A Survey and Comparing RFID Authentication Protocols Based on Elliptic Curve Cryptography

  • Negin Dinarvand
  • Hamid Barati

Abstract

Security and privacy are inherent problems in RFID systems communication. Many different ways and methods were presented to overcome these problems among which encryption, authentication and hardware techniques can be pointed out. Authentication protocols based on elliptic curve cryptography (ECC) is one of the methods used in authentication protocols in order to improve the security and privacy of RFID systems. This study aims at examining and comparing protocols that utilize this method in establishing security.

 

References

[1] S. Abughazalah, K. Markantonakis, and K. Mayes, “Secure Improved Cloud-Based RFID Authentication Protocol,” Springer, International Publishing Switzerland, 2015.
[2] J.S. Chou, “An Efficient Mutual Authentication RFID Scheme Based on Elliptic Curve Cryptography,” Springer, journal of supercomputing, New York, 2014, p. 75-94.
[3] I. Syamsuddin, T. Dillon, E. Chang and S. Han, “A Survey of RFID Authentication Protocols Based on Hash-Chain Method,” Third 2008 International Conference on Convergence and Hybrid Information Technology, IEEE, 2008.
[4] D. He and S. Zeadally, “An Analysis of RFID Authentication Schemes for Internet of Things in Healthcare Environment Using Elliptic Curve Cryptography,” IEEE Internet of Things Journal, vol.2, no.1, February 2015.
[5] X. YIN, Z. LIU, H. J. LEE, “An Efficient and Secured Data Storage Scheme in Cloud Computing Using ECC-based PKI ,” Advanced Communication Technology (ICACT), 2014 16th International Conference, february 2014, p. 523-527.
[6] M. Sabzinejad Farash, “Cryptanalysis and improvement of an efficient mutual authentication RFID scheme based on elliptic curve cryptography,” Springer, Journal of Supercomputing, New York, 2014.
[7] Y. Chen and J. S. Chou, “ECC-based untraceable authentication for large-scale active-tag RFID systems”, Springer, Electronic Commerce Research, Volume 15, Issue 1 , 2015, pp 97-120.
[8] Z. Zhang and Q. Qi, “An Efficient RFID Authentication Protocol to Enhance Patient Medication Safety Using Elliptic Curve Cryptography, ” Springer, Journal of Medical Systems, 2014, pp 38-47.
[9] Z. D. He, N. Kumar, N. Chilamkurti and J. H. Lee, “Lightweight ECC Based RFID Authentication Integrated with an ID Verifier Transfer Protocol”, Springer, Journal of Medical Systems, 2014.
[10] Y. P. Liao and C. M. Hsiao, “A Secure ECC-Based RFID Authentication Scheme Using Hybrid Protocols, ” Springer, Advances in Intelligent Systems & Applications, SIST 21, 2013, pp. 1–13.
Published
2016-03-02
How to Cite
Dinarvand, N., & Barati, H. (2016). A Survey and Comparing RFID Authentication Protocols Based on Elliptic Curve Cryptography. Majlesi Journal of Telecommunication Devices, 5(1). Retrieved from http://journals.iaumajlesi.ac.ir/td/index/index.php/td/article/view/296
Section
Articles