A Survey of Authentication of RFID Devices Using Elliptic Curve Cryptography

Authors(2) :-Suthar Monali, Prof Alka J Patel

RFID is a wireless technology for automatic identification and data capture and it’s the core technology to implement the internet of things. Because of that, the security issue of RFID is becoming more important. In past , simple mathematical and logical method, hash based schemas and simple PKI schemas are introduce RFID authentication . In this paper I illustrate about the possible security attack on RFID and three different authentication algorithm of RFID based on ECC and I also describe about why ECC is the best method among them.

Authors and Affiliations

Suthar Monali
ME , IT Department, LDCE, Ahmedabad, Gujarat, India
Prof Alka J Patel
Assistant professor , IT Department, LDCE, Ahmedabad, Gujarat, India

RFID, Reader, Tag, Backend Sever , Authentication , Security , ECC.

  1. Xiao Nie, Xiong Zhong  "Security In  the Internet of Things Based on RFID: Issues and Current Countermeasures" Proceedings of the Published by Atlantis Press, Paris, France.
  2. Yi-Pin Liao , Chih-Ming Hsiao  "A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol " Department of computer science and information engineering , St.John’s university,Taipei,ROC (2013), published by ELSEVIER, http://dx.doi.org/10.1016/j.adhoc.2013.02.004
  3. C.P. Schnorr," Efficient identification and signatures for smart cards", in: Gilles Brassard (Ed.), Advances in Cryptology – CRYPTO’89, Lecture Notes in Computer Science, 435, Springer-Verlag, 1989, pp. 239–252.
  4. T. Okamoto, "Provably secure and practical identification schemes and corresponding signature schemes", in: E.F. Brickell (Ed.), Advances in Cryptology – CRYPTO’92, Lecture Notes in Computer Science, 740, Springer-Verlag, 1992, pp. 31–53.
  5. Y.K. Lee, L. Batina, I. Verbauwhede, "EC-RAC (ECDLP Based Randomized Access Control): Provably Secure RFID Authentication Protocol", IEEE International Conference on RFID, 2008, pp. 97–104.
  6. Xinglei Zhang, Linsen Li, Yue Wu, Quanhai Zhang, "An ECDLP-Based Randomized Key RFID Authentication Protocol", 2011 International Conference on Network Computing and Information Security.
  7. ChouJS(2013)" An efficient mutual authentication RFID scheme based on elliptic curve cryptography" .J Supercomput. doi:10.1007/s11227-013-1073-x
  8. Mohammad Sabzinejad Farash " Cryptanalysis and improvement of an efficient mutual authentication RFID scheme based on elliptic curve cryptograph" published by Springer Science+Business Media New York 2014, DOI: 10.1007/s11227-014-1272-0
  9. sGy6z6 Godor, Norbert Giczi, Sandor Imre Dr."Elliptic Curve Cryptography Based Mutual Authentication Protocol for Low Computational Capacity RFID Systems -Performance Analysis by Simulations", Department of Telecommunications, Budapest University of Technology and Economics Magyar Tud6sok korutja 2., Budapest, Hungary H-ll17, 978-1-4244-5849-3/10/$26.00 2010 IEEE

Publication Details

Published in : Volume 4 | Issue 2 | January-February 2018
Date of Publication : 2018-01-20
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 53-56
Manuscript Number : IJSRSET184210
Publisher : Technoscience Academy

Print ISSN : 2395-1990, Online ISSN : 2394-4099

Cite This Article :

Suthar Monali, Prof Alka J Patel, " A Survey of Authentication of RFID Devices Using Elliptic Curve Cryptography, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 4, Issue 2, pp.53-56, January-February-2018.
Journal URL : http://ijsrset.com/IJSRSET184210

Article Preview

Follow Us

Contact Us