2009
DOI: 10.1007/s11390-009-9226-3
|View full text |Cite
|
Sign up to set email alerts
|

A Secure Elliptic Curve-Based RFID Protocol

Abstract: Nowadays, the use of Radio Frequency Identification (RFID) systems in industry and stores has increased. Nevertheless, some of these systems present privacy problems that may discourage potential users. Hence, high confidence and efficient privacy protocols are urgently needed. Previous studies in the literature proposed schemes that are proven to be secure, but they have scalability problems. A feasible and scalable protocol to guarantee privacy is presented in this paper. The proposed protocol uses elliptic … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
10
0

Year Published

2010
2010
2016
2016

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 18 publications
(10 citation statements)
references
References 17 publications
0
10
0
Order By: Relevance
“…As the final point, all the required information will be received by the reader. [39] In the larger environments where it may be possible that readers do not receive the (due to the noise caused by the attacker) of the tag, the tags may have updated its value without the corresponding update of the database. To avoid this problem, the tag needs to wait for an Acknowledgement (Ack) message (which comes from the reader's side) before storing its new secret value.…”
Section: Tag Verification Phasementioning
confidence: 99%
See 2 more Smart Citations
“…As the final point, all the required information will be received by the reader. [39] In the larger environments where it may be possible that readers do not receive the (due to the noise caused by the attacker) of the tag, the tags may have updated its value without the corresponding update of the database. To avoid this problem, the tag needs to wait for an Acknowledgement (Ack) message (which comes from the reader's side) before storing its new secret value.…”
Section: Tag Verification Phasementioning
confidence: 99%
“…Previously, in [39]Martinez et al proposed Schnorr's zero knowledge proof using elliptic curve cryptography to authenticate readers in RFID systems. Schnorr's identification protocol is efficient.…”
Section: A the Reader Authentication Phasementioning
confidence: 99%
See 1 more Smart Citation
“…In 2008, Sheikh et al put forward ERAP [21]. In 2009, Santi et al proposed a secure elliptic curve-based RFID protocol (SECRP) [22]. These protocols ensure the security and privacy of RFID tags and readers, but they really need a lot of resource to complete the whole processing of these protocols.…”
Section: Related Workmentioning
confidence: 99%
“…The security of ECC depends on the difficulty of Elliptic Curve Discrete Logarithm Problem (ECDLP) [11].…”
Section: A Preliminariesmentioning
confidence: 99%