Mutual Authentication Protocol for RFID Based on ECC
Title | Mutual Authentication Protocol for RFID Based on ECC |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Zheng, L., Xue, Y., Zhang, L., Zhang, R. |
Conference Name | 2017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC) |
Date Published | jul |
ISBN Number | 978-1-5386-3221-5 |
Keywords | authentication, camouflage attacks, cryptographic protocols, Denial of Service attacks, ECC, Elliptic curve cryptography, forward security, Internet of things security and privacy, Metrics, mutual authentication, mutual authentication protocol, Protocols, pubcrawl, Public key, radio frequency identification, radiofrequency identification, Resiliency, Resists, RFID systems, Scalability, security protocol, security scalability, Servers, system internal attack, telecommunication security, tracking attacks |
Abstract | In this paper, a mutual authentication protocol based on ECC is designed for RFID systems. This protocol is described in detail and the performance of this protocol is analyzed. The results show that the protocol has many advantages, such as mutual authentication, confidentiality, anonymity, availability, forward security, scalability and so on, which can resist camouflage attacks, tracking attacks, denial of service attacks, system internal attack. |
URL | https://ieeexplore.ieee.org/document/8006022 |
DOI | 10.1109/CSE-EUC.2017.245 |
Citation Key | zheng_mutual_2017 |
- Public key
- tracking attacks
- telecommunication security
- system internal attack
- Servers
- security scalability
- security protocol
- Scalability
- RFID systems
- Resists
- Resiliency
- radiofrequency identification
- radio frequency identification
- authentication
- pubcrawl
- Protocols
- mutual authentication protocol
- mutual authentication
- Metrics
- Internet of things security and privacy
- forward security
- Elliptic curve cryptography
- ECC
- Denial of Service attacks
- Cryptographic Protocols
- camouflage attacks