DocumentCode :
3637150
Title :
Elliptic curve cryptography based mutual authentication protocol for low computational capacity RFID systems - performance analysis by simulations
Author :
Győző Gódor;Norbert Giczi;Sándor Imre
Author_Institution :
Department of Telecommunications, Budapest University of Technology and Economics, Magyar Tudó
fYear :
2010
Firstpage :
650
Lastpage :
657
Abstract :
RFID technology can be found in the most fields of our daily life, e.g. personal identification, supply-chain management, access control etc. For the sake of small computational capacity of RFID Tags, at first, only mathematical and logical operations and lightweight authentication methods could be used. However, thanks to the evolution of RFID technology, nowadays PKI infrastructure is also usable in this environment. In this paper we present our elliptic curve cryptography based mutual authentication protocol which proofs against the well-known attacks. We give a brief comparison with other EC based protocols in the point of view of security. Moreover, we show that our protocol is better than the others in case of performance, too. In order to measure the performance characteristics of our proposed ECC based authentication protocol and to make a comparison with others we implemented these algorithms in OMNeT++.
Keywords :
"Elliptic curve cryptography","Authentication","Cryptographic protocols","Radiofrequency identification","Performance analysis","Computational modeling","Analytical models","Access protocols","Technology management","Access control"
Publisher :
ieee
Conference_Titel :
Wireless Communications, Networking and Information Security (WCNIS), 2010 IEEE International Conference on
Print_ISBN :
978-1-4244-5850-9
Type :
conf
DOI :
10.1109/WCINS.2010.5541860
Filename :
5541860
Link To Document :
بازگشت