Submission Last Date
Submit Manuscript Online





Open Access

Creative Commons License

Authentication Scheme for Secured RFID


Himja Agrawal , Imperial College of Engineering &Research Pune, Maharashtra; Prof. P.R.Badadapure, Imperial College of Engineering &Research Pune, Maharashtra


Authentication schemes, Elliptic curve cryptography (ECC), Radio frequency identification(RFID), RSA (Rivest, Shamir and Adleman), Public key Cryptosystem(PKC)


Advanced Development in information and communication technologies, there are so many things that gives facility to deal with these technology using internet. This advanced technology brings revolution or convenient system for users. This advance technologies are applied to many applications such as healthcare or medical area, provide security in people information personally or financially, provide interactions among different kinds of devices, like smart vehicles management, for patients medical sensors, monitoring CCD cameras, advanced technology based home appliances, smart city, home automation, smart grid, traffic management, RTO offices etc. For that purpose, we need a unique identification system for each task. For providing proper identification we using RFID (Radio-frequency identification) system. Radio-frequency identification (RFID) is the most important wireless communication technologies used in the Internet of Things as it can store sensitive data, used for wireless communication with other objects, and identify/track particular object automatically. To provide better security and performance to RFID authentication scheme, Elliptic Curve Cryptography is going to be used. Elliptical curve cryptography (ECC) is based on a public key cryptosystem based system that is on elliptic curve theory. Elliptic Curve Cryptography can be used to create smaller, faster, and efficient cryptographic keys. ECC authentication scheme is well suited for wireless communications, like mobile phones and smart cards, personal information like financial transaction or some secret medical reports, confidential data where main consideration is to provide secure data. Elliptic curve cryptography (ECC) system is for provide suitable authentication RFID system because it can provide similar security level but using a smaller key size and has low computational system requirements. The low processing associated with ECC authentication scheme is to make suitable for use with RFID tags because they have consuming limited computing power. In this paper we present a survey paper on ECC based RFID authentication scheme that is suitable for many applications where security is main concern.

Other Details:

Manuscript Id :IJSTEV2I10264
Published in :Volume : 2, Issue : 10
Publication Date: 01/05/2016
Page(s): 859-865
Download Article




Submit Article

Dear Authors, You can submit your article to our journal at the following link: http://www.ijste.org/Submit

Impact Factor

The Impact Factor of our Journal is 4.753 (Year - 2016)
3.905 (Year - 2015) 2.895(Year -2014)

Click Here

Submit Payment Online

Dear Authors, Now you can submit the payment receipt to our journal online at the following link: index.php?p=Payment

Index Copernicus Value

The IC Value of our journal is 69.90
Click Here


Computer Science Directory. We are listed under Computer Research Institutes category

Share on Social media

Home | Privacy Policy | Terms & Conditions | Refund Policy | Feedback | Contact Us
Copyright © 2014 ijste.org All rights reserved