A secure ECC-based mobile RFID mutual authentication protocol and its application

被引:6
|
作者
Chiou, Shin-Yan [1 ]
Ko, Wen-Tsai [1 ]
Lu, Erl-Huei [1 ]
机构
[1] Department of Electrical Engineering, Chang Gung University, 259, Wen-Hwa 1st Road, Kwei-Shan, Tao-Yuan, Taiwan
来源
关键词
Cryptography; -; Authentication;
D O I
10.6633/IJNS.2018xx.20(2).21
中图分类号
学科分类号
摘要
Mobile RFID applications combine RFID technologies and mobile device to create a new convenient application area. However, most of the applications suffer from the security issues due to insecure communication channels among tags, readers and servers. In 2012, Zhou et al. proposed an ECC-based mutual authentication protocol to promote mobile RFID applications security. However, we found their protocol faces to OTRUTS (one time reading and unlimited times service) problem, which means once a reader read the data of a certain tags from a server successfully, the reader can read it unlimited times without reading those tags again. Therefore, their protocol cannot securely support some mobile RFID applications such as the security patrolling application. In this paper, we propose a new secure ECC-based mobile RFID mutual authentication protocol for the safety of mobile RFID applications such as security patrolling.
引用
收藏
页码:396 / 402
相关论文
共 50 条
  • [21] ECCbAP: A secure ECC-based authentication protocol for IoT edge devices
    Rostampour S.
    Safkhani M.
    Bendavid Y.
    Bagheri N.
    Pervasive and Mobile Computing, 2020, 67
  • [22] Vulnerabilities of an ECC-based RFID authentication scheme
    Li, Nan
    Mu, Yi
    Susilo, Willy
    Guo, Fuchun
    Varadharajan, Vijay
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (17) : 3262 - 3270
  • [23] A scalable and secure RFID mutual authentication protocol using ECC for Internet of Things
    Naeem, Muhammad
    Chaudhry, Shehzad Ashraf
    Mahmood, Khalid
    Karuppiah, Marimuthu
    Kumari, Saru
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2020, 33 (13)
  • [24] ECC-based lightweight authentication protocol with untraceability for low-cost RFID
    Chien, Hung-Yu
    Laih, Chi-Sung
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2009, 69 (10) : 848 - 853
  • [25] A SECURE AND EFFICIENT ECC-BASED AKA PROTOCOL FOR WIRELESS MOBILE COMMUNICATIONS
    Lo, Jung-Wen
    Lee, Cheng-Chi
    Hwang, Min-Shiang
    Chu, Yen-Ping
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2010, 6 (11): : 5249 - 5258
  • [26] A provably secure ECC-based access and handover authentication protocol for space information networks
    Guo, Junyan
    Du, Ye
    Zhang, Yahang
    Li, Meihong
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2021, 193
  • [27] ERMAP: ECC-based robust mutual authentication protocol for smart grid communication with AVISPA simulations
    Rajaram, Sangeetha
    Vollala, Satyanarayana
    Ramasubramanian, N.
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2022, 41 (04) : 232 - 245
  • [28] Mobile RFID Mutual Authentication Protocol Based on Hash Function
    Yu, Wenjin
    Jiang, Yixiang
    2017 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2017, : 358 - 361
  • [29] A Secure and Privacy Friendly ECC Based RFID Authentication Protocol for Practical Applications
    Arslan, Atakan
    Colak, Sultan Aldirmaz
    Erturk, Sarp
    WIRELESS PERSONAL COMMUNICATIONS, 2021, 120 (04) : 2653 - 2691
  • [30] A Secure and Privacy Friendly ECC Based RFID Authentication Protocol for Practical Applications
    Atakan Arslan
    Sultan Aldırmaz Çolak
    Sarp Ertürk
    Wireless Personal Communications, 2021, 120 : 2653 - 2691