Corpus ID: 28455217

A Secure ECC-based Mobile RFID Mutual Authentication Protocol and Its Application

@article{Chiou2018ASE,
  title={A Secure ECC-based Mobile RFID Mutual Authentication Protocol and Its Application},
  author={Shin-Yan Chiou and Wen-Tsai Ko and Erl-Huei Lu},
  journal={Int. J. Netw. Secur.},
  year={2018},
  volume={20},
  pages={396-402}
}
Mobile RFID applications combine RFID technologies and mobile device to create a new convenient application area. However, most of the applications suffer from the security issues due to insecure communication channels among tags, readers and servers. In 2012, Zhou et al. proposed an ECC-based mutual authentication protocol to promote mobile RFID applications security. However, we found their protocol faces to OTRUTS (one time reading and unlimited times service) problem, which means once a… Expand
An Efficient RFID Authentication Protocol Using Dynamic Identity
TLDR
This work proposes a secure and efficient dynamic mutual authentication protocol for RFID that provides security against replay attacks, impersonation attacks, asynchronous attacks, and tracking attacks while significantly reducing the computational cost on RFID tags and system servers. Expand
RFID Authentication Scheme Based on Hyperelliptic Curve Signcryption
TLDR
The results reveal that the computational, communication and storage overheads of the proposed RFID-AS is much less than the other recently proposed schemes, and is an attractive solution for resource-limited devices like RFID tags. Expand
Cryptanalysis of the Serverless RFID Authentication and Search Protocols
In this article, we analyze Tan et al.’s serverless RFID authentication and search protocols. Tan et al. proposed a serverless RFID system to solve this problem without a central database whileExpand
A Third-Party Mobile Payment Scheme Based on NTRU Against Quantum Attacks
TLDR
An improved signature scheme based on the Number Theory Research Unit (NTRU) is proposed and shown to be secure and efficient which can raise the speed and probability of generating reasonable signature value and a new public key infrastructure NTRU-WPKI is introduced. Expand
An improved Chang-Lee’s smart card-based authentication scheme
TLDR
An improved user authentication scheme is proposed that holds the capacity to withstand the vulnerability as that in Chang-Lee's smart card-based scheme and could resist the replay attacks, the impersonation attacks, and the identity disclosure attacks. Expand
An Improvement of the Remote Authentication Scheme for Anonymous Users Using an Elliptic Curve Cryptosystem
TLDR
This article shows that a new remote authentication scheme for anonymous users using an elliptic curve cryptosystem proposed by Zhang et al. is vulnerable to forgery attacks, server impersonating attacks, and man-in-the-middle attacks. Expand
Cryptanalysis of Kumar's Remote User Authentication Scheme with Smart Card
TLDR
It is shown that Kumar's enhanced smart card-based remote user authentication scheme is vulnerable to the off-line guessing password attack and an improved version is proposed to withstand the vulnerability in their scheme. Expand
An Improved Key Agreement Authentication Scheme Based on an Anonymous Password
TLDR
This work shows that the improved anonymous passwordbased authentication scheme is not secure to those attacks, such as online password guessing and denial of service attacks. Expand
Secrecy Analysis in the AF Mode Cooperative Communication System
TLDR
This work concentrates on the theoretical solution to the secrecy rate in the AF mode cooperative communication system and shows the effects of eavesdropper could not affect the secure communication if the number of the eavesdroppers is less than that of relays in the system. Expand
SPA Resistant Balanced Ternary Segmented Scalar Multiplication
TLDR
A Simple Power Analysis (SPA) resistant algorithm is possible implemented based on balanced ternary scalar multiplication algorithm, using segmentation method and combing Montgomery algorithm, and the efficiency of this algorithm is increased under affine coordinate on average. Expand
...
1
2
...

References

SHOWING 1-10 OF 32 REFERENCES
Mutual Authentication Protocol for Mobile RFID Systems
TLDR
The proposed protocol is designed to authenticate reader before tag authentication to avoid impersonation of a valid mobile reader and formal security proof show that the proposed protocol no obvious design defect theoretically. Expand
An Improved Ownership Transfer and Mutual Authentication for Lightweight RFID Protocols
TLDR
An improved mutual authentication and an improved ownership transfer for low-cost RFID Protocols is suggested and security analysis shows that the protocol owns security and privacy. Expand
Authentication mechanism for mobile RFID based Smart grid network
TLDR
A conjoined verification technique is deployed to minimize authentication cost in a mobile RFID based Smart grid network, which is lightweight and efficient and illustrates that the proposed mechanism can better performance than the existing representative schemes. Expand
A Lightweight RFID Security Protocol Based on Elliptic Curve Crytography
TLDR
A novel elliptic curve cryptography (ECC) based RFID security protocol is studied and it shows some great features, including the high strength of ECC encryption provides convincing security for communication and tag memory data access. Expand
An intelligent RFID-enabled authentication scheme for healthcare applications in vehicular mobile cloud
TLDR
The proposed RFID-enabled authentication scheme for healthcare applications in VCC environment is found to be secure with respect to mutual authentication of servers and tags, replay attack, tracking attack, users anonymity, eavesdropping, and cloning with forward secrecy. Expand
Design and Implementation of An ECC-Based Digital Baseband Controller for RFID Tag Chip
TLDR
An ECC-based RFID digital baseband controller (DBC), which is compatible with ISO/IEC 14443 and Schnorr authentication protocol, is presented and some techniques, such as the register reuse, clock multiplexer, and asynchronous counter, are adopted in this design. Expand
An Energy-Efficient ECC Processor of UHF RFID Tag for Banknote Anti-Counterfeiting
TLDR
The design and analysis of an energy-efficient 163-b elliptic curve cryptographic (ECC) processor suitable for passive ultrahigh frequency (UHF) radio frequency identification (RFID) tags that are usable for banknote authentication and anti-counterfeiting and is sufficient for use in the fastest banknote counting machines. Expand
An Improved Ownership Transfer for RFID Protocol
TLDR
The analysis results show that the improved protocol not only satisfies the security requirements of the tag transfer, but also overcomes the security defects of desynchronization attack. Expand
ECC-based untraceable authentication for large-scale active-tag RFID systems
TLDR
This paper constructs two novel protocols, PI and PII, which can resist many attacks, outperform previous ECC-based proposals in communication efficiency, and provide mutual authentication function and scalability. Expand
PrIME: Priority-based tag identification in mobile RFID systems
TLDR
PrIME, a new anti-collision protocol for single reader mobile systems is proposed and it is shown that PrIME is able to identify 100% of mobile tags when they follow a pedestrian mobility model, reducing the tag identification delay by over 90% with respect to the most performing solutions available in the literature. Expand
...
1
2
3
4
...