cambridge Ohkubo M, Suzuki K, Kinoshita S (2003) Cryptographic approach to “privacy-friendly” tags. In: RFID privacy workshop, vol 82. MIT, Cambridge
9.
Zurück zum Zitat Weis SA, Sarma SE, Rivest RL, Engels DW (2004) Security and privacy aspects of low-cost radio frequency identification systems. In: Security in pervasive computing. Springer, Berlin, pp 201–212 Weis SA, Sarma SE, Rivest RL, Engels DW (2004) Security and privacy aspects of low-cost radio frequency identification systems. In: Security in pervasive computing. Springer, Berlin, pp 201–212
10.
Zurück zum Zitat Yeh TC, Wu CH, Tseng YM (2011) Improvement of the RFID authentication scheme based on quadratic residues. Comput Commun 34(3):337–341CrossRef Yeh TC, Wu CH, Tseng YM (2011) Improvement of the RFID authentication scheme based on quadratic residues. Comput Commun 34(3):337–341CrossRef
11.
Zurück zum Zitat Lee YK, Batina L, Singelee D, Preneel B, Verbauwhede I (2010) Anti-counterfeiting, untraceability and other security challenges for RFID systems: public-key-based protocols and hardware. In: Towards hardware-intrinsic security. Springer, Berlin, pp 237–257 Lee YK, Batina L, Singelee D, Preneel B, Verbauwhede I (2010) Anti-counterfeiting, untraceability and other security challenges for RFID systems: public-key-based protocols and hardware. In: Towards hardware-intrinsic security. Springer, Berlin, pp 237–257
12.
Zurück zum Zitat Lee YK, Batina L, Verbauwhede I (2009) Untraceable RFID authentication protocols: revision of EC-RAC. In: 2009 IEEE international conference on RFID. IEEE, pp 178–185 Lee YK, Batina L, Verbauwhede I (2009) Untraceable RFID authentication protocols: revision of EC-RAC. In: 2009 IEEE international conference on RFID. IEEE, pp 178–185
13.
Zurück zum Zitat Juels A, Weis SA (2009) Defining strong privacy for RFID. ACM Trans Inf Syst Secur (TISSEC) 13(1):7CrossRef Juels A, Weis SA (2009) Defining strong privacy for RFID. ACM Trans Inf Syst Secur (TISSEC) 13(1):7CrossRef
14.
Zurück zum Zitat Yamada I, Shiotsu S, Itasaki A, Inano S, Yasaki K, Takenaka M (2005) Secure active RFID tag system. In: Proceedings of Ubicomp 2005 workshop Yamada I, Shiotsu S, Itasaki A, Inano S, Yasaki K, Takenaka M (2005) Secure active RFID tag system. In: Proceedings of Ubicomp 2005 workshop
15.
Zurück zum Zitat Kinoshita S, Ohkubo M, Hoshino F, Morohashi G, Shionoiri O, Kanai A (2005) Privacy enhanced active RFID tag. Cognit Sci Res Paper Univ Sussex CSRP 577:100 Kinoshita S, Ohkubo M, Hoshino F, Morohashi G, Shionoiri O, Kanai A (2005) Privacy enhanced active RFID tag. Cognit Sci Res Paper Univ Sussex CSRP 577:100
16.
Zurück zum Zitat Kim HW, Lim SY, Lee HJ (2006) Symmetric encryption in RFID authentication protocol for strong location privacy and forward-security. In: Hybrid information technology. International conference on ICHIT’06, IEEE, vol 2, pp 718–723 Kim HW, Lim SY, Lee HJ (2006) Symmetric encryption in RFID authentication protocol for strong location privacy and forward-security. In: Hybrid information technology. International conference on ICHIT’06, IEEE, vol 2, pp 718–723
17.
Zurück zum Zitat Oyarhossein S, Mohammadi S (2009) Cryptography and authentication processing framework on RFID active tags for carpet products. In: IEEE international conference on communications technology and applications, 2009. ICCTA’09. IEEE, pp 26–31 Oyarhossein S, Mohammadi S (2009) Cryptography and authentication processing framework on RFID active tags for carpet products. In: IEEE international conference on communications technology and applications, 2009. ICCTA’09. IEEE, pp 26–31
18.
