A Secured RFID Lightweight Authentication Protocol based on Elliptic Curve Cryptography using modified PRNG Algorithm

被引:0
|
作者
Origines, Domingo V., Jr. [1 ]
Sison, Ariel M. [2 ]
Medina, Ruji P. [1 ]
机构
[1] Technol Inst Philippines, Grad Sch, Quezon City, Philippines
[2] Emilio Aguinaldo Coll, Manila, Philippines
关键词
Elliptic Curve Cryptography; Pseudo-Random Number Generator; Linear Congruential Generator; RFID; MUTUAL-AUTHENTICATION; SCHEME;
D O I
10.1145/3366650.3366664
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, the goal is to enhance the lightweight Authentication Protocol using Epoch Timestamp as Seed for PRNG Protocol based on Elliptic Curve Cryptography. The proposed enhancement uses PRNG Algorithm where randomness is generated using real-time system clock converted into running epoch timestamp as Seed for PRNG on LCG Algorithm that will do Bootstrap Iteration in generating a Random Number as keys for ECC Mutual Authentication Protocol. The result shows that the enhanced ECC Protocol utilizes smaller storage requirements of 2560bits + 640w bits, communication cost of 1,120bits faster response time and throughput, and lesser computational cost of 207ms for the Tag and the Server was achieved compared to Zheng Protocol. Also, the performance of this proposed Protocol has many advantages in terms of confidentiality, mutual authentication, availability, forward security, anonymity, spoofing/cloning, scalability and so on, which can resist tracking attacks, denial of service attacks, and system internal attack. It is therefore suggested that some practical applications using a RFID system that requires security for the lightweight authentication protocol should be introduced and more appropriate.
引用
收藏
页码:73 / 80
页数:8
相关论文
共 50 条
  • [41] Lightweight anonymous authentication protocol for resource-constrained smart home devices based on elliptic curve cryptography
    Nyangaresi, Vincent Omollo
    Journal of Systems Architecture, 2022, 133
  • [42] Lightweight Challenge-Response Authentication in SDN-Based UAVs Using Elliptic Curve Cryptography
    Usman, Muhammad
    Amin, Rashid
    Aldabbas, Hamza
    Alouffi, Bader
    ELECTRONICS, 2022, 11 (07)
  • [43] Elliptic curve cryptography based mutual authentication scheme for session initiation protocol
    R. Arshad
    N. Ikram
    Multimedia Tools and Applications, 2013, 66 : 165 - 178
  • [44] A lightweight remote user authentication scheme for IoT communication using elliptic curve cryptography
    Dipanwita Sadhukhan
    Sangram Ray
    G. P. Biswas
    M. K. Khan
    Mou Dasgupta
    The Journal of Supercomputing, 2021, 77 : 1114 - 1151
  • [45] Authentication and Encryption Using Modified Elliptic Curve Cryptography with Particle Swarm Optimization and Cuckoo Search Algorithm
    Kota S.
    Padmanabhuni V.N.R.
    Budda K.
    Sruthi K.
    Kota, Sujatha (sujathakota29@gmail.com), 2018, Springer (99) : 343 - 351
  • [46] A lightweight remote user authentication scheme for IoT communication using elliptic curve cryptography
    Sadhukhan, Dipanwita
    Ray, Sangram
    Biswas, G. P.
    Khan, M. K.
    Dasgupta, Mou
    JOURNAL OF SUPERCOMPUTING, 2021, 77 (02): : 1114 - 1151
  • [47] Construction of elliptic curve cryptography-based authentication protocol for internet of things
    Chhikara, Deepak
    Rana, Saurabh
    Mishra, Ankita
    Mishra, Dheerendra
    SECURITY AND PRIVACY, 2022, 5 (04)
  • [48] A secure authentication scheme for session initiation protocol based on elliptic curve cryptography
    Chaudhry, Shehzad Ashraf
    Mahmood, Khalid
    Naqvi, Husnain
    Sher, Muhammad
    CIT/IUCC/DASC/PICOM 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - UBIQUITOUS COMPUTING AND COMMUNICATIONS - DEPENDABLE, AUTONOMIC AND SECURE COMPUTING - PERVASIVE INTELLIGENCE AND COMPUTING, 2015, : 1961 - 1966
  • [49] Elliptic curve cryptography based mutual authentication scheme for session initiation protocol
    Arshad, R.
    Ikram, N.
    MULTIMEDIA TOOLS AND APPLICATIONS, 2013, 66 (02) : 165 - 178
  • [50] Three elliptic curve cryptography-based RFID authentication protocols for Internet of Things
    An, Rui
    Feng, Hui
    Liu, Qin
    Li, Li
    ADVANCES ON BROAD-BAND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS, 2017, 2 : 857 - 878