Netinfo Security ›› 2018, Vol. 18 ›› Issue (10): 51-61.doi: 10.3969/j.issn.1671-1122.2018.10.008
Previous Articles Next Articles
Received:
2018-08-30
Online:
2018-10-10
Published:
2020-05-11
CLC Number:
Xiaohong ZHANG, Yanhui GUO. Research on RFID System Security Authentication Protocol Based on Elliptic Curve Cryptography[J]. Netinfo Security, 2018, 18(10): 51-61.
Add to citation manager EndNote|Ris|BibTeX
URL: http://netinfo-security.org/EN/10.3969/j.issn.1671-1122.2018.10.008
[1] | KUANG Guofang, SUN Zhaofeng.The Application of Management Information System in Internet of Things Based on RFID Technology[J]. Sensors & Transducers, 2013, 154(7): 103-112. |
[2] | ZHANG Yuting, YAN Chenghua.Research on RFID Authentication Technology Based on Two-way Authentication Protocol[J].Netinfo Security, 2016, 16(1): 64-69. |
张玉婷, 严承华. 一种基于双向认证协议的RFID标签认证技术研究[J]. 信息网络安全, 2016, 16(1): 64-69. | |
[3] | QI Saiyu, ZHENG Yuanqing, LI Mo, et al.Secure and Private RFID-enabled Third-party Supply Chain Systems[J]. IEEE Transactions on Computers, 2016, 65(11): 3413-3426. |
[4] | JIANG Zhengjun, TIAN Haibo, ZHANG Fangguo.Survey on PUF-based RFID Anti-counterfeiting Techniques[J].Netinfo Security, 2016 ,16(4): 38-43. |
蒋政君, 田海博, 张方国. 基于PUF的RFID防伪技术研究综述[J]. 信息网络安全, 2016 , 16(4): 38-43. | |
[5] | LEI Miao.Research on RFID System Security Protocol[D]. Beijing:Beijing University Of Posts and Telecommunications, 2015. |
雷淼. RFID系统安全协议研究[D]. 北京:北京邮电大学, 2015. | |
[6] | MA Qing, GUO Yajun, ZENG Qingjiang, et al.A New Ultra-lightweight RFID Mutual Authentication Protocol[J].Netinfo Security, 2016, 16(5): 44-50. |
马庆, 郭亚军,曾庆江, 等. 一种新的超轻量级RFID双向认证协议[J]. 信息网络安全, 2016 ,16(5): 44-50. | |
[7] | KOBLITZ N.Elliptic Curve Crypto Systems[J]. Mathematics of Computation, 1987, 48(177): 203-209. |
[8] | MILLER V S.Use of Elliptic Curves in Cryptography[J]. Lecture Notes in Computer Science, 1985, 218(1): 417-426. |
[9] | CHEN Wei.Design and Hardware Implementation of ECC Algorithm Based on Jacobi Projective Coordinate System[D]. Xi’an: Xidian University,2016. |
陈威. 基于雅可比加重射影坐标系的ECC算法设计及硬件实现[D]. 西安:西安电子科技大学, 2016. | |
[10] | CHEN Junjie.Research and Design of ECC Encryption and Decryption Algorithm Based on FPGA[D]. Xi’an: Xi’an University of Posts & Telecommunications, 2016. |
陈俊杰. 基于FPGA的ECC加解密算法研究及设计[D]. 西安:西安邮电大学, 2016. | |
[11] | TUYLS P, BATINA L.RFID-Tags for Anti-counterfeiting[C]// RSA. The 2006 Cryptographers' Track at the RSA Conference on Topics in Cryptology, February 13 - 17, 2006, San Jose, CA,USA. Heidelberg: Springer-Verlag Berlin, 2006: 115-131. |
[12] | SCHNORR C P.Efficient Identification and Signatures for Smart Cards[M]// Springer: Advances in Cryptology — EUROCRYPT ’89. Heidelberg : Springer, Berlin, Heidelberg ,1990: 239-252. |
[13] | BATINA L, GUAJARDO J, KERINS T, et al.Public-key Cryptography for RFID-tags[C]//IEEE. The Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops, March 19-23,2007, White Plains, NY, USA.NJ:IEEE, 2007: 217-222. |
[14] | OKAMOTO T. Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes[EB/OL]. |
[15] | LEE Y K, BATINA L, VERBAUWHEDE I.EC-RAC (ECDLP-based Randomized Access Control): Provably Secure RFID Authentication Protocol[C]//IEEE. 2018 IEEE International Conference on RFID, April 16-17, 2008, Las Vegas, NV, USA.NJ:IEEE, 2008: 97-104. |
[16] | ZHANG Xinglei, LI Linsen, WU Yue, et al.An ECDLP-based Randomized Key RFID Authentication protocol[C]//IEEE. 2011 International Conference on Network Computing and Information Security, May 14-15, Guilin, China. NJ:IEEE, 2011: 146-149. |
[17] | CHOU J S.An Efficient Mutual Authentication RFID Scheme Based on Elliptic Curve Ccryptography[J].Journal of Supercomputing, 2014, 70(1): 75-94. |
[18] | ZHANG Zezhong, QI Qingqing.An Efficient RFID Authentication Protocol to Enhance Patient Medication Safety Using Elliptic Curve Cryptography[J]. Journal of Medical Systems, 2014, 38(5): 47. |
