Advanced RFID Authentication over Elliptical Curves: Ensuring Security and Efficiency

Main Article Content

Abstract

With the fast advancement of mobile technology, the Internet of Things, and remote sensors, it is especially imperative to guarantee correspondence and communication security between the device and the server in these applications. Radio Frequency Identification (RFID) systems are becoming increasingly important because of their potent ability to automatically identify, locate, and regulate object access. However, due to the underlying wireless communication channel, RFID solutions are prone to security and privacy challenges. To find a solution, the paper discusses the security requirements and types of attacks on RFID protocols and presents an efficient authentication algorithm between server and tag using elliptical curve and important cryptographic operations to address formal security issues. The security of the proposed authentication algorithm is evaluated using Scyther, and the cost calculation is compared with some existing protocols. The comparative data on different attacks and performance shows that the proposed scheme is faster than the earlier existing schemes in terms of calculation time and is more secure too.

Article Details

Section
Articles