TY - GEN
T1 - Secure Mutual Authentication Protocol for RFID Based on Elliptic Curve Cryptography
AU - Alamr, Amjad Ali
AU - Kausar, Firdous
AU - Kim, Jong Sung
N1 - Publisher Copyright:
© 2016 IEEE.
PY - 2016/4/19
Y1 - 2016/4/19
N2 - In recent times, radio frequency identification-based systems are one of the most widely spread applications for tagging and keep tracking purposes. This is due to their powerful features compared to their counterparts of similar techniques such as barcodes. In contrast, radio frequency identification systems suffer from various attacks and security threats. The wireless channel used for communication is responsible for the majority of these vulnerabilities. In this paper, we propose a new radio frequency identification authentication protocol based on elliptic curve cryptography (ECC) in order to eliminate these vulnerabilities. In addition, we use elliptic curve Diffie-Hellman (ECDH) key agreement protocol to generate a temporary shared key used to encrypt the later transmitted messages. Our protocol achieves a set of security properties likes mutual authentication, anonymity, confidentiality, forward security, location privacy, resistance of man-in-the-middle attack, resistance of replay attack and resistance of impersonation attack.
AB - In recent times, radio frequency identification-based systems are one of the most widely spread applications for tagging and keep tracking purposes. This is due to their powerful features compared to their counterparts of similar techniques such as barcodes. In contrast, radio frequency identification systems suffer from various attacks and security threats. The wireless channel used for communication is responsible for the majority of these vulnerabilities. In this paper, we propose a new radio frequency identification authentication protocol based on elliptic curve cryptography (ECC) in order to eliminate these vulnerabilities. In addition, we use elliptic curve Diffie-Hellman (ECDH) key agreement protocol to generate a temporary shared key used to encrypt the later transmitted messages. Our protocol achieves a set of security properties likes mutual authentication, anonymity, confidentiality, forward security, location privacy, resistance of man-in-the-middle attack, resistance of replay attack and resistance of impersonation attack.
KW - authentication protocol
KW - ECC
KW - ECDH
KW - RFID
UR - http://www.scopus.com/inward/record.url?scp=84968677435&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84968677435&partnerID=8YFLogxK
U2 - 10.1109/PlatCon.2016.7456822
DO - 10.1109/PlatCon.2016.7456822
M3 - Conference contribution
AN - SCOPUS:84968677435
T3 - 2016 International Conference on Platform Technology and Service, PlatCon 2016 - Proceedings
BT - 2016 International Conference on Platform Technology and Service, PlatCon 2016 - Proceedings
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 3rd International Conference on Platform Technology and Service, PlatCon 2016
Y2 - 15 February 2016 through 17 February 2016
ER -