An Improved Secure RFID Authentication Protocol Using Elliptic Curve Cryptography

被引:0
|
作者
Liu, Wan-Rong [1 ]
Ji, Zhi-Yong [1 ]
Chu, Cheng-Chen [1 ]
机构
[1] Shanghai Sixth People’s Hospital, Affiliated to Shanghai Jiao Tong University School of Medicine, Shanghai,201306, China
关键词
Automation - Geometry - Internet of things - Public key cryptography - Radio frequency identification (RFID) - Radio waves;
D O I
10.6633/IJNS.202401_26(1).14
中图分类号
学科分类号
摘要
Radio-frequency identification technology is one of the critical technologies of the Internet of Things. It is a non-contact automatic identification technology. People tend only to pay attention to the accelerated development of its technology and ignore the security problems of the technology; radio-frequency identification technology development is no exception. Its security problems are becoming increasingly prominent. Because the radiofrequency identification system in the Internet of Things carries a large amount of user privacy information, its security problem will directly restrict the promotion and application of the Internet of Things. Therefore, the research of radio-frequency identification security authentication technology is significant to the healthy development of the Internet of Things. We propose an improved secure RFID authentication protocol using elliptic curve cryptography based on Izza et al.’s protocol. BAN logic is used to prove the improved protocol. Meanwhile, we carry out a comparative analysis of performance and efficiency. The results show that the improved protocol has higher security and lower calculation costs. © (2024) All Rights Reserved.
引用
收藏
页码:106 / 115
相关论文
共 50 条
  • [21] A secure authentication scheme for session initiation protocol based on elliptic curve cryptography
    Chaudhry, Shehzad Ashraf
    Mahmood, Khalid
    Naqvi, Husnain
    Sher, Muhammad
    CIT/IUCC/DASC/PICOM 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - UBIQUITOUS COMPUTING AND COMMUNICATIONS - DEPENDABLE, AUTONOMIC AND SECURE COMPUTING - PERVASIVE INTELLIGENCE AND COMPUTING, 2015, : 1961 - 1966
  • [22] Authentication protocol based on elliptic curve cryptography
    Constantinescu, Nicolae
    ANNALS OF THE UNIVERSITY OF CRAIOVA-MATHEMATICS AND COMPUTER SCIENCE SERIES, 2010, 37 (02): : 83 - 91
  • [23] Efficient RFID Authentication Using Elliptic Curve Cryptography for the Internet of Things
    Shen, Han
    Shen, Jian
    Khan, Muhammad Khurram
    Lee, Jong-Hyouk
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 96 (04) : 5253 - 5266
  • [24] Efficient RFID Authentication Using Elliptic Curve Cryptography for the Internet of Things
    Han Shen
    Jian Shen
    Muhammad Khurram Khan
    Jong-Hyouk Lee
    Wireless Personal Communications, 2017, 96 : 5253 - 5266
  • [25] A secure protocol for Bluetooth piconets using elliptic curve cryptography
    Hwang, MS
    Lee, CC
    Lee, JZ
    Yang, CC
    TELECOMMUNICATION SYSTEMS, 2005, 29 (03) : 165 - 180
  • [26] A Secure Protocol for Bluetooth Piconets Using Elliptic Curve Cryptography
    Min-Shiang Hwang
    Cheng-Chi Lee
    Ji-Zhe Lee
    Chao-Chen Yang
    Telecommunication Systems, 2005, 29 : 165 - 180
  • [27] A Secured RFID Lightweight Authentication Protocol based on Elliptic Curve Cryptography using modified PRNG Algorithm
    Origines, Domingo V., Jr.
    Sison, Ariel M.
    Medina, Ruji P.
    2019 2ND INTERNATIONAL CONFERENCE ON COMPUTING AND BIG DATA (ICCBD 2019), 2019, : 73 - 80
  • [28] Elliptic Curve Cryptography Based Authentication Protocol for Small Computational Capacity RFID Systems
    Godor, Gyozo
    Szendi, Peter
    Imre, Sandor
    Q2SWINET 2010: PROCEEDINGS OF THE SIXTH ACM SYMPOSIUM ON QOS AND SECURITY FOR WIRELESS AND MOBILE NETWORKS, 2010, : 98 - 105
  • [29] A Provably Secure RFID Authentication Protocol Based on Elliptic Curve for Healthcare Environments
    Farash, Mohammad Sabzinejad
    Nawaz, Omer
    Mahmood, Khalid
    Chaudhry, Shehzad Ashraf
    Khan, Muhammad Khurram
    JOURNAL OF MEDICAL SYSTEMS, 2016, 40 (07)
  • [30] A Provably Secure RFID Authentication Protocol Based on Elliptic Curve for Healthcare Environments
    Mohammad Sabzinejad Farash
    Omer Nawaz
    Khalid Mahmood
    Shehzad Ashraf Chaudhry
    Muhammad Khurram Khan
    Journal of Medical Systems, 2016, 40