ECC Based RFID Authentication in WSN/IoT

Show simple item record

dc.contributor.author Khan, Salman Sayeed
dc.contributor.author Ahmed, Sheik Benazir
dc.date.accessioned 2017-10-25T10:06:35Z
dc.date.available 2017-10-25T10:06:35Z
dc.date.issued 2016-11-20
dc.identifier.citation [1] P. Tuyls and L. Batina, \R d-tags for anti-counterfeiting," in Topics in cryptology{CT-RSA 2006. Springer, 2006, pp. 115{131. [2] Y. K. Lee, L. Batina, and I. Verbauwhede, \Ec-rac (ecdlp based randomized ac- cess control): Provably secure r d authentication protocol," in RFID, 2008 IEEE International Conference on. IEEE, 2008, pp. 97{104. [3] L. Batina, J. Guajardo, T. Kerins, N. Mentens, P. Tuyls, and I. Verbauwhede, \Public-key cryptography for r d-tags," in Pervasive Computing and Communica- tions Workshops, 2007. PerCom Workshops' 07. Fifth Annual IEEE International Conference on. IEEE, 2007, pp. 217{ 222. [4] L. Batina, J. Guajardo, T. Kerins, N. Mentens, P. Tuyls, and I. Verbauwhede, \Public-key cryptography for r d-tags," in Pervasive Computing and Communica- tions Workshops, 2007. PerCom Workshops' 07. Fifth Annual IEEE International Conference on. IEEE, 2007, pp. 217{ 222. [5] M. S. Farash, \Cryptanalysis and improvement of an e cient mutual authentication r d scheme based on elliptic curve cryptography," The Journal of Supercomputing, vol. 70, no. 2, pp. 987{1001, 2014. [6] Z. Zhang and Q. Qi, \An e cient r d authentication protocol to enhance patient medication safety using elliptic curve cryptography," Journal of medical systems, vol. 38, no. 5, pp. 1{7, 2014. [7] Y.-P. Liao and C.-M. Hsiao, \A secure ecc-based r d authentication scheme inte- grated with id-veri er transfer protocol," Ad Hoc Networks, vol. 18, pp. 133{146, 2014. [8] Z. Zhao, \A secure r d authentication protocol for healthcare environments using elliptic curve cryptosystem," Journal of medical systems, vol. 38, no. 5, pp. 1{7, 2014. [9] D. He, N. Kumar, N. Chilamkurti, and J.-H. Lee, \Lightweight ecc based r d authen- tication integrated with an id veri er transfer protocol," Journal of medical systems, vol. 38, no. 10, pp. 1{6, 2014. [10] D. He, N. Kumar, N. Chilamkurti, and J.-H. Lee, \Lightweight ecc based r d authentication integrated with an id veri er transfer protocol," Journal of medical systems, vol. 38, no. 10, pp. 1{6, 2014. 39 en_US
dc.identifier.uri http://hdl.handle.net/123456789/97
dc.description Supervised by Prof. Dr. Muhammad Mahbub Alam Professor Department of CSE Islamic University of Technology en_US
dc.description.abstract Radio-frequency identi cation (RFID) uses electromagnetic elds to automatically iden- tify and track tags attached to objects. The tags contain electronically stored informa- tion. Unlike a barcode, the tag need not be within the line of sight of the reader, so it may be embedded in the tracked object. RFID is one method for Automatic Identi ca- tion and Data Capture (AIDC). RFID tags are used in many industries, for example, an RFID tag attached to an automobile during production can be used to track its progress through the assembly line; RFID-tagged pharmaceuticals can be tracked through ware- houses; and implanting RFID microchips in livestock and pets allows positive identi ca- tion of animals. In this we paper we review some of the RFID authentication protocols and compare their strengths/weaknesses and propose an authentication protocol that we have thought of provide a comparative analysis of our protocol. en_US
dc.language.iso en en_US
dc.publisher IUT, CSE en_US
dc.title ECC Based RFID Authentication in WSN/IoT en_US
dc.type Thesis en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search IUT Repository


Advanced Search

Browse

My Account

Statistics