A Survey and Comparing RFID Authentication Protocols Based on Elliptic Curve Cryptography
Subject Areas : Majlesi Journal of Telecommunication DevicesNegin Dinarvand 1 , Hamid Barati 2
1 -
2 -
Keywords:
Abstract :
[1] S. Abughazalah, K. Markantonakis, and K. Mayes, “Secure Improved Cloud-Based RFID Authentication Protocol,” Springer, International Publishing Switzerland, 2015.
[2] J.S. Chou, “An Efficient Mutual Authentication RFID Scheme Based on Elliptic Curve Cryptography,” Springer, journal of supercomputing, New York, 2014, p. 75-94.
[3] I. Syamsuddin, T. Dillon, E. Chang and S. Han, “A Survey of RFID Authentication Protocols Based on Hash-Chain Method,” Third 2008 International Conference on Convergence and Hybrid Information Technology, IEEE, 2008.
[4] D. He and S. Zeadally, “An Analysis of RFID Authentication Schemes for Internet of Things in Healthcare Environment Using Elliptic Curve Cryptography,” IEEE Internet of Things Journal, vol.2, no.1, February 2015.
[5] X. YIN, Z. LIU, H. J. LEE, “An Efficient and Secured Data Storage Scheme in Cloud Computing Using ECC-based PKI ,” Advanced Communication Technology (ICACT), 2014 16th International Conference, february 2014, p. 523-527.
[6] M. Sabzinejad Farash, “Cryptanalysis and improvement of an efficient mutual authentication RFID scheme based on elliptic curve cryptography,” Springer, Journal of Supercomputing, New York, 2014.
[7] Y. Chen and J. S. Chou, “ECC-based untraceable authentication for large-scale active-tag RFID systems”, Springer, Electronic Commerce Research, Volume 15, Issue 1 , 2015, pp 97-120.
[8] Z. Zhang and Q. Qi, “An Efficient RFID Authentication Protocol to Enhance Patient Medication Safety Using Elliptic Curve Cryptography, ” Springer, Journal of Medical Systems, 2014, pp 38-47.
[9] Z. D. He, N. Kumar, N. Chilamkurti and J. H. Lee, “Lightweight ECC Based RFID Authentication Integrated with an ID Verifier Transfer Protocol”, Springer, Journal of Medical Systems, 2014.
[10] Y. P. Liao and C. M. Hsiao, “A Secure ECC-Based RFID Authentication Scheme Using Hybrid Protocols, ” Springer, Advances in Intelligent Systems & Applications, SIST 21, 2013, pp. 1–13.