A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
Design of a Mutual Authentication Protocol for RFID Based on ECC
2015
Open Automation and Control Systems Journal
authentication protocol, on the basis of deep analysis of the existing RFID protocol based on ECC. ...
A low-cost, efficient and safe mutual authentication protocol for RFID based on elliptic curve cryptography (ECC) is proposed, specific to the security and privacy problem existed in the existing RFID ...
CONCLUSION The paper has designed an anonymous mutual authentication protocol for RFID based on ECC. ...
doi:10.2174/1874444301507011532
fatcat:r56ovule7ncgnosxgcoxqbdrbq
An Advanced Encryption Standard Powered Mutual Authentication Protocol Based on Elliptic Curve Cryptography for RFID, Proven on WISP
2017
Journal of Sensors
In this paper, we propose a mutual authentication protocol for RFID tags based on elliptic curve cryptography and advanced encryption standard. ...
The proposed scheme achieves mutual authentication in just two steps and satisfies all the essential security requirements of RFID-based healthcare systems. ...
Based on Okamoto's authentication protocol, Batina et al. [14] proposed an ECC-based RFID authentication protocol that they claimed could avoid active attacks. Lee et al. ...
doi:10.1155/2017/2367312
fatcat:bfiqtgraj5ecre7dnwq7uhsqsi
ERAP: ECC Based RFID Authentication Protocol
2008
2008 12th IEEE International Workshop on Future Trends of Distributed Computing Systems
In this paper, we propose a secure, mutual offline authentication protocol which is based on ECC. Finally, we present security analysis of our proposed authentication protocol. ...
RFID tags are a new generation of small devices used for identification in many applications today. ...
As our protocol is based on ECC, each party ( CA , tag and reader) needs to be capable of performing calculations based on ECC. ...
doi:10.1109/ftdcs.2008.20
dblp:conf/ftdcs/AhamedRH08
fatcat:it37chwap5dydhuargomozyzsy
Lightweight ECC based RFID Authentication Protocol
2020
VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE
However, abounding new published ECC based RFID protocols have severe security vulnerability. ...
With more rigid security concern to RFID based authentication protocols, ECC (elliptic curve cryptography) established Radio Frequency Identification verification protocols is being expected to fit the ...
that is based on ECC (Elliptic Curve Cryptography). ...
doi:10.35940/ijitee.g5189.059720
fatcat:cywqottfb5g53fkhpy5n7o64t4
Improving Security of RFID Authentication Protocol Based on Fast Fourier Transform and Deoxyribonucleic Acid
2017
International Journal of Advanced Research in Computer Science and Software Engineering
RFID based applications used for many purposes like tagging and tracking for tag and reader in IoT deployment. ...
Our proposed protocol is highly secure and its strength is based on FFT and DNA encoding rules. ...
METHODOLOGY This paper proposes a new FFT and DNA based mutual authentication protocol that fulfils the RFID security requirements. ...
doi:10.23956/ijarcsse.v7i10.448
fatcat:eiyeicrpgzcijef6sgmdwl346e
Novel ECC-Based RFID Mutual Authentication Protocol for Emerging IoT Applications
2021
IEEE Access
Acknowledgement: The authors extend their appreciation to the Deanship of Scientific Research at King Khalid University (KKU) for funding this work through General Research Project under grant number ( ...
[41] , we will propose our new RFID authentication protocol based on ECC. ...
Later, in 2014, Liao et al. have proposed in [38] a secure RFID mutual authentication protocol based on ECC and integrating a public-key transfer. ...
doi:10.1109/access.2021.3112554
fatcat:zheyzvekmfd7bm7pla2i3aflry
RFID Authentication Scheme based on Hyperelliptic Curve Signcryption
2021
IEEE Access
[19] suggested Elliptic Curve Signcryption based RFID authentication protocol. The security and efficacy of their proposed protocol are based on ECC. ...
[19] proposed an RFID authentication protocol based on Elliptic Curve Signcryption. ...
doi:10.1109/access.2021.3069429
fatcat:mylr6k5uibcwpjoj3yf32gq37a
SLEC: A Novel Serverless RFID Authentication Protocol Based on Elliptic Curve Cryptography
2019
Electronics
We propose a new secure serverless RFID authentication protocol based on the famous elliptic curve cryptography (ECC). ...
