Yet another strong privacy-preserving rfid mutual authentication protocol

4Citations
Citations of this article
21Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Radio Frequency IDentification (RFID) systems are gaining enormous interests in industry due to their vast applications such as supply chain, access control, inventory, transport, health care and home appliances. Although tag identification is the primary security goal of an RFID system, privacy issue is equally, even more important concern in the RFID system because of pervasiveness of RFID tags. Over the years, many protocols have been proposed for RFID tags’ identification using symmetric key cryptography and other primitives. Many of them have failed to preserve tags’ privacy. In order to achieve privacy and to provide scalability and anti-cloning features of RFID system, public-key primitives should be used in an RFID authentication protocol [1]. In this paper, we present a mutual authentication protocol for RFID systems using elliptic curves arithmetic. The proposed protocol provides narrowstrong and wide-weak privacy under standard complexity assumption.

Cite

CITATION STYLE

APA

Songhela, R., & Das, M. L. (2014). Yet another strong privacy-preserving rfid mutual authentication protocol. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 8804, pp. 171–182). Springer Verlag. https://doi.org/10.1007/978-3-319-12060-7_12

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free