Subscribe Now Subscribe Today
Science Alert
FOLLOW US:     Facebook     Twitter
Curve Top
Journal of Software Engineering
  Year: 2016 | Volume: 10 | Issue: 3 | Page No.: 263-271
DOI: 10.3923/jse.2016.263.271
Facebook Twitter Digg Reddit Linkedin StumbleUpon E-mail
An ECC-based Tree-structure RFID Grouping-proof Protocol
Kang Hong-Yan

In this study an Elliptic Curves Cryptography (ECC)-based tree-structure radio frequency identification (RFID) grouping-proof protocol is proposed to overcome low efficiency and vulnerability to various security threats of existing RFID grouping-proof protocols. Security performance is improved because of the design of the key structure, authentication approaches and procedures for the ECC-based tree-structure RFID grouping-proof protocol. During protocol interaction, grouping-proof efficiency is improved by introducing the tag-reader mutual authentication mechanism to reduce interaction with unauthentic RFID readers and tag computing workload and to complete proof information acquisition with less computation. There are a detailed description and a security analysis of the protocol in this study. As analysis results show, the protocol meets security and privacy requirements. Compared with existing grouping-proof protocols, the proposed protocol is of high efficiency and availability as it brings enhanced security and performance with less computational complexity.
PDF Fulltext XML References Citation Report Citation
How to cite this article:

Kang Hong-Yan , 2016. An ECC-based Tree-structure RFID Grouping-proof Protocol. Journal of Software Engineering, 10: 263-271.

DOI: 10.3923/jse.2016.263.271








Curve Bottom