2014
DOI: 10.1007/s10916-014-0116-z
|View full text |Cite
|
Sign up to set email alerts
|

Lightweight ECC Based RFID Authentication Integrated with an ID Verifier Transfer Protocol

Abstract: The radio frequency identification (RFID) technology has been widely adopted and being deployed as a dominant identification technology in a health care domain such as medical information authentication, patient tracking, blood transfusion medicine, etc. With more and more stringent security and privacy requirements to RFID based authentication schemes, elliptic curve cryptography (ECC) based RFID authentication schemes have been proposed to meet the requirements. However, many recently published ECC based RFI… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
64
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 82 publications
(64 citation statements)
references
References 22 publications
0
64
0
Order By: Relevance
“…The communication overhead denotes the length of the messages transmitted between the reader and tags when they execute the protocol. According to [32], we assume that an elliptic curve with length of 160 bits is used in our schemes. The length of an elliptic curve point is 320 bits.…”
Section: Performance Analysismentioning
confidence: 99%
“…The communication overhead denotes the length of the messages transmitted between the reader and tags when they execute the protocol. According to [32], we assume that an elliptic curve with length of 160 bits is used in our schemes. The length of an elliptic curve point is 320 bits.…”
Section: Performance Analysismentioning
confidence: 99%
“…The next protocol we analyze in this work is due to [36]. This is an RFID-based authentication protocol to preserve identity privacy.…”
Section: He Et Al's Rfid-based Authentication Protocolmentioning
confidence: 99%
“…Figure 8 shows the notations used for the protocol. This protocol has been proven to be immune to various attacks [36]. We present a clogging attack on the protocol and observe that it is inherently vulnerable to clogging, weak authentication and SQL injection attacks.…”
Section: He Et Al's Rfid-based Authentication Protocolmentioning
confidence: 99%
“…This section reviews He et al 's protocol [13]. The system consists of three kinds of entities: readers, a back-end server, and a set of tags; but the RFID reader is omitted from the protocol description since it acts as an intermediate party that relays messages exchanged between a tag and the server.…”
Section: Review Of He Et Al 'S Protocolmentioning
confidence: 99%
“…The essence of the active tracking resistance of the proposed scheme is that each calculation of Auth = ( + TK 2 ) ⊕ ( 1 + TK 1 ) involves the confusion value ( 1 + TK 1 ), where the computation of TK 1 needs either tag's secret 2 or the server's private key ; therefore, International Journal of Distributed Sensor Networks 5 Arshad and Nikooghadam [12] Liao and Hsiao [9] He et al [13] Ours The server's computational cost Server Spoofing Attack Resistance. To impersonate the server, the adversary must be able to generate a valid message 3 = {Auth }, where 1 = 1 and Auth = ( +2TK 2 )⊕2 ( 1 + TK 1 ).…”
Section: Security Analysismentioning
confidence: 99%