Using a serverless RFID system is an alternative solution to using a central server. In this model, both the reader and the tag perform mutual authentication without the need for the central server. ...
mutual authentication protocol (EMA) [7] , and ECC-based authentication protocol PII [8] . ...
doi:10.3390/electronics8101166
fatcat:ut2z5x4q7vgbncb7nywgu6u3li
The communication and computation cost of wireless security
2011
Proceedings of the fourth ACM conference on Wireless network security - WiSec '11
The authors also discuss how their protocol can be extended to offer advanced security and privacy protection. • ISO 9798-2 mutual entity authentication protocol based on AES: Most RFID authentication ...
Since the protocol makes use of a symmetric primitive, the reader and RFID tag share a secret key K. • ECC-based Randomized Schnorr protocol: Recently, various RFID authentication protocols (such as [ ...
doi:10.1145/1998412.1998414
dblp:conf/wisec/SingeleeSBV11
fatcat:wg2mnnekdvcczodvtvy3di6fnm
Elliptic Curve Signcryption Based Security Protocol for RFID
2020
KSII Transactions on Internet and Information Systems
In this paper, an efficient elliptic curve signcryption based security protocol for RFID has been proposed, which provides mutual authentication, confidentiality, non-repudiation, integrity, availability ...
Earlier, the security protocols for RFID based on hash functions and symmetric key cryptography have been proposed. ...
Chiou, Ko, and Lu [39] developed an ECC based mutual authentication protocol for mobile RFID. ...
doi:10.3837/tiis.2020.01.019
fatcat:svxel7h4pzfuvl26f6pvofxfxy
An Elliptic Curve-based Mutual Authentication Scheme for RFID Implant Systems
2014
Procedia Computer Science
Section 3 discusses the security requirements and threat models of RFID implant systems. Section 4 presents our proposed ECC-based mutual authentication scheme to the RFID implant systems. ...
In this paper, a secure mutual authentication scheme for an RFID implant system is developed. ...
In this section, we examine some of the existing ECC-based security schemes for RFID systems since our proposed authentication scheme also relies on ECC. ...
doi:10.1016/j.procs.2014.05.415
fatcat:62b3tc2qsfa73cw3wfjt2uqfuq
Survey: Vulnerability Analysis of Low-Cost ECC-Based RFID Protocols against Wireless and Side-Channel Attacks
2021
Sensors
In this paper, we first review the most relevant ECC-based RFID authentication protocols, focusing on their security analysis and operational performances. ...
For this purpose, we classify the different threats that can target an ECC-based RFID system. ...
Protocol Benssalah proposed in his paper [113] published in 2020 a new RFID authentication protocol based on ECC. ...
doi:10.3390/s21175824
pmid:34502714
pmcid:PMC8434319
fatcat:pkjqudq7mncfzeuwjocjfjrxfm
Yet Another Strong Privacy-Preserving RFID Mutual Authentication Protocol
[chapter]
2014
Lecture Notes in Computer Science
In this paper, we present a mutual authentication protocol for RFID systems using elliptic curves arithmetic. ...
In order to achieve privacy and to provide scalability and anti-cloning features of RFID system, public-key primitives should be used in an RFID authentication protocol [1] . ...
In this paper, we present a mutual authentication protocol for RFID system using ECC arithmetic, which provides narrow-strong and wideweak privacy under standard complexity assumption. ...
doi:10.1007/978-3-319-12060-7_12
fatcat:d6cjjnyqs5cpneedpiygospzwi
A novel grouping proof authentication protocol for lightweight devices: GPAPXR+
2020
Turkish Journal of Electrical Engineering and Computer Sciences
In this study, 11 a new grouping proof authentication protocol is developed for lightweight devices. ...
The proposed protocol implemented 12 on wireless identification and sensing platform (WISP) passive RFID tag, uses embedded advanced encryption standard 13 encryption method to encrypt transmitted data ...
Mersenne twister-based RFID authentication protocol. ...
doi:10.3906/elk-2004-5
fatcat:orvmjz24ifgpxhdgpym2rhy5hq
Authentication and Encryption of IoT Devices Based on Elliptic Curves: A survey
2021
Zenodo
Table 3 - 3 Summary from 2019 to 2020 for characteristics of the surveyed lightweight Elliptic Curve based protocols Work Basis Participants Security Analysis Performance Analysis -ECC -RFID Tag -Mutual ...
attack -Impersonation Attack Avoidance -BAN LOGIC tool for authentication Proof -ECDH -RFID --Mutual Authentication -Number of operations Alamr et al. [22] -ECC -Anonymity -Forward Security -Location ...
doi:10.5281/zenodo.5301586
fatcat:5gtplqi7e5asrhi56kjre23n7a
« Previous
Showing results 1 — 15 out of 469 results