An Improved Secure RFID Authentication Protocol Using Elliptic Curve Cryptography

被引:0
|
作者
Liu, Wan-Rong [1 ]
Ji, Zhi-Yong [1 ]
Chu, Cheng-Chen [1 ]
机构
[1] Shanghai Sixth People’s Hospital, Affiliated to Shanghai Jiao Tong University School of Medicine, Shanghai,201306, China
关键词
Automation - Geometry - Internet of things - Public key cryptography - Radio frequency identification (RFID) - Radio waves;
D O I
10.6633/IJNS.202401_26(1).14
中图分类号
学科分类号
摘要
Radio-frequency identification technology is one of the critical technologies of the Internet of Things. It is a non-contact automatic identification technology. People tend only to pay attention to the accelerated development of its technology and ignore the security problems of the technology; radio-frequency identification technology development is no exception. Its security problems are becoming increasingly prominent. Because the radiofrequency identification system in the Internet of Things carries a large amount of user privacy information, its security problem will directly restrict the promotion and application of the Internet of Things. Therefore, the research of radio-frequency identification security authentication technology is significant to the healthy development of the Internet of Things. We propose an improved secure RFID authentication protocol using elliptic curve cryptography based on Izza et al.’s protocol. BAN logic is used to prove the improved protocol. Meanwhile, we carry out a comparative analysis of performance and efficiency. The results show that the improved protocol has higher security and lower calculation costs. © (2024) All Rights Reserved.
引用
收藏
页码:106 / 115
相关论文
共 50 条
  • [41] Design of a secure anonymity-preserving authentication scheme for session initiation protocol using elliptic curve cryptography
    Saru Kumari
    Marimuthu Karuppiah
    Ashok Kumar Das
    Xiong Li
    Fan Wu
    Vidushi Gupta
    Journal of Ambient Intelligence and Humanized Computing, 2018, 9 : 643 - 653
  • [42] A novel and provably secure mutual authentication protocol for cloud environment using elliptic curve cryptography and fuzzy verifier
    Patel, Khushboo A.
    Shukla, Shivangi
    Patel, Sankita J.
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2024, 36 (02):
  • [43] A secure elliptic curve cryptography based mutual authentication protocol for cloud-assisted TMIS
    Kumar, Vinod
    Ahmad, Musheer
    Kumari, Adesh
    TELEMATICS AND INFORMATICS, 2019, 38 : 100 - 117
  • [44] A Secure Non-interactive Deniable Authentication Protocol with Certificates Based on Elliptic Curve Cryptography
    Chuang, Yu-Hao
    Hsu, Chien-Lung
    Shu, Wesley
    Hsu, Kevin C.
    Liao, Min-Wen
    NEW TRENDS IN INTELLIGENT INFORMATION AND DATABASE SYSTEMS, 2015, 598 : 183 - 190
  • [45] An efficient mutual authentication RFID scheme based on elliptic curve cryptography
    Chou, Jue-Sam
    JOURNAL OF SUPERCOMPUTING, 2014, 70 (01): : 75 - 94
  • [46] A Roaming Authentication Protocol based on Elliptic Curve Cryptography in IOV
    Shen Cen
    Mu Haibing
    PROCEEDINGS OF 2017 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2017, : 400 - 404
  • [47] Elliptic Curve Cryptography on E-passport Authentication Protocol
    Saoudi, Safa
    Yousfi, Souheib
    Robbana, Riadh
    2017 IEEE/ACS 14TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2017, : 1253 - 1260
  • [48] Design of Secure Group Key Agreement Protocol using Elliptic Curve Cryptography
    Jaiswal, Priyanka
    Kumar, Abhimanyu
    Tripathi, Sachin
    2014 INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND APPLICATIONS (ICHPCA), 2014,
  • [49] An efficient mutual authentication RFID scheme based on elliptic curve cryptography
    Jue-Sam Chou
    The Journal of Supercomputing, 2014, 70 : 75 - 94
  • [50] A Secure Elliptic Curve-Based RFID Protocol
    Santi Martínez
    Magda Valls
    Concepció Roig
    Josep M. Miret
    Francesc Giné
    JournalofComputerScience&Technology, 2009, 24 (02) : 309 - 318