Call for Papers - Ongoing round of submission, notification and publication.
    
  
Home    |    Login or Register    |    Contact CSC
By Title/Keywords/Abstract   By Author
Browse CSC-OpenAccess Library.
  • HOME
  • LIST OF JOURNALS
  • AUTHORS
  • EDITORS & REVIEWERS
  • LIBRARIANS & BOOK SELLERS
  • PARTNERSHIP & COLLABORATION
Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available
(no registration required)

(232.75KB)


-- CSC-OpenAccess Policy
-- Creative Commons Attribution NonCommercial 4.0 International License
>> COMPLETE LIST OF JOURNALS

EXPLORE PUBLICATIONS BY COUNTRIES

EUROPE
MIDDLE EAST
ASIA
AFRICA
.............................
United States of America
United Kingdom
Canada
Australia
Italy
France
Brazil
Germany
Malaysia
Turkey
China
Taiwan
Japan
Saudi Arabia
Jordan
Egypt
United Arab Emirates
India
Nigeria
Novel construction of Secure RFID Authentication Protocol
Shafiqul Abidin
Pages - 33 - 36     |    Revised - 10-09-2014     |    Published - 10-10-2014
Published in International Journal of Security (IJS)
Volume - 8   Issue - 4    |    Publication Date - October 2014  Table of Contents
MORE INFORMATION
References   |   Abstracting & Indexing
KEYWORDS
Authentication, ECDLP, Counterfeiting, Multicast.
ABSTRACT
This article proposes an efficient and secure authentication protocol for secure and low-cost RFID systems in random oracles. Security is one of the prime concerns of RFID system. Proposed protocol relies on Elliptic Curve Discrete Logarithm Problem (ECDLP) to achieve security. The protocol achieves the most important security goals scalability, anonymity and anti-cloning for RFID system. A password based protocol has vulnerability on fixed password. This can be exploited by threats. In the proposed protocol, there is a provision to change the password of the Tags. Hence the vulnerability can be reduced in an acceptable level. Computation cost is very less as compare to the other protocols.
ABSTRACTING & INDEXING
1 Google Scholar 
2 CiteSeerX 
3 refSeek 
4 Scribd 
5 SlideShare 
6 PdfSR 
REFERENCES
"Certicom ECC Challenge and The Elliptic Curve Cryptosystem" available : http://www.certicom.com/index.php.
10. H.yeh, T.Ho Chen, Pin-Chuan Liu, Tai Hoo Kim and Hsin-Wen Wei A Secure Authenticated Protocol for Wireless Sensor Networks Using ECC, Sensor pp 4767- 4779, 2011.
C.Chatmon and T.Burmester Secure Anonymous RFID Authentication Protocols, available at www.cs.fsu.edu/ burmeste/TR-060112.pdf
D. Hankerson, A .Menezes and S.Vanstone. Guide to Elliptic Curve Cryptography, Springer Verlag, 2004.
D. N. Duc, and K. Kim Defending RFID authentication protocols against DoS attacks, Computer Communications, 2010.
E.K. Ryu, and T. Takagi A hybrid approach for privacy-preserving RFID tags,Computer Standards & Interfaces, Vol. 31, 2009, pp. 812-815.
Murat Fiskiran A and B Ruby Lee Workload characterization of elliptic curve cryptography and other network security algorithms for constrained environments.
S. Devadas, E. Suh, S. Paral, R. Sowell, T. Ziola, V. Khandelwal Design and implementation of PUF-based unclonable RFID ICs for anti-counterfeiting and security applications, Proceedings of the IEEE International Conference on RFID, April 2008, pp. 58–64.
Wenbo Mao Modern Cryptography - Theory And Practice, 2003, Prentice Hall, pp.196- 203.
MANUSCRIPT AUTHORS
Dr. Shafiqul Abidin
Department of Information Technology Northern India Engineering College (GGSIP University) Shastri Park, Delhi - 110053, India - India
shafiqulabidin@yahoo.co.in


CREATE AUTHOR ACCOUNT
 
LAUNCH YOUR SPECIAL ISSUE
View all special issues >>
 
PUBLICATION VIDEOS
 
You can contact us anytime since we have 24 x 7 support.
Join Us|List of Journals|
    
Copyrights © 2025 Computer Science Journals (CSC Journals). All rights reserved. Privacy Policy | Terms of Conditions