Zurück zum Zitat Ning H, Liu H, Mao J, Zhang Y (2011) Scalable and distributed key array authentication protocol in radio frequency identification-based sensor systems. IET Commun 5(12):1755–1768MathSciNetCrossRef Ning H, Liu H, Mao J, Zhang Y (2011) Scalable and distributed key array authentication protocol in radio frequency identification-based sensor systems. IET Commun 5(12):1755–1768MathSciNetCrossRef
19.
Zurück zum Zitat Batina L, Guajardo J, Kerins T, Mentens N, Tuyls P, Verbauwhede I (2007) Public-key cryptography for RFID-tags. In: Pervasive computing and communications workshops, 2007. Fifth annual IEEE international conference on PerCom workshops’ 07. IEEE, pp 217–222 Batina L, Guajardo J, Kerins T, Mentens N, Tuyls P, Verbauwhede I (2007) Public-key cryptography for RFID-tags. In: Pervasive computing and communications workshops, 2007. Fifth annual IEEE international conference on PerCom workshops’ 07. IEEE, pp 217–222
20.
Zurück zum Zitat Kumar S, Paar C (2006) Are standards compliant elliptic curve cryptosystems feasible on RFID. In: Workshop on RFID security, pp 12–14 Kumar S, Paar C (2006) Are standards compliant elliptic curve cryptosystems feasible on RFID. In: Workshop on RFID security, pp 12–14
21.
Zurück zum Zitat Fürbass F (2006) ECC signature generation device for RFID tags Fürbass F (2006) ECC signature generation device for RFID tags
22.
Zurück zum Zitat Furbass F, Wolkerstorfer J (2007) ECC processor with low die size for RFID applications. In: IEEE international symposium on circuits and systems, 2007. ISCAS 2007. IEEE, pp 1835–1838 Furbass F, Wolkerstorfer J (2007) ECC processor with low die size for RFID applications. In: IEEE international symposium on circuits and systems, 2007. ISCAS 2007. IEEE, pp 1835–1838
23.
Zurück zum Zitat Ahamed SI, Rahman F, Hoque E (2008) ERAP: ECC based RFID authentication protocol. In: 12th IEEE international workshop on future trends of distributed computing systems, 2008. FTDCS’08. IEEE, pp 219–225 Ahamed SI, Rahman F, Hoque E (2008) ERAP: ECC based RFID authentication protocol. In: 12th IEEE international workshop on future trends of distributed computing systems, 2008. FTDCS’08. IEEE, pp 219–225
24.
Zurück zum Zitat Luo P, Wang X, Feng J, Xu Y (2008) Low-power hardware implementation of ECC processor suitable for low-cost RFID tags. In: 9th international conference on solid-state and integrated-circuit technology, 2008. ICSICT 2008. IEEE, pp 1681–1684 Luo P, Wang X, Feng J, Xu Y (2008) Low-power hardware implementation of ECC processor suitable for low-cost RFID tags. In: 9th international conference on solid-state and integrated-circuit technology, 2008. ICSICT 2008. IEEE, pp 1681–1684
25.
Zurück zum Zitat Fan J, Batina L, Verbauwhede I (2009) Light-weight implementation options for curve-based cryptography: HECC is also ready for RFID. In: International conference for internet technology and secured transactions, 2009. ICITST 2009. IEEE, pp 1–6 Fan J, Batina L, Verbauwhede I (2009) Light-weight implementation options for curve-based cryptography: HECC is also ready for RFID. In: International conference for internet technology and secured transactions, 2009. ICITST 2009. IEEE, pp 1–6
26.
Zurück zum Zitat Godor G, Giczi N, Imre S (2010) Elliptic curve cryptography based mutual authentication protocol for low computational capacity RFID systems-performance analysis by simulations. In: IEEE international conference on wireless communications, networking and information security (WCNIS), 2010. IEEE, pp 650–657 Godor G, Giczi N, Imre S (2010) Elliptic curve cryptography based mutual authentication protocol for low computational capacity RFID systems-performance analysis by simulations. In: IEEE international conference on wireless communications, networking and information security (WCNIS), 2010. IEEE, pp 650–657
27.
