DocumentCode
568557
Title
Research on Embedding ECC into RFID Authentication Protocol
Author
Shen, Guicheng ; Liu, Bingwu
Author_Institution
Sch. of Inf., Beijing Wuzi Univ., Beijing, China
fYear
2012
fDate
25-27 June 2012
Firstpage
1835
Lastpage
1838
Abstract
In this paper, the importance of RFID technology is introduced, and several issues are displayed. Then related works are introduced, and methods of authentication protocols between the reader and the tag are analyzed, and every protocol has its own issue. Based on this analysis, the protocol that ECC is embedded into the authentication protocol is proposed, and this protocol can solve the previous issues. In the end, a conclusion that embedding ECC into authentication protocol is feasible, and this protocol can improve the secure level of RFID system.
Keywords
cryptographic protocols; message authentication; public key cryptography; radiofrequency identification; ECC; RFID authentication protocol; authentication protocols; elliptic curve cryptography; radiofrequency identification; Authentication; Elliptic curve cryptography; Elliptic curves; Protocols; Radiofrequency identification; Authentication Protocol; Elliptic Curve Cryptogrphy; RFID; information securityt;
fLanguage
English
Publisher
ieee
Conference_Titel
Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on
Conference_Location
Liverpool
Print_ISBN
978-1-4673-2172-3
Type
conf
DOI
10.1109/TrustCom.2012.239
Filename
6296208
Link To Document