Skip to main content

Research and Application of RFID System Security Authentication Protocol Based on ECC Algorithm

  • Conference paper
  • First Online:
Human Centered Computing (HCC 2018)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 11354))

Included in the following conference series:

  • 1221 Accesses

Abstract

The security of most existing RFID protocols, which is difficult to guarantee, is based on simple XOR or Hash operations. However, the more secure traditional encryption algorithm is difficult to apply to the RFID system directly, due to the limited computing resources of RFID tags. In order to solve the security risks of RFID in user data security and privacy, this paper studies the lightweight of elliptic curve cryptography (ECC) algorithm, which makes it more suitable for RFID tags, and then it designs a new RFID two-way authentication protocol combined the advantages and disadvantages of existing protocol based on ECC algorithms. Finally, in view of the frequent transfer of electronic tag ownership in the logistics supply chain environment, the designed RFID authentication protocol has been extended to make it more suitable for the logistics supply chain.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Mujahid, U., Najam-Ul-Islam, M., Shami, M.A.: RCIA: a new ultralightweight RFID authentication protocol using recursive hash. Int. J. Distrib. Sens. Netw. 2015(3), 1–8 (2015)

    Google Scholar 

  2. Guo, C., Zhang, Z.J., Zhu, L.H., et al.: A novel secure group RFID authentication protocol. J. China Univ. Posts Telecommun. 21(1), 94–103 (2014)

    Article  Google Scholar 

  3. Nicolas, M.: Fast and Secure Elliptic Curve Scalar Multiplication Over Prime Fields Using Special Addition Chains. IACR Cryptology Eprint Archive (2006)

    Google Scholar 

  4. Venelli, A., Dassance, F.: Fast scalar multiplication for elliptic curve cryptosystems over prime fields: US, US 8369517 B2 (2013)

    Google Scholar 

  5. Liao, Y.P., Hsiao, C.M.: A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol. Ad Hoc Netw. 18(7), 133–146 (2014)

    Article  Google Scholar 

  6. Lee, Y.C., Hsieh, Y.C., You, P.S., et al.: An Improvement on RFID Authentication Protocol with Privacy Protection. IEEE Computer Society (2008)

    Google Scholar 

  7. Xie, R., Jian, B.Y., Liu, D.W.: An improved ownership transfer for RFID protocol. Int. J. Netw. Secur. 20(1), 149–156 (2018)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Qiaohong Zu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zu, Q., Cai, K. (2019). Research and Application of RFID System Security Authentication Protocol Based on ECC Algorithm. In: Tang, Y., Zu, Q., Rodríguez García, J. (eds) Human Centered Computing. HCC 2018. Lecture Notes in Computer Science(), vol 11354. Springer, Cham. https://doi.org/10.1007/978-3-030-15127-0_59

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-15127-0_59

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-15126-3

  • Online ISBN: 978-3-030-15127-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics