A Survey of Authentication of RFID Devices Using Elliptic Curve Cryptography

Authors

  • Suthar Monali  ME , IT Department, LDCE, Ahmedabad, Gujarat, India
  • Prof Alka J Patel  Assistant professor , IT Department, LDCE, Ahmedabad, Gujarat, India

Keywords:

RFID, Reader, Tag, Backend Sever , Authentication , Security , ECC.

Abstract

RFID is a wireless technology for automatic identification and data capture and it’s the core technology to implement the internet of things. Because of that, the security issue of RFID is becoming more important. In past , simple mathematical and logical method, hash based schemas and simple PKI schemas are introduce RFID authentication . In this paper I illustrate about the possible security attack on RFID and three different authentication algorithm of RFID based on ECC and I also describe about why ECC is the best method among them.

References

  1. Xiao Nie, Xiong Zhong  "Security In  the Internet of Things Based on RFID: Issues and Current Countermeasures" Proceedings of the Published by Atlantis Press, Paris, France.
  2. Yi-Pin Liao , Chih-Ming Hsiao  "A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol " Department of computer science and information engineering , St.John’s university,Taipei,ROC (2013), published by ELSEVIER, http://dx.doi.org/10.1016/j.adhoc.2013.02.004
  3. C.P. Schnorr," Efficient identification and signatures for smart cards", in: Gilles Brassard (Ed.), Advances in Cryptology – CRYPTO’89, Lecture Notes in Computer Science, 435, Springer-Verlag, 1989, pp. 239–252.
  4. T. Okamoto, "Provably secure and practical identification schemes and corresponding signature schemes", in: E.F. Brickell (Ed.), Advances in Cryptology – CRYPTO’92, Lecture Notes in Computer Science, 740, Springer-Verlag, 1992, pp. 31–53.
  5. Y.K. Lee, L. Batina, I. Verbauwhede, "EC-RAC (ECDLP Based Randomized Access Control): Provably Secure RFID Authentication Protocol", IEEE International Conference on RFID, 2008, pp. 97–104.
  6. Xinglei Zhang, Linsen Li, Yue Wu, Quanhai Zhang, "An ECDLP-Based Randomized Key RFID Authentication Protocol", 2011 International Conference on Network Computing and Information Security.
  7. ChouJS(2013)" An efficient mutual authentication RFID scheme based on elliptic curve cryptography" .J Supercomput. doi:10.1007/s11227-013-1073-x
  8. Mohammad Sabzinejad Farash " Cryptanalysis and improvement of an efficient mutual authentication RFID scheme based on elliptic curve cryptograph" published by Springer Science+Business Media New York 2014, DOI: 10.1007/s11227-014-1272-0
  9. sGy6z6 Godor, Norbert Giczi, Sandor Imre Dr."Elliptic Curve Cryptography Based Mutual Authentication Protocol for Low Computational Capacity RFID Systems -Performance Analysis by Simulations", Department of Telecommunications, Budapest University of Technology and Economics Magyar Tud6sok korutja 2., Budapest, Hungary H-ll17, 978-1-4244-5849-3/10/$26.00 2010 IEEE

Downloads

Published

2018-01-20

Issue

Section

Research Articles

How to Cite

[1]
Suthar Monali, Prof Alka J Patel, " A Survey of Authentication of RFID Devices Using Elliptic Curve Cryptography, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 4, Issue 2, pp.53-56, January-February-2018.