Home > CSC-OpenAccess Library > Manuscript Information
EXPLORE PUBLICATIONS BY COUNTRIES |
EUROPE | |
MIDDLE EAST | |
ASIA | |
AFRICA | |
............................. | |
United States of America | |
United Kingdom | |
Canada | |
Australia | |
Italy | |
France | |
Brazil | |
Germany | |
Malaysia | |
Turkey | |
China | |
Taiwan | |
Japan | |
Saudi Arabia | |
Jordan | |
Egypt | |
United Arab Emirates | |
India | |
Nigeria |
Novel construction of Secure RFID Authentication Protocol
Shafiqul Abidin
Pages - 33 - 36 | Revised - 10-09-2014 | Published - 10-10-2014
Published in International Journal of Security (IJS)
MORE INFORMATION
KEYWORDS
Authentication, ECDLP, Counterfeiting, Multicast.
ABSTRACT
This article proposes an efficient and secure authentication protocol for secure and low-cost RFID systems in random oracles. Security is one of the prime concerns of RFID system. Proposed protocol relies on Elliptic Curve Discrete Logarithm Problem (ECDLP) to achieve security. The protocol achieves the most important security goals scalability, anonymity and anti-cloning for RFID system. A password based protocol has vulnerability on fixed password. This can be exploited by threats. In the proposed protocol, there is a provision to change the password of the Tags. Hence the vulnerability can be reduced in an acceptable level. Computation cost is very less as compare to the other protocols.
"Certicom ECC Challenge and The Elliptic Curve Cryptosystem" available : http://www.certicom.com/index.php. | |
10. H.yeh, T.Ho Chen, Pin-Chuan Liu, Tai Hoo Kim and Hsin-Wen Wei A Secure Authenticated Protocol for Wireless Sensor Networks Using ECC, Sensor pp 4767- 4779, 2011. | |
C.Chatmon and T.Burmester Secure Anonymous RFID Authentication Protocols, available at www.cs.fsu.edu/ burmeste/TR-060112.pdf | |
D. Hankerson, A .Menezes and S.Vanstone. Guide to Elliptic Curve Cryptography, Springer Verlag, 2004. | |
D. N. Duc, and K. Kim Defending RFID authentication protocols against DoS attacks, Computer Communications, 2010. | |
E.K. Ryu, and T. Takagi A hybrid approach for privacy-preserving RFID tags,Computer Standards & Interfaces, Vol. 31, 2009, pp. 812-815. | |
Murat Fiskiran A and B Ruby Lee Workload characterization of elliptic curve cryptography and other network security algorithms for constrained environments. | |
S. Devadas, E. Suh, S. Paral, R. Sowell, T. Ziola, V. Khandelwal Design and implementation of PUF-based unclonable RFID ICs for anti-counterfeiting and security applications, Proceedings of the IEEE International Conference on RFID, April 2008, pp. 58–64. | |
Wenbo Mao Modern Cryptography - Theory And Practice, 2003, Prentice Hall, pp.196- 203. | |
Dr. Shafiqul Abidin
Department of Information Technology Northern India Engineering College (GGSIP University) Shastri Park, Delhi - 110053, India - India
shafiqulabidin@yahoo.co.in
|
|
|
|
View all special issues >> | |
|
|