Visible to the public Adoption of a Secure ECC-based RFID Authentication Protocol

TitleAdoption of a Secure ECC-based RFID Authentication Protocol
Publication TypeConference Paper
Year of Publication2022
AuthorsGabsi, Souhir, Kortli, Yassin, Beroulle, Vincent, Kieffer, Yann, Belgacem, Hamdi
Conference Name2022 IEEE 9th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT)
Date Publishedmay
Keywordsauthentication, authentication protocol, ECC, Elliptic curve cryptography, human factors, Internet of Things, Protocols, pubcrawl, resilience, Resiliency, RFID, RFIDs, security, Telecommunications, Wireless attack, Wireless communication
AbstractA single RFID (Radio Frequency Identification) is a technology for the remote identification of objects or people. It integrates a reader that receives the information contained in an RFID tag through an RFID authentication protocol. RFID provides several security services to protect the data transmitted between the tag and the reader. However, these advantages do not prevent an attacker to access this communication and remaining various security and privacy issues in these systems. Furthermore, with the rapid growth of IoT, there is an urgent need of security authentication and confidential data protection. Authentication protocols based on elliptic curve cryptographic (ECC) were widely investigated and implemented to guarantee protection against the various attacks that can suffer an RFID system. In this paper, we are going to focus on a comparative study between the most efficient ECC-based RFID authentication protocols that are already published, and study their security against the different wireless attacks.
Citation Keygabsi_adoption_2022