Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available

This is an Open Access publication published under CSC-OpenAccess Policy.
Novel construction of Secure RFID Authentication Protocol
Shafiqul Abidin
Pages - 33 - 36     |    Revised - 10-09-2014     |    Published - 10-10-2014
Volume - 8   Issue - 4    |    Publication Date - October 2014  Table of Contents
Authentication, ECDLP, Counterfeiting, Multicast.
This article proposes an efficient and secure authentication protocol for secure and low-cost RFID systems in random oracles. Security is one of the prime concerns of RFID system. Proposed protocol relies on Elliptic Curve Discrete Logarithm Problem (ECDLP) to achieve security. The protocol achieves the most important security goals scalability, anonymity and anti-cloning for RFID system. A password based protocol has vulnerability on fixed password. This can be exploited by threats. In the proposed protocol, there is a provision to change the password of the Tags. Hence the vulnerability can be reduced in an acceptable level. Computation cost is very less as compare to the other protocols.
CITED BY (0)  
1 Google Scholar
2 CiteSeerX
3 refSeek
4 Scribd
5 slideshare
6 PdfSR
1 E.K. Ryu, and T. Takagi A hybrid approach for privacy-preserving RFID tags,Computer Standards & Interfaces, Vol. 31, 2009, pp. 812-815.
2 10. H.yeh, T.Ho Chen, Pin-Chuan Liu, Tai Hoo Kim and Hsin-Wen Wei A Secure Authenticated Protocol for Wireless Sensor Networks Using ECC, Sensor pp 4767- 4779, 2011.
3 C.Chatmon and T.Burmester Secure Anonymous RFID Authentication Protocols, available at www.cs.fsu.edu/ burmeste/TR-060112.pdf
4 D. N. Duc, and K. Kim Defending RFID authentication protocols against DoS attacks, Computer Communications, 2010.
5 S. Devadas, E. Suh, S. Paral, R. Sowell, T. Ziola, V. Khandelwal Design and implementation of PUF-based unclonable RFID ICs for anti-counterfeiting and security applications, Proceedings of the IEEE International Conference on RFID, April 2008, pp. 5864.
6 Wenbo Mao Modern Cryptography - Theory And Practice, 2003, Prentice Hall, pp.196- 203.
7 D. Hankerson, A .Menezes and S.Vanstone. Guide to Elliptic Curve Cryptography, Springer Verlag, 2004.
8 "Certicom ECC Challenge and The Elliptic Curve Cryptosystem" available : http://www.certicom.com/index.php.
9 Murat Fiskiran A and B Ruby Lee Workload characterization of elliptic curve cryptography and other network security algorithms for constrained environments.
Dr. Shafiqul Abidin
Department of Information Technology Northern India Engineering College (GGSIP University) Shastri Park, Delhi - 110053, India - India