Abstract
The security of most existing RFID protocols, which is difficult to guarantee, is based on simple XOR or Hash operations. However, the more secure traditional encryption algorithm is difficult to apply to the RFID system directly, due to the limited computing resources of RFID tags. In order to solve the security risks of RFID in user data security and privacy, this paper studies the lightweight of elliptic curve cryptography (ECC) algorithm, which makes it more suitable for RFID tags, and then it designs a new RFID two-way authentication protocol combined the advantages and disadvantages of existing protocol based on ECC algorithms. Finally, in view of the frequent transfer of electronic tag ownership in the logistics supply chain environment, the designed RFID authentication protocol has been extended to make it more suitable for the logistics supply chain.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Mujahid, U., Najam-Ul-Islam, M., Shami, M.A.: RCIA: a new ultralightweight RFID authentication protocol using recursive hash. Int. J. Distrib. Sens. Netw. 2015(3), 1–8 (2015)
Guo, C., Zhang, Z.J., Zhu, L.H., et al.: A novel secure group RFID authentication protocol. J. China Univ. Posts Telecommun. 21(1), 94–103 (2014)
Nicolas, M.: Fast and Secure Elliptic Curve Scalar Multiplication Over Prime Fields Using Special Addition Chains. IACR Cryptology Eprint Archive (2006)
Venelli, A., Dassance, F.: Fast scalar multiplication for elliptic curve cryptosystems over prime fields: US, US 8369517 B2 (2013)
Liao, Y.P., Hsiao, C.M.: A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol. Ad Hoc Netw. 18(7), 133–146 (2014)
Lee, Y.C., Hsieh, Y.C., You, P.S., et al.: An Improvement on RFID Authentication Protocol with Privacy Protection. IEEE Computer Society (2008)
Xie, R., Jian, B.Y., Liu, D.W.: An improved ownership transfer for RFID protocol. Int. J. Netw. Secur. 20(1), 149–156 (2018)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Zu, Q., Cai, K. (2019). Research and Application of RFID System Security Authentication Protocol Based on ECC Algorithm. In: Tang, Y., Zu, Q., Rodríguez García, J. (eds) Human Centered Computing. HCC 2018. Lecture Notes in Computer Science(), vol 11354. Springer, Cham. https://doi.org/10.1007/978-3-030-15127-0_59
Download citation
DOI: https://doi.org/10.1007/978-3-030-15127-0_59
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-15126-3
Online ISBN: 978-3-030-15127-0
eBook Packages: Computer ScienceComputer Science (R0)