Filters








469 Hits in 2.8 sec

Design of a Mutual Authentication Protocol for RFID Based on ECC

Kang Hong-yan
2015 Open Automation and Control Systems Journal  
authentication protocol, on the basis of deep analysis of the existing RFID protocol based on ECC.  ...  A low-cost, efficient and safe mutual authentication protocol for RFID based on elliptic curve cryptography (ECC) is proposed, specific to the security and privacy problem existed in the existing RFID  ...  CONCLUSION The paper has designed an anonymous mutual authentication protocol for RFID based on ECC.  ... 
doi:10.2174/1874444301507011532 fatcat:r56ovule7ncgnosxgcoxqbdrbq

An Advanced Encryption Standard Powered Mutual Authentication Protocol Based on Elliptic Curve Cryptography for RFID, Proven on WISP

Alaauldin Ibrahim, Gökhan Dalkılıç
2017 Journal of Sensors  
In this paper, we propose a mutual authentication protocol for RFID tags based on elliptic curve cryptography and advanced encryption standard.  ...  The proposed scheme achieves mutual authentication in just two steps and satisfies all the essential security requirements of RFID-based healthcare systems.  ...  Based on Okamoto's authentication protocol, Batina et al. [14] proposed an ECC-based RFID authentication protocol that they claimed could avoid active attacks. Lee et al.  ... 
doi:10.1155/2017/2367312 fatcat:bfiqtgraj5ecre7dnwq7uhsqsi

ERAP: ECC Based RFID Authentication Protocol

Sheikh Iqbal Ahamed, Farzana Rahman, Endadul Hoque
2008 2008 12th IEEE International Workshop on Future Trends of Distributed Computing Systems  
In this paper, we propose a secure, mutual offline authentication protocol which is based on ECC. Finally, we present security analysis of our proposed authentication protocol.  ...  RFID tags are a new generation of small devices used for identification in many applications today.  ...  As our protocol is based on ECC, each party ( CA , tag and reader) needs to be capable of performing calculations based on ECC.  ... 
doi:10.1109/ftdcs.2008.20 dblp:conf/ftdcs/AhamedRH08 fatcat:it37chwap5dydhuargomozyzsy

Lightweight ECC based RFID Authentication Protocol

2020 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
However, abounding new published ECC based RFID protocols have severe security vulnerability.  ...  With more rigid security concern to RFID based authentication protocols, ECC (elliptic curve cryptography) established Radio Frequency Identification verification protocols is being expected to fit the  ...  that is based on ECC (Elliptic Curve Cryptography).  ... 
doi:10.35940/ijitee.g5189.059720 fatcat:cywqottfb5g53fkhpy5n7o64t4

Improving Security of RFID Authentication Protocol Based on Fast Fourier Transform and Deoxyribonucleic Acid

Vibhu Grewal
2017 International Journal of Advanced Research in Computer Science and Software Engineering  
RFID based applications used for many purposes like tagging and tracking for tag and reader in IoT deployment.  ...  Our proposed protocol is highly secure and its strength is based on FFT and DNA encoding rules.  ...  METHODOLOGY This paper proposes a new FFT and DNA based mutual authentication protocol that fulfils the RFID security requirements.  ... 
doi:10.23956/ijarcsse.v7i10.448 fatcat:eiyeicrpgzcijef6sgmdwl346e

Novel ECC-Based RFID Mutual Authentication Protocol for Emerging IoT Applications

Souhir Gabsi, Yassin Kortli, Vincent Beroulle, Yann Kieffer, Areej Alasiry, Belagcem Hamdi
2021 IEEE Access  
Acknowledgement: The authors extend their appreciation to the Deanship of Scientific Research at King Khalid University (KKU) for funding this work through General Research Project under grant number (  ...  [41] , we will propose our new RFID authentication protocol based on ECC.  ...  Later, in 2014, Liao et al. have proposed in [38] a secure RFID mutual authentication protocol based on ECC and integrating a public-key transfer.  ... 
doi:10.1109/access.2021.3112554 fatcat:zheyzvekmfd7bm7pla2i3aflry

RFID Authentication Scheme based on Hyperelliptic Curve Signcryption

Usman Ali, Mohd Yamani Idna Idris, Mohamad Nizam Bin Ayub, Insaf Ullah, Ihsan Ali, Tarak Nandy, Muktar Yahuza, Nauman Khan
2021 IEEE Access  
[19] suggested Elliptic Curve Signcryption based RFID authentication protocol. The security and efficacy of their proposed protocol are based on ECC.  ...  [19] proposed an RFID authentication protocol based on Elliptic Curve Signcryption.  ... 
doi:10.1109/access.2021.3069429 fatcat:mylr6k5uibcwpjoj3yf32gq37a

SLEC: A Novel Serverless RFID Authentication Protocol Based on Elliptic Curve Cryptography

Rania Baashirah, Abdelshakour Abuzneid
2019 Electronics  
We propose a new secure serverless RFID authentication protocol based on the famous elliptic curve cryptography (ECC).  ...  Using a serverless RFID system is an alternative solution to using a central server. In this model, both the reader and the tag perform mutual authentication without the need for the central server.  ...  mutual authentication protocol (EMA) [7] , and ECC-based authentication protocol PII [8] .  ... 
doi:10.3390/electronics8101166 fatcat:ut2z5x4q7vgbncb7nywgu6u3li

