Total views : 210
Secure Elliptic Curve Cryptography based RFID Authentication Schemes for Internet of Things
In medical field, patients generally need highly equipped systems because of their inability to access emergency systems. In such situation, high level of security must be ensured to prevent fatal medical errors. RFID technology is generally used in the medical environment. Applications of elliptic curve algorithm are considered and several cryptography modules are analyzed. Heavy weight schemes are considered to be highly secure. Security drawbacks have been analyzed in Godor and Imre scheme in terms of maximum delay and running time and improved encryption and decryption scheme has been proposed. The proposed algorithm has been simulated in Xilinx 14.5 ISE and worst case slack, running time and frequency has been analyzed.
Desynchronisation Attacks, DOS Attacks, Elliptic Curve Cryptography, IoT, RFID Technology, Server Spoofing Attacks.
- Najera P. Real-time location and inpatient care systems based on passive RFID. Journal of Networkand Computer Application. 2011; 34(3):980–9.
- Wang C. Lightweight RFID authentication protocol based on elliptic curve cryptography. Journal of Computers. 2013; 8(11):2880–7.
- Wang S. Analysis and construction of efficient RFID authentication protocol with backward privacy. Advances in Wireless Sensor Networks. Berlin,Germany: Springer-Verlag. 2014; 334:458–66.
- Kaya SV, Savaş E, Levi A, Ercetin O. Public key cryptography based privacy preserving multi-context RFID infrastructure. Ad Hoc Networks. 2009; 7(1):136–52.
- Batina L. Public-key cryptography for RFID-tags. Proceeding of IEEE International Workshop Pervasive Compuer Communication Security; White Planis, NY. 2007. p. 217–22.
- Amendo S. RFID technology for IoT based personal healthcare in smart spaces. IEEE Internet of Things. 2014; 1(2):144–52.
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.