Research and Application of RFID System Security Authentication Protocol Based on ECC Algorithm.

Qiaohong Zu,Kui Cai
DOI: https://doi.org/10.1007/978-3-030-15127-0_59
2018-01-01
Abstract:The security of most existing RFID protocols, which is difficult to guarantee, is based on simple XOR or Hash operations. However, the more secure traditional encryption algorithm is difficult to apply to the RFID system directly, due to the limited computing resources of RFID tags. In order to solve the security risks of RFID in user data security and privacy, this paper studies the lightweight of elliptic curve cryptography (ECC) algorithm, which makes it more suitable for RFID tags, and then it designs a new RFID two-way authentication protocol combined the advantages and disadvantages of existing protocol based on ECC algorithms. Finally, in view of the frequent transfer of electronic tag ownership in the logistics supply chain environment, the designed RFID authentication protocol has been extended to make it more suitable for the logistics supply chain.
What problem does this paper attempt to address?