Zurück zum Zitat O’Neill M, Robshaw MJ (2010) Low-cost digital signature architecture suitable for radio frequency identification tags. Comput Digital Tech IET 4(1):14–26CrossRef O’Neill M, Robshaw MJ (2010) Low-cost digital signature architecture suitable for radio frequency identification tags. Comput Digital Tech IET 4(1):14–26CrossRef
28.
Zurück zum Zitat Ko WT, Chiou SY, Lu EH, Chang HC (2011) An improvement of privacy-preserving ECC-based grouping proof for RFID. In: Cross strait quad-regional radio science and wireless technology conference (CSQRWC), 2011, vol 2. IEEE, pp 1062–1064 Ko WT, Chiou SY, Lu EH, Chang HC (2011) An improvement of privacy-preserving ECC-based grouping proof for RFID. In: Cross strait quad-regional radio science and wireless technology conference (CSQRWC), 2011, vol 2. IEEE, pp 1062–1064
29.
Zurück zum Zitat Nathan BT, Meenakumari R, Usha S (2011) Formation of elliptic curve using finger print for network security. In: International conference on process automation, control and computing (PACC), 2011. IEEE, pp 1–5 Nathan BT, Meenakumari R, Usha S (2011) Formation of elliptic curve using finger print for network security. In: International conference on process automation, control and computing (PACC), 2011. IEEE, pp 1–5
30.
Zurück zum Zitat Liu H, Ning H (2011) Zero-knowledge authentication protocol based on alternative mode in RFID systems. IEEE Sensors J 11(12):3235–3245MathSciNetCrossRef Liu H, Ning H (2011) Zero-knowledge authentication protocol based on alternative mode in RFID systems. IEEE Sensors J 11(12):3235–3245MathSciNetCrossRef
31.
Zurück zum Zitat Pendl C, Pelnar M, Hutter M (2012) Elliptic curve cryptography on the WISP UHF RFID tag. In: RFID. Security and privacy. Springer, Berlin, pp 32–47 Pendl C, Pelnar M, Hutter M (2012) Elliptic curve cryptography on the WISP UHF RFID tag. In: RFID. Security and privacy. Springer, Berlin, pp 32–47
32.
Zurück zum Zitat Liu H, Ning H, Zhang Y, He D, Xiong Q, Yang LT (2012) Grouping-proofs based authentication protocol for distributed RFID systems. IEEE Trans Parallel Distrib Syst 24(7):1321–1330CrossRef Liu H, Ning H, Zhang Y, He D, Xiong Q, Yang LT (2012) Grouping-proofs based authentication protocol for distributed RFID systems. IEEE Trans Parallel Distrib Syst 24(7):1321–1330CrossRef
33.
Zurück zum Zitat Peeters R, Singelee D, Preneel B (2012) Toward More Secure and reliable access control. IEEE Pervasive Comput 11(3):76–83CrossRef Peeters R, Singelee D, Preneel B (2012) Toward More Secure and reliable access control. IEEE Pervasive Comput 11(3):76–83CrossRef
34.
Zurück zum Zitat Juels A, Molnar D, Wagner D (2005) Security and privacy ussues in e-passports. In: First international conference on security and privacy for emerging areas in communications networks, 2005. SecureComm 2005. IEEE, pp 74–88 Juels A, Molnar D, Wagner D (2005) Security and privacy ussues in e-passports. In: First international conference on security and privacy for emerging areas in communications networks, 2005. SecureComm 2005. IEEE, pp 74–88
35.
Zurück zum Zitat Jeng AB, Chen LY (2009) How to enhance the security of e-passport. In: 2009 international conference on machine learning and cybernetics, vol 5. IEEE, pp 2922–2926 Jeng AB, Chen LY (2009) How to enhance the security of e-passport. In: 2009 international conference on machine learning and cybernetics, vol 5. IEEE, pp 2922–2926
36.
Zurück zum Zitat Vaudenay S (2007) E-passport threats. IEEE Secur Privacy 5(6):61–64CrossRef Vaudenay S (2007) E-passport threats. IEEE Secur Privacy 5(6):61–64CrossRef
37.
