Title :
Research on Embedding ECC into RFID Authentication Protocol
Author :
Shen, Guicheng ; Liu, Bingwu
Author_Institution :
Sch. of Inf., Beijing Wuzi Univ., Beijing, China
Abstract :
In this paper, the importance of RFID technology is introduced, and several issues are displayed. Then related works are introduced, and methods of authentication protocols between the reader and the tag are analyzed, and every protocol has its own issue. Based on this analysis, the protocol that ECC is embedded into the authentication protocol is proposed, and this protocol can solve the previous issues. In the end, a conclusion that embedding ECC into authentication protocol is feasible, and this protocol can improve the secure level of RFID system.
Keywords :
cryptographic protocols; message authentication; public key cryptography; radiofrequency identification; ECC; RFID authentication protocol; authentication protocols; elliptic curve cryptography; radiofrequency identification; Authentication; Elliptic curve cryptography; Elliptic curves; Protocols; Radiofrequency identification; Authentication Protocol; Elliptic Curve Cryptogrphy; RFID; information securityt;
Conference_Titel :
Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on
Conference_Location :
Liverpool
Print_ISBN :
978-1-4673-2172-3
DOI :
10.1109/TrustCom.2012.239