The communication and computation cost of wireless security

Dave Singelee, Stefaan Seys, Lejla Batina, Ingrid Verbauwhede
2011 Proceedings of the fourth ACM conference on Wireless network security - WiSec '11  
The authors also discuss how their protocol can be extended to offer advanced security and privacy protection. • ISO 9798-2 mutual entity authentication protocol based on AES: Most RFID authentication  ...  Since the protocol makes use of a symmetric primitive, the reader and RFID tag share a secret key K. • ECC-based Randomized Schnorr protocol: Recently, various RFID authentication protocols (such as [  ... 
doi:10.1145/1998412.1998414 dblp:conf/wisec/SingeleeSBV11 fatcat:wg2mnnekdvcczodvtvy3di6fnm

Elliptic Curve Signcryption Based Security Protocol for RFID

2020 KSII Transactions on Internet and Information Systems  
In this paper, an efficient elliptic curve signcryption based security protocol for RFID has been proposed, which provides mutual authentication, confidentiality, non-repudiation, integrity, availability  ...  Earlier, the security protocols for RFID based on hash functions and symmetric key cryptography have been proposed.  ...  Chiou, Ko, and Lu [39] developed an ECC based mutual authentication protocol for mobile RFID.  ... 
doi:10.3837/tiis.2020.01.019 fatcat:svxel7h4pzfuvl26f6pvofxfxy

An Elliptic Curve-based Mutual Authentication Scheme for RFID Implant Systems

Sanaz Rahimi Moosavi, Ethiopia Nigussie, Seppo Virtanen, Jouni Isoaho
2014 Procedia Computer Science  
Section 3 discusses the security requirements and threat models of RFID implant systems. Section 4 presents our proposed ECC-based mutual authentication scheme to the RFID implant systems.  ...  In this paper, a secure mutual authentication scheme for an RFID implant system is developed.  ...  In this section, we examine some of the existing ECC-based security schemes for RFID systems since our proposed authentication scheme also relies on ECC.  ... 
doi:10.1016/j.procs.2014.05.415 fatcat:62b3tc2qsfa73cw3wfjt2uqfuq

Survey: Vulnerability Analysis of Low-Cost ECC-Based RFID Protocols against Wireless and Side-Channel Attacks

Souhir Gabsi, Vincent Beroulle, Yann Kieffer, Hiep Manh Dao, Yassin Kortli, Belgacem Hamdi
2021 Sensors  
In this paper, we first review the most relevant ECC-based RFID authentication protocols, focusing on their security analysis and operational performances.  ...  For this purpose, we classify the different threats that can target an ECC-based RFID system.  ...  Protocol Benssalah proposed in his paper [113] published in 2020 a new RFID authentication protocol based on ECC.  ... 
doi:10.3390/s21175824 pmid:34502714 pmcid:PMC8434319 fatcat:pkjqudq7mncfzeuwjocjfjrxfm

Yet Another Strong Privacy-Preserving RFID Mutual Authentication Protocol [chapter]

Raghuvir Songhela, Manik Lal Das
2014 Lecture Notes in Computer Science  
In this paper, we present a mutual authentication protocol for RFID systems using elliptic curves arithmetic.  ...  In order to achieve privacy and to provide scalability and anti-cloning features of RFID system, public-key primitives should be used in an RFID authentication protocol [1] .  ...  In this paper, we present a mutual authentication protocol for RFID system using ECC arithmetic, which provides narrow-strong and wideweak privacy under standard complexity assumption.  ... 
doi:10.1007/978-3-319-12060-7_12 fatcat:d6cjjnyqs5cpneedpiygospzwi

A novel grouping proof authentication protocol for lightweight devices: GPAPXR+

2020 Turkish Journal of Electrical Engineering and Computer Sciences  
In this study, 11 a new grouping proof authentication protocol is developed for lightweight devices.  ...  The proposed protocol implemented 12 on wireless identification and sensing platform (WISP) passive RFID tag, uses embedded advanced encryption standard 13 encryption method to encrypt transmitted data  ...  Mersenne twister-based RFID authentication protocol.  ... 
doi:10.3906/elk-2004-5 fatcat:orvmjz24ifgpxhdgpym2rhy5hq

Authentication and Encryption of IoT Devices Based on Elliptic Curves: A survey

and Fahmi Khalifa 2 Ali E. Takieldeen1
2021 Zenodo  
Table 3 - 3 Summary from 2019 to 2020 for characteristics of the surveyed lightweight Elliptic Curve based protocols Work Basis Participants Security Analysis Performance Analysis -ECC -RFID Tag -Mutual  ...  attack -Impersonation Attack Avoidance -BAN LOGIC tool for authentication Proof -ECDH -RFID --Mutual Authentication -Number of operations Alamr et al. [22] -ECC -Anonymity -Forward Security -Location  ... 
doi:10.5281/zenodo.5301586 fatcat:5gtplqi7e5asrhi56kjre23n7a
« Previous Showing results 1 — 15 out of 469 results