[19] | LIAO Yipin, HSIAO C M.A Secure ECC-based RFID Authentication Scheme Integrated with ID-verifier Transfer Protocol[J]. Ad Hoc Networks, 2014, 18(7): 133-146. |
[20] | ZHAO Zhenguo.A Secure RFID Authentication Protocol for Healthcare Environments Using Elliptic Curve Cryptosystem[J]. Journal of Medical Systems, 2014, 38(5): 46. |
[21] | HE Debiao, KUMAR N, CHILAMKURTI N, et al.Lightweight ECC-based RFID Authentication Integrated with an ID Verifier Transfer Protocol[J]. Journal of Medical Systems, 2014, 38(10): 1-6. |
[22] | LEE C I, CHIEN H Y.An Elliptic Curve Cryptography-based RFID Authentication Securing E-health System[J]. International Journal of Distributed Sensor Networks, 2015, 2015(5): 1-7. |
[23] | JIN Chunhua, XU Chunxiang, ZHANG Xiaojun, et al.A Secure RFID Mutual Authentication Protocol for Healthcare Environments Using Elliptic Curve Cryptography[J]. Journal of Medical Systems, 2015, 39(3): 24. |
[24] | ALAMR A A, KAUSAR F, KIM J, et al.A Secure ECC-based RFID Mutual Authentication Protocol for Internet of Things[J]. Journal of Supercomputing, 2018,74(9): 4281-4294. |
[25] | Qian Q, Jia Y L, Zhang R.A lightweight RFID security protocol based on elliptic curve cryptography[J]. International Journal of Network Security, 2016, 18(2): 354-361. |
[26] | GÓDOR G, GICZI N, IMRE S. Elliptic Curve Cryptography-based Mutual Authentication Protocol for Low Computational Capacity RFID Systems-performance Analysis by Simulations[C]//IEEE. 2010 IEEE International Conference on Wireless Communications, Networking and Information Security, June 25-27, 2010, Beijing, China. NJ:IEEE, 2010: 650-657. |
[1] | Yongshuang WEI, Jianhua CHEN, Yongmei WEI. Security Authentication Protocol for RFID/NFC Based on Elliptic Curve Cryptography [J]. Netinfo Security, 2019, 19(12): 64-71. |
[2] | Limin MA, Wei ZHANG, Ying SONG. An Enhanced Kerberos Protocol Based on OTP with Formal Analysis [J]. Netinfo Security, 2019, 19(10): 57-64. |
[3] | HAO Wenjiang, SONG Fei, WAN Yueliang. Research on Security Authentication Protocol for Wearable Police Devices [J]. 信息网络安全, 2018, 18(9): 25-29. |
[4] | Zhibin ZHOU, Shaobo ZHANG, Entao LUO, Chaoliang LI. A Group RFID Tag Ownership Transfer Protocol without Trusted Third Party [J]. Netinfo Security, 2018, 0(6): 18-27. |
[5] | Zhicong LI, Zhiping ZHOU. Enhanced Secure RFID Authentication Protocol in IoT [J]. Netinfo Security, 2018, 0(1): 80-87. |
[6] | WANG Ping, ZHOU Zhiping. An Improved RFID Ownership Transfer Protocol Based on Cloud [J]. 信息网络安全, 2017, 17(8): 60-68. |
[7] | YANG Yulong, PENG Changgen, ZHENG Shaobo, ZHU Yijie. Ultra-lightweight Security Authentication Protocol for Mobile RFID Systems Based on Mobile Smart Terminal [J]. 信息网络安全, 2017, 17(5): 22-27. |
[8] | JIA Huihui, WANG Chao, GU Jian, LU Zhen. Error Bit Correction of ECC Attack Based on Grover Quantum Intermediate Encounter Search Algorithm [J]. 信息网络安全, 2016, 16(6): 28-34. |
[9] | MA Qing, GUO Yajun, ZENG Qingjiang, XU Duo. A New Ultra-lightweight RFID Mutual Authentication Protocol [J]. 信息网络安全, 2016, 16(5): 44-50. |
[10] | JIANG Zhengjun, TIAN Haibo, ZHANG Fangguo. Survey on PUF-based RFID Anti-counterfeiting Techniques [J]. 信息网络安全, 2016, 16(4): 38-43. |
[11] | ZHANG Yuting, YAN Chenghua. Research on RFID Authentication Technology Based on Two-way Authentication Protocol [J]. 信息网络安全, 2016, 16(1): 64-69. |
[12] | YANG Yuan-yuan, LU Zhen, GU Jian. Formal Analysis of Tracking Attack for RFID Security Protocols [J]. 信息网络安全, 2015, 15(9): 25-28. |
[13] | WU Xiao, CHANG Cheng, TAN Wen-jie, CHENG Jiu-jun. An Anti-tampering Tag Authentication Method Based on RFID and Digital Watermarking [J]. 信息网络安全, 2015, 15(8): 26-34. |
[14] | DUAN Ran, XU Nai-yang, HU Ai-qun. Research on Authentication Protocol Security Based on Formal Verification Tool [J]. 信息网络安全, 2015, 15(7): 71-76. |
[15] | QIU Gege, WANG Xueming, ZHANG Yansheng. Research on WSN Identity Authentication Protocol Based on HECC [J]. 信息网络安全, 2015, 15(12): 54-58. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||