2014
DOI: 10.1002/sec.1096
|View full text |Cite
|
Sign up to set email alerts
|

Improvement and optimized implementation of cryptoGPS protocol for low‐cost radio‐frequency identification authentication

Abstract: In radio‐frequency identification (RFID) authentication technology, the authentication schemes between reader and tag based on public‐key cryptography (PKC) are much better than those based on symmetric‐key cryptography in terms of expanding the scale of RFID applications and the style of providing service, while the limitation of resource consumption and computation capability of RFID tags makes it difficult to apply traditional PKC to RFID authentications. The cryptoGPS protocol based on PKC proposed by Mclo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 31 publications
0
4
0
Order By: Relevance
“…Our normal public key methods do not quite work on RFID devices, so let's look at the proposed method for proving that an RFID device is real. The method proposed by the ISO/IEC is ISO/IEC 29192-4:2013 includes ELLI (Elliptic Light), cryptoGPS [31] and ALIKE [32]. ELLI uses Elliptic Curves along with a Diffie-Hellman-related handshake between the RFID tag and the RFID reader [33].…”
Section: Asymmetric Encryptionmentioning
confidence: 99%
“…Our normal public key methods do not quite work on RFID devices, so let's look at the proposed method for proving that an RFID device is real. The method proposed by the ISO/IEC is ISO/IEC 29192-4:2013 includes ELLI (Elliptic Light), cryptoGPS [31] and ALIKE [32]. ELLI uses Elliptic Curves along with a Diffie-Hellman-related handshake between the RFID tag and the RFID reader [33].…”
Section: Asymmetric Encryptionmentioning
confidence: 99%
“…However, the scheme above only achieved one-way authentication from reader to tag, the search complexity of back-end database was high, and there was likely to be vulnerable to DoS attack for tags. In 2014, Dong et al [13] improved and optimized cryptoGPS identification protocol. In their protocol, LHW technology and coupons-updating algorithm were introduced, with the result that it made up for disadvantages of crytpoGPS identification protocol.…”
Section: Related Workmentioning
confidence: 99%
“…Identification is crucial to communicate among devices securely and properly. Radio-frequency identification technology (RFID) serves to identify objects automatically with electromagnetic frequency waves in IoT [9]. An RFID system consists of two components: the RFID tag which collects the information and transmits the collected data to the application and the RFID reader which stores the information [10].…”
Section: Introductionmentioning
confidence: 99%