Zurück zum Zitat Abid M, Afifi H (2008) Secure e-passport protocol using elliptic curve Diffie-Hellman key agreement protocol. In: Fourth international conference on information assurance and security, 2008. ISIAS’08. IEEE, pp 99–102 Abid M, Afifi H (2008) Secure e-passport protocol using elliptic curve Diffie-Hellman key agreement protocol. In: Fourth international conference on information assurance and security, 2008. ISIAS’08. IEEE, pp 99–102
38.
Zurück zum Zitat Abid M, Kanade S, Petrovska-Delacrétaz D, Dorizzi B, Afifi H (2010) Iris based authentication mechanism for e-passports. In: 2nd international workshop on security and communication networks (IWSCN), 2010. IEEE, pp 1–5 Abid M, Kanade S, Petrovska-Delacrétaz D, Dorizzi B, Afifi H (2010) Iris based authentication mechanism for e-passports. In: 2nd international workshop on security and communication networks (IWSCN), 2010. IEEE, pp 1–5
39.
Zurück zum Zitat Kang SY, Lee DG, Lee IY (2008) A study on secure RFID mutual authentication scheme in pervasive computing environment. Comput Commun 31(18):4248–4254CrossRef Kang SY, Lee DG, Lee IY (2008) A study on secure RFID mutual authentication scheme in pervasive computing environment. Comput Commun 31(18):4248–4254CrossRef
40.
Zurück zum Zitat Alomair B, Clark A, Cuellar J, Poovendran R (2012) Scalable RFID systems: a privacy-preserving protocol with constant-time identification. IEEE Trans Parallel Distrib Syst 23(8):1536–1550CrossRef Alomair B, Clark A, Cuellar J, Poovendran R (2012) Scalable RFID systems: a privacy-preserving protocol with constant-time identification. IEEE Trans Parallel Distrib Syst 23(8):1536–1550CrossRef
41.
Zurück zum Zitat Alomair B, Poovendran R (2010) Privacy versus scalability in radio frequency identification systems. Comput Commun 33(18):2155–2163CrossRef Alomair B, Poovendran R (2010) Privacy versus scalability in radio frequency identification systems. Comput Commun 33(18):2155–2163CrossRef
42.
Zurück zum Zitat Song B, Mitchell CJ (2011) Scalable RFID security protocols supporting tag ownership transfer. Comput Commun 34(4):556–566CrossRef Song B, Mitchell CJ (2011) Scalable RFID security protocols supporting tag ownership transfer. Comput Commun 34(4):556–566CrossRef
43.
Zurück zum Zitat Doss R, Sundaresan S, Zhou W (2012) A practical quadratic residues based scheme for authentication and privacy in mobile RFID systems. Ad Hoc Netw 1(1):383–396 Doss R, Sundaresan S, Zhou W (2012) A practical quadratic residues based scheme for authentication and privacy in mobile RFID systems. Ad Hoc Netw 1(1):383–396
44.
Zurück zum Zitat Moessner M, Khan GN (2012) Secure authentication scheme for passive C1G2 RFID tags. Comput Netw 56(1):273–286CrossRef Moessner M, Khan GN (2012) Secure authentication scheme for passive C1G2 RFID tags. Comput Netw 56(1):273–286CrossRef
45.
Zurück zum Zitat Doss R, Zhou W, Sundaresan S, Yu S, Gao L (2012) A minimum disclosure approach to authentication and privacy in RFID systems. Comput Netw 56(15):3401–3416CrossRef Doss R, Zhou W, Sundaresan S, Yu S, Gao L (2012) A minimum disclosure approach to authentication and privacy in RFID systems. Comput Netw 56(15):3401–3416CrossRef
46.
Zurück zum Zitat Duc DN, Kim K (2011) Defending RFID authentication protocols against DoS attacks. Comput Commun 34(3):384–390CrossRef Duc DN, Kim K (2011) Defending RFID authentication protocols against DoS attacks. Comput Commun 34(3):384–390CrossRef
48.
Zurück zum Zitat Van Le T, Burmester M, De Medeiros B (2007) Universally composable and forward-secure RFID authentication and authenticated key exchange. In: Proceedings of the 2nd ACM symposium on information, computer and communications security. ACM, pp 242–252 Van Le T, Burmester M, De Medeiros B (2007) Universally composable and forward-secure RFID authentication and authenticated key exchange. In: Proceedings of the 2nd ACM symposium on information, computer and communications security. ACM, pp 242–252
49.
