IJSTE

CALL FOR PAPERS : Sep 2017

Submission Last Date
25-Sep--17
Submit Manuscript Online

FOR AUTHORS

FOR REVIEWERS

ARCHIEVES

DOWNLOADS

Open Access



CopyScape
Creative Commons License

Authentication Scheme for Secured RFID


Author(s):

Himja Agrawal , Imperial College of Engineering &Research Pune, Maharashtra; Prof. P.R.Badadapure, Imperial College of Engineering &Research Pune, Maharashtra

Keywords:

Authentication schemes, Elliptic curve cryptography (ECC), Radio frequency identification(RFID), RSA (Rivest, Shamir and Adleman), Public key Cryptosystem(PKC)

Abstract:

Advanced Development in information and communication technologies, there are so many things that gives facility to deal with these technology using internet. This advanced technology brings revolution or convenient system for users. This advance technologies are applied to many applications such as healthcare or medical area, provide security in people information personally or financially, provide interactions among different kinds of devices, like smart vehicles management, for patients medical sensors, monitoring CCD cameras, advanced technology based home appliances, smart city, home automation, smart grid, traffic management, RTO offices etc. For that purpose, we need a unique identification system for each task. For providing proper identification we using RFID (Radio-frequency identification) system. Radio-frequency identification (RFID) is the most important wireless communication technologies used in the Internet of Things as it can store sensitive data, used for wireless communication with other objects, and identify/track particular object automatically. To provide better security and performance to RFID authentication scheme, Elliptic Curve Cryptography is going to be used. Elliptical curve cryptography (ECC) is based on a public key cryptosystem based system that is on elliptic curve theory. Elliptic Curve Cryptography can be used to create smaller, faster, and efficient cryptographic keys. ECC authentication scheme is well suited for wireless communications, like mobile phones and smart cards, personal information like financial transaction or some secret medical reports, confidential data where main consideration is to provide secure data. Elliptic curve cryptography (ECC) system is for provide suitable authentication RFID system because it can provide similar security level but using a smaller key size and has low computational system requirements. The low processing associated with ECC authentication scheme is to make suitable for use with RFID tags because they have consuming limited computing power. In this paper we present a survey paper on ECC based RFID authentication scheme that is suitable for many applications where security is main concern.


Other Details:

Manuscript Id :IJSTEV2I10264
Published in :Volume : 2, Issue : 10
Publication Date: 01/05/2016
Page(s): 859-865
Download Article

IMPACT FACTOR

3.905

NEWS & UPDATES

Submit Article

Dear Authors, You can submit your article to our journal at the following link: http://www.ijste.org/Submit

Impact Factor

The Impact Factor of our Journal is 4.753 (Year - 2016)
3.905 (Year - 2015) 2.895(Year -2014)

Click Here

Submit Payment Online

Dear Authors, Now you can submit the payment receipt to our journal online at the following link: index.php?p=Payment

IC Value

ThVe IC Value of our journal is 62.78
Click Here

GLOBAL INDEXING



















Computer Science Directory. We are listed under Computer Research Institutes category

Share on Social media

Home | Privacy Policy | Terms & Conditions | Refund Policy | Feedback | Contact Us
Copyright © 2014 ijste.org All rights reserved