[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ Skip to main content
Log in

A Novel Authentication Management RFID Protocol Based on Elliptic Curve Cryptography

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

The existing RFID (Radio Frequency Identification) security protocol lacks the key establishment mechanism, assuming only that both parties of the authentication protocol have shared their respective session keys. However, key establishment is an integral part of the RFID security system. This article first introduces the elliptic curve related mathematical theory foundation. Then we establish the key negotiation mechanism, and analyze the correctness and rationality of the negotiation mechanism. Finally, we design the authentication protocol based on elliptic curve in mobile RFID system, analyze the protocol authentication process, and compare the security and performance with other protocols, which shows that the authentication protocol has more efficient performance and the ability to resist all kinds of attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (United Kingdom)

Instant access to the full article PDF.

Fig. 1
Fig. 2

Similar content being viewed by others

References

  1. Zhao, Z. (2014). A secure RFID authentication protocol for healthcare environments using elliptic curve cryptosystem. Journal of Medical Systems, 38(5), 1–7.

    Article  Google Scholar 

  2. Kumar, N., Kaur, K., Misra, S. C., & Iqbal, R. (2016). An intelligent RFID-enabled authentication scheme for healthcare applications in vehicular mobile cloud. Peer-to-Peer Networking and Applications, 9(5), 824–840.

    Article  Google Scholar 

  3. Niu, B., Zhu, X., & Li, H. (2013). An ultralightweight and privacy-preserving authentication protocol for mobile RFID systems. In Wireless communications and NETWORKING conference. IEEE, pp. 1864–1869.

  4. Kumar, A., & Om, H. (2016). Lightweight, ECC Based RFID authentication scheme for WLAN. International Journal of Business Data Communications and Networking, 12(2), 89–103.

    Article  Google Scholar 

  5. Cong, G., Zhang, Z. J., Zhu, L. H., et al. (2014). A novel secure group RFID authentication protocol. The Journal of China Universities of Posts and Telecommunications, 21(1), 94–103.

    Article  Google Scholar 

  6. Jin, C., Xu, C., Zhang, X., et al. (2016). A secure ECC-based RFID mutual authentication protocol to enhance patient medication safety. Journal of Medical Systems, 40(1), 1–6.

    Article  Google Scholar 

  7. Liao, Y. P., & Hsiao, C. M. (2014). A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol. Ad Hoc Networks, 18(7), 133–146.

    Article  Google Scholar 

  8. Chou, J. S. (2014). An efficient mutual authentication RFID scheme based on elliptic curve cryptography. The Journal of Supercomputing, 70(1), 75–94.

    Article  Google Scholar 

  9. Chou, J. S., Chen, Y., Wu, C. L., et al. (2011). An efficient RFID mutual authentication scheme based on ECC. IACR Cryptology Eprint Archive, 2011, 418.

    Google Scholar 

  10. Chien, H. Y. (2017). Elliptic curve cryptography-based RFID authentication resisting active tracking. Wireless Personal Communications, 94(4), 2925–2936.

    Article  Google Scholar 

  11. Chen, Y. L., & Chou, J. S. (2015). ECC-based untraceable authentication for large-scale active-tag RFID systems. Electronic Commerce Research, 15(1), 97–120.

    Article  Google Scholar 

  12. Tuyls, P., & Batina, L. (2006). RFID-tags for anti-counterfeiting. Lecture Notes in Computer Science, 3860, 115–131.

    Article  MathSciNet  MATH  Google Scholar 

  13. Yong, K. L., Batina, L., & Verbauwhede, I. (2008). EC-RAC (ECDLP Based Randomized Access Control): Provably secure RFID authentication protocol. In IEEE international conference on RFID. IEEE, pp. 97–104.

  14. Batina, L., Guajardo, J., Kerins, T., et al. (2007). Public-key cryptography for RFID-Tags. In IEEE international conference on pervasive computing and communications workshops, 2007. Percom workshops. IEEE, pp. 217–222.

  15. Zhou, J., Zhou, Y., Xiao, F., et al. (2012). Mutual authentication protocol for mobile RFID systems. Journal of Computational Information Systems, 8(8), 3261–3268.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fanyue Kong.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Liu, G., Zhang, H., Kong, F. et al. A Novel Authentication Management RFID Protocol Based on Elliptic Curve Cryptography. Wireless Pers Commun 101, 1445–1455 (2018). https://doi.org/10.1007/s11277-018-5771-9

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-018-5771-9

Keywords

Navigation