Scheduled System Maintenance:
On Monday, April 27th, IEEE Xplore will undergo scheduled maintenance from 1:00 PM - 3:00 PM ET (17:00 - 19:00 UTC). No interruption in service is anticipated.
By Topic

Elliptic curve cryptography based mutual authentication protocol for low computational capacity RFID systems - performance analysis by simulations

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Godor, G. ; Dept. of Telecommun., Budapest Univ. of Technol. & Econ., Budapest, Hungary ; Giczi, N. ; Imre, S.

RFID technology can be found in the most fields of our daily life, e.g. personal identification, supply-chain management, access control etc. For the sake of small computational capacity of RFID Tags, at first, only mathematical and logical operations and lightweight authentication methods could be used. However, thanks to the evolution of RFID technology, nowadays PKI infrastructure is also usable in this environment. In this paper we present our elliptic curve cryptography based mutual authentication protocol which proofs against the well-known attacks. We give a brief comparison with other EC based protocols in the point of view of security. Moreover, we show that our protocol is better than the others in case of performance, too. In order to measure the performance characteristics of our proposed ECC based authentication protocol and to make a comparison with others we implemented these algorithms in OMNeT++.

Published in:

Wireless Communications, Networking and Information Security (WCNIS), 2010 IEEE International Conference on

Date of Conference:

25-27 June 2010