Research on Embedding ECC into RFID Authentication Protocol
2012pp. 1835–1838
Citations Over Time
Abstract
In this paper, the importance of RFID technology is introduced, and several issues are displayed. Then related works are introduced, and methods of authentication protocols between the reader and the tag are analyzed, and every protocol has its own issue. Based on this analysis, the protocol that ECC is embedded into the authentication protocol is proposed, and this protocol can solve the previous issues. In the end, a conclusion that embedding ECC into authentication protocol is feasible, and this protocol can improve the secure level of RFID system.
Related Papers
- → Design of Authentication Protocol for LR-WPAN using Pre-Authentication Mechanism(2009)5 cited
- Survey of Authentication Protocol(2013)
- → Role‐based authentication protocol(2010)
- Design and Analysis of Authentication Protocol in Military Network(2001)
- New Logic for Analyzing and Designing Authentication Protocol(2008)