A Secured RFID Lightweight Authentication Protocol based on Elliptic Curve Cryptography using modified PRNG Algorithm

被引:0
|
作者
Origines, Domingo V., Jr. [1 ]
Sison, Ariel M. [2 ]
Medina, Ruji P. [1 ]
机构
[1] Technol Inst Philippines, Grad Sch, Quezon City, Philippines
[2] Emilio Aguinaldo Coll, Manila, Philippines
关键词
Elliptic Curve Cryptography; Pseudo-Random Number Generator; Linear Congruential Generator; RFID; MUTUAL-AUTHENTICATION; SCHEME;
D O I
10.1145/3366650.3366664
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, the goal is to enhance the lightweight Authentication Protocol using Epoch Timestamp as Seed for PRNG Protocol based on Elliptic Curve Cryptography. The proposed enhancement uses PRNG Algorithm where randomness is generated using real-time system clock converted into running epoch timestamp as Seed for PRNG on LCG Algorithm that will do Bootstrap Iteration in generating a Random Number as keys for ECC Mutual Authentication Protocol. The result shows that the enhanced ECC Protocol utilizes smaller storage requirements of 2560bits + 640w bits, communication cost of 1,120bits faster response time and throughput, and lesser computational cost of 207ms for the Tag and the Server was achieved compared to Zheng Protocol. Also, the performance of this proposed Protocol has many advantages in terms of confidentiality, mutual authentication, availability, forward security, anonymity, spoofing/cloning, scalability and so on, which can resist tracking attacks, denial of service attacks, and system internal attack. It is therefore suggested that some practical applications using a RFID system that requires security for the lightweight authentication protocol should be introduced and more appropriate.
引用
收藏
页码:73 / 80
页数:8
相关论文
共 50 条
  • [31] An Efficient Authentication Protocol Based on Elliptic Curve Cryptography for Mobile Networks
    Rajeswari, P. G.
    Thilagavathi, K.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (02): : 176 - 185
  • [32] Elliptic Curve Cryptography-Based RFID Authentication Resisting Active Tracking
    Chien, Hung-Yu
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 94 (04) : 2925 - 2936
  • [33] An elliptic curve cryptography based lightweight authentication scheme for smart grid communication
    Mahmood, Khalid
    Chaudhry, Shehzad Ashraf
    Naqvi, Husnain
    Kumari, Saru
    Li, Xiong
    Sangaiah, Arun Kumar
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 81 : 557 - 565
  • [34] An Efficient RFID Authentication Scheme Based on Elliptic Curve Cryptography for Internet of Things
    Mustapha Benssalah
    Izza Sarah
    Karim Drouiche
    Wireless Personal Communications, 2021, 117 : 2513 - 2539
  • [35] Elliptic Curve Cryptography-Based RFID Authentication Resisting Active Tracking
    Hung-Yu Chien
    Wireless Personal Communications, 2017, 94 : 2925 - 2936
  • [36] Vulnerability analysis of elliptic curve cryptography-based RFID authentication protocols
    Lv, Chao
    Li, Hui
    Ma, Jianfeng
    Zhang, Yaoyu
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2012, 23 (07): : 618 - 624
  • [37] An Efficient RFID Authentication Scheme Based on Elliptic Curve Cryptography for Internet of Things
    Benssalah, Mustapha
    Sarah, Izza
    Drouiche, Karim
    WIRELESS PERSONAL COMMUNICATIONS, 2021, 117 (03) : 2513 - 2539
  • [38] Lightweight Authentication and Key Management on 802.11 with Elliptic Curve Cryptography
    Namal, Suneth
    Georgantas, Konstantinos
    Gurtov, Andrei
    2013 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2013, : 1830 - 1835
  • [39] An Advanced Encryption Standard Powered Mutual Authentication Protocol Based on Elliptic Curve Cryptography for RFID, Proven on WISP
    Ibrahim, Alaauldin
    Dalkilic, Gokhan
    JOURNAL OF SENSORS, 2017, 2017
  • [40] Lightweight anonymous authentication protocol for resource-constrained smart home devices based on elliptic curve cryptography
    Nyangaresi, Vincent Omollo
    JOURNAL OF SYSTEMS ARCHITECTURE, 2022, 133