Zurück zum Zitat Burmester M, Van Le T, De Medeiros B, Tsudik G (2009) Universally composable RFID identification and authentication protocols. ACM Trans Inf Syst Secur (TISSEC) 12(4):21CrossRef Burmester M, Van Le T, De Medeiros B, Tsudik G (2009) Universally composable RFID identification and authentication protocols. ACM Trans Inf Syst Secur (TISSEC) 12(4):21CrossRef
50.
Zurück zum Zitat Yeh TC, Wang YJ, Kuo TC, Wang SS (2010) Securing RFID systems conforming to EPC class 1 generation 2 standard. Expert Syst Appl 37(12):7678–7683CrossRef Yeh TC, Wang YJ, Kuo TC, Wang SS (2010) Securing RFID systems conforming to EPC class 1 generation 2 standard. Expert Syst Appl 37(12):7678–7683CrossRef
51.
Zurück zum Zitat Yoon EJ (2012) Improvement of the securing RFID systems conforming to EPC class 1 generation 2 standard. Expert Syst Appl 39(1):1589–1594CrossRef Yoon EJ (2012) Improvement of the securing RFID systems conforming to EPC class 1 generation 2 standard. Expert Syst Appl 39(1):1589–1594CrossRef
52.
Zurück zum Zitat Chien HY (2007) SASI: a new ultralightweight RFID authentication protocol providing strong authentication and strong integrity. IEEE Trans Depend Secure Comput 4(4):337–340MathSciNetCrossRef Chien HY (2007) SASI: a new ultralightweight RFID authentication protocol providing strong authentication and strong integrity. IEEE Trans Depend Secure Comput 4(4):337–340MathSciNetCrossRef
53.
Zurück zum Zitat Phan RW (2009) Cryptanalysis of a new ultralightweight RFID authentication protocol—SASI. IEEE Trans Depend Secure Comput 6(4):316–320CrossRef Phan RW (2009) Cryptanalysis of a new ultralightweight RFID authentication protocol—SASI. IEEE Trans Depend Secure Comput 6(4):316–320CrossRef
54.
Zurück zum Zitat Cao T, Bertino E, Lei H (2009) Security analysis of the SASI protocol. IEEE Trans Depend Secure Comput 6(1):73–77CrossRef Cao T, Bertino E, Lei H (2009) Security analysis of the SASI protocol. IEEE Trans Depend Secure Comput 6(1):73–77CrossRef
55.
Zurück zum Zitat Sun HM, Ting WC, Wang KH (2011) On the security of Chien’s ultralightweight RFID authentication protocol. IEEE Trans Depend Secure Comput 8(2):315–317CrossRef Sun HM, Ting WC, Wang KH (2011) On the security of Chien’s ultralightweight RFID authentication protocol. IEEE Trans Depend Secure Comput 8(2):315–317CrossRef
56.
Zurück zum Zitat D’Arco P, De Santis A (2011) On ultralightweight RFID authentication protocols. IEEE Trans Depend Secure Comput 8(4):548–563CrossRef D’Arco P, De Santis A (2011) On ultralightweight RFID authentication protocols. IEEE Trans Depend Secure Comput 8(4):548–563CrossRef
57.
Zurück zum Zitat Tian Y, Chen G, Li J (2012) A new ultralightweight RFID authentication protocol with permutation. IEEE Commun Lett 16(5):702–705CrossRef Tian Y, Chen G, Li J (2012) A new ultralightweight RFID authentication protocol with permutation. IEEE Commun Lett 16(5):702–705CrossRef
58.
Zurück zum Zitat Lee YK, Sakiyama K, Batina L, Verbauwhede I (2008) Elliptic-curve-based security processor for RFID. IEEE Trans Comput 57(11):1514–1527MathSciNetCrossRef Lee YK, Sakiyama K, Batina L, Verbauwhede I (2008) Elliptic-curve-based security processor for RFID. IEEE Trans Comput 57(11):1514–1527MathSciNetCrossRef
59.
