Elliptic curve cryptography based authentication protocol for small computational capacity RFID systems

  • Authors:
  • Győző Góodor;Péter Szendi;Sándor Imre

  • Affiliations:
  • Budapest University of Technology and Economics, Budapest, Hungary;Budapest University of Technology and Economics, Budapest, Hungary;Budapest University of Technology and Economics, Budapest, Hungary

  • Venue:
  • Proceedings of the 6th ACM workshop on QoS and security for wireless and mobile networks
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

In the last few years RFID technology widespread. This technology can be found in each field of our daily life, e.g. supply-chain management, libraries, access management etc. For the sake of small computational capacity of RFID Tags, at first, only mathematical and logical operations and lightweight authentication methods can be used. However, thanks to the evolution of RFID technology, nowadays PKI infrastructure is also usable in this environment. In this paper we present our elliptic curve cryptography based authentication protocol which protects against the well-known attacks. We give a brief comparison with other EC based protocols in the security point of view.