Loading

Lightweight ECC based RFID Authentication Protocol
Sanjeev Kumar1, Aditya M Pillai2, Amulya Bhardwaj3, Gopesh Mittal4

1Aditya M. Pillai*, Department of Computer Science and Engineering, ABES Institute of Technology, Ghaziabad, Affiliated to AKTU Lucknow, India.
2Amulya Bhardwaj, Department of Computer Science and Engineering, ABES Institute of Technology, Ghaziabad, Affiliated to AKTU Lucknow, India.
3Gopesh Mittal, Department of Computer Science and Engineering, ABES Institute of Technology, Ghaziabad, Affiliated to AKTU Lucknow, India.
4Sanjeev Kumar, Department of Computer Science and Engineering, ABES Institute of Technology, Ghaziabad, Affiliated to AKTU Lucknow, India.
Manuscript received on April 20, 2020. | Revised Manuscript received on April 30, 2020. | Manuscript published on May 10, 2020. | PP: 347-351 | Volume-9 Issue-7, May 2020. | Retrieval Number: G5189059720/2020©BEIESP | DOI: 10.35940/ijitee.G5189.059720
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: The RFID (radio frequency identification) technology is being extensively accepted and used as a governing recognizing technology in medical management domain like information corroboration, patient records, blood transmission, etc. With more rigid security concern to RFID based authentication protocols, ECC (elliptic curve cryptography) established Radio Frequency Identification verification protocols is being expected to fit the prerequisite of security and privacy. However, abounding new published ECC based RFID protocols have severe security vulnerability. In the following paper, we have reviewed few RFID verification and authentication protocols and has compared its strengths, fragility and proposed less complex and more efficient authentication protocol. 
Keywords: Lightweight elliptical curve cryptography, RFID, radio frequency identification, random cyclic redundancy analysis
Scope of the Article: Authentication, Authorization, Accounting