Zurück zum Zitat Gaubatz G, Kaps JP, Ozturk E, Sunar B (2005) State of the art in ultra-low power public key cryptography for wireless sensor networks. In: Pervasive computing and communications workshops, 2005. Third IEEE international conference on PerCom 2005 workshops. IEEE, pp 146–150 Gaubatz G, Kaps JP, Ozturk E, Sunar B (2005) State of the art in ultra-low power public key cryptography for wireless sensor networks. In: Pervasive computing and communications workshops, 2005. Third IEEE international conference on PerCom 2005 workshops. IEEE, pp 146–150
60.
Zurück zum Zitat Tuyls P, Batina L (2006) RFID-tags for Anti-Counterfeiting. In: Topics in cryptology-CT-RSA 2006. Springer, Berlin, pp 115–131 Tuyls P, Batina L (2006) RFID-tags for Anti-Counterfeiting. In: Topics in cryptology-CT-RSA 2006. Springer, Berlin, pp 115–131
61.
Zurück zum Zitat Lee YK, Batina L, Verbauwhede I (2008) EC-RAC (ECDLP based randomized access control): provably secure RFID authentication protocol. In: 2008 IEEE international conference on RFID. IEEE, pp 97–104 Lee YK, Batina L, Verbauwhede I (2008) EC-RAC (ECDLP based randomized access control): provably secure RFID authentication protocol. In: 2008 IEEE international conference on RFID. IEEE, pp 97–104
62.
Zurück zum Zitat Mao W (2003) Modern cryptography—theory And practice. Prentice Hall, New Jersey, pp 196–203 Mao W (2003) Modern cryptography—theory And practice. Prentice Hall, New Jersey, pp 196–203
63.
Zurück zum Zitat Chen Y, Chou JS, Sun HM (2008) A novel mutual authentication scheme based on quadratic residues for RFID systems. Comput Netw 52(12):2373–2380CrossRefMATH Chen Y, Chou JS, Sun HM (2008) A novel mutual authentication scheme based on quadratic residues for RFID systems. Comput Netw 52(12):2373–2380CrossRefMATH
64.
Zurück zum Zitat Cao T, Shen P, Bertino E (2008) Cryptanalysis of some RFID authentication protocols. J Commun 3(7):20–27CrossRef Cao T, Shen P, Bertino E (2008) Cryptanalysis of some RFID authentication protocols. J Commun 3(7):20–27CrossRef
65.
Zurück zum Zitat Stinson DR (1995) Cryptography—theory and practice, CRC Press Inc., Boca Raton Stinson DR (1995) Cryptography—theory and practice, CRC Press Inc., Boca Raton
66.
Zurück zum Zitat Ouafi K, Phan RCW (2008) Traceable privacy of recent provably-secure RFID protocols. In: Applied cryptography and network security. Springer, Berlin, pp 479–489 Ouafi K, Phan RCW (2008) Traceable privacy of recent provably-secure RFID protocols. In: Applied cryptography and network security. Springer, Berlin, pp 479–489
67.
Zurück zum Zitat Habibi MH, Aref MR, Ma D (2011) Addressing flaws in RFID authentication protocols. In: Progress in cryptology-INDOCRYPT 2011. Springer, Berlin, pp 216–235 Habibi MH, Aref MR, Ma D (2011) Addressing flaws in RFID authentication protocols. In: Progress in cryptology-INDOCRYPT 2011. Springer, Berlin, pp 216–235
68.
Zurück zum Zitat Lim CH, Kwon T (2006) Strong and robust RFID authentication enabling perfect ownership transfer. In: Information and communications security. Springer, Berlin, pp 1–20 Lim CH, Kwon T (2006) Strong and robust RFID authentication enabling perfect ownership transfer. In: Information and communications security. Springer, Berlin, pp 1–20
Metadaten
Titel
An efficient mutual authentication RFID scheme based on elliptic curve cryptography
verfasst von
Jue-Sam Chou
Publikationsdatum
01.10.2014
Verlag
Springer US
Erschienen in
The Journal of Supercomputing / Ausgabe 1/2014
Print ISSN: 0920-8542
Elektronische ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-013-1073-x

Weitere Artikel der Ausgabe 1/2014

The Journal of Supercomputing 1/2014 Zur Ausgabe