2011 IEEE International Conference on RFID-Technologies and Applications 2011
DOI: 10.1109/rfid-ta.2011.6068667
|View full text |Cite
|
Sign up to set email alerts
|

Elliptic curve cryptography based authentication protocol for low-cost RFID tags

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(6 citation statements)
references
References 8 publications
0
6
0
Order By: Relevance
“…Hence, the total storage requirement of the RFID system is 3200 and 480w bits. The elliptic curve's running time for multiplication operation on 5 MHz tag is 0.064 s, and PIV 3 GHz server is 0.83 ms [91,92]. The authors found that the running time for server and tag to compute elliptic multiplication is 2.49 ms and 0.192 s. The communication cost of this scheme for server and tag is 640 bits each.…”
Section: Lightweight Schemesmentioning
confidence: 99%
See 1 more Smart Citation
“…Hence, the total storage requirement of the RFID system is 3200 and 480w bits. The elliptic curve's running time for multiplication operation on 5 MHz tag is 0.064 s, and PIV 3 GHz server is 0.83 ms [91,92]. The authors found that the running time for server and tag to compute elliptic multiplication is 2.49 ms and 0.192 s. The communication cost of this scheme for server and tag is 640 bits each.…”
Section: Lightweight Schemesmentioning
confidence: 99%
“…To verify the identity of communication device in RFID system is an important and essential concern. As described in the above sections, researchers have exploited various techniques such as symmetric-key cryptography, elliptic curve cryptography, etc., to provide authentication for RFID systems [89,92,93]. However, to develop a single scheme that deal with all types of authentication issues is still open challenge for researchers.…”
Section: Challenge To Develop Secure Authentication Mechanismmentioning
confidence: 99%
“…The subsequent policy and information of BAN logic are portrayed in Table 2 and Table 3 in that order, where X and Z are the general occurrences that take part in a protocol 53–55 …”
Section: Security Analysismentioning
confidence: 99%
“…The subsequent policy and information of BAN logic are portrayed in Table 2 and Table 3 in that order, where X and Z are the general occurrences that take part in a protocol. [53][54][55] Following process must be performed to analyze the proposed authentication scheme and prove that the scheme is secure.…”
Section: Ban Logic-based Authentication Proofmentioning
confidence: 99%
“…Elliptic curve cryptosystem [13][14][15][16] is a cryptographic system that uses the computational complexity of the discrete logarithm problem on elliptic curves. It is an asymmetric key-based cryptosystem that has gained popularity in recent years due to the advantage of having a similar degree of safety with shorter key lengths compared to the conventional asymmetric key-based cryptosystem.…”
Section: Introductionmentioning
confidence: 99%