IJSRSET calls volunteers interested to contribute towards the scientific development in the field of Science, Engineering and Technology

Home > IJSRSET184210                                                     

A Survey of Authentication of RFID Devices Using Elliptic Curve Cryptography


Suthar Monali, Prof Alka J Patel
  • Abstract
  • Authors
  • Keywords
  • References
  • Details
RFID is a wireless technology for automatic identification and data capture and it’s the core technology to implement the internet of things. Because of that, the security issue of RFID is becoming more important. In past , simple mathematical and logical method, hash based schemas and simple PKI schemas are introduce RFID authentication . In this paper I illustrate about the possible security attack on RFID and three different authentication algorithm of RFID based on ECC and I also describe about why ECC is the best method among them.

Suthar Monali, Prof Alka J Patel

RFID, Reader, Tag, Backend Sever , Authentication , Security , ECC.

  1. Xiao Nie, Xiong Zhong  "Security In  the Internet of Things Based on RFID: Issues and Current Countermeasures" Proceedings of the Published by Atlantis Press, Paris, France.
  2. Yi-Pin Liao , Chih-Ming Hsiao  "A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol " Department of computer science and information engineering , St.John’s university,Taipei,ROC (2013), published by ELSEVIER, http://dx.doi.org/10.1016/j.adhoc.2013.02.004
  3. C.P. Schnorr," Efficient identification and signatures for smart cards", in: Gilles Brassard (Ed.), Advances in Cryptology – CRYPTO’89, Lecture Notes in Computer Science, 435, Springer-Verlag, 1989, pp. 239–252.
  4. T. Okamoto, "Provably secure and practical identification schemes and corresponding signature schemes", in: E.F. Brickell (Ed.), Advances in Cryptology – CRYPTO’92, Lecture Notes in Computer Science, 740, Springer-Verlag, 1992, pp. 31–53.
  5. Y.K. Lee, L. Batina, I. Verbauwhede, "EC-RAC (ECDLP Based Randomized Access Control): Provably Secure RFID Authentication Protocol", IEEE International Conference on RFID, 2008, pp. 97–104.
  6. Xinglei Zhang, Linsen Li, Yue Wu, Quanhai Zhang, "An ECDLP-Based Randomized Key RFID Authentication Protocol", 2011 International Conference on Network Computing and Information Security.
  7. ChouJS(2013)" An efficient mutual authentication RFID scheme based on elliptic curve cryptography" .J Supercomput. doi:10.1007/s11227-013-1073-x
  8. Mohammad Sabzinejad Farash " Cryptanalysis and improvement of an efficient mutual authentication RFID scheme based on elliptic curve cryptograph" published by Springer Science+Business Media New York 2014, DOI: 10.1007/s11227-014-1272-0
  9. sGy6z6 Godor, Norbert Giczi, Sandor Imre Dr."Elliptic Curve Cryptography Based Mutual Authentication Protocol for Low Computational Capacity RFID Systems -Performance Analysis by Simulations", Department of Telecommunications, Budapest University of Technology and Economics Magyar Tud6sok korutja 2., Budapest, Hungary H-ll17, 978-1-4244-5849-3/10/$26.00 2010 IEEE

Publication Details

Published in : Volume 4 | Issue 2 | January-February - 2018
Date of Publication Print ISSN Online ISSN
2018-01-20 2395-1990 2394-4099
Page(s) Manuscript Number   Publisher
53-56 IJSRSET184210   Technoscience Academy

Cite This Article

Suthar Monali, Prof Alka J Patel, "A Survey of Authentication of RFID Devices Using Elliptic Curve Cryptography", International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 4, Issue 2, pp.53-56, January-February-2018.
URL : http://ijsrset.com/IJSRSET184210.php


Search Your Article