An ECC-based tree-structure RFID grouping-proof protocol

0Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.

Abstract

In this study an Elliptic Curves Cryptography (ECC)-based tree-structure radio frequency identification (RFID) grouping-proof protocol is proposed to overcome low efficiency and vulnerability to various security threats of existing RFID grouping-proof protocols. Security performance is improved becauseof the design of the key structure, authentication approaches and procedures forthe ECC-based tree-structure RFID grouping-proof protocol. During protocol interaction, grouping-proof efficiency is improved by introducing the tag-reader mutual authentication mechanism to reduce interaction with unauthentic RFID readers and tag computing workload and to complete proof information acquisition with less computation. There are a detailed description and a security analysis of the protocol in this study. As analysis results show, the protocol meets security and privacy requirements. Compared with existing grouping-proof protocols, the proposed protocol is of high efficiency and availability as it brings enhanced security and performance with less computational complexity.

Cite

CITATION STYLE

APA

Hong-Yan, K. (2016). An ECC-based tree-structure RFID grouping-proof protocol. Journal of Software Engineering, 10(3), 263–271. https://doi.org/10.3923/jse.2016.263.271

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free