Next Article in Journal
Target Tracking While Jamming by Airborne Radar for Low Probability of Detection
Previous Article in Journal
Ruthenium Oxide Nanorods as Potentiometric pH Sensor for Organs-On-Chip Purposes
Article Menu
Issue 9 (September) cover image

Export Article

Open AccessReview
Sensors 2018, 18(9), 2902; https://doi.org/10.3390/s18092902

Comparison and Feasibility of Various RFID Authentication Methods Using ECC

Department of Computer Science and Engineering; University of Bridgeport; Bridgeport, CT 06604, USA
*
Author to whom correspondence should be addressed.
Received: 9 July 2018 / Revised: 30 August 2018 / Accepted: 30 August 2018 / Published: 1 September 2018
(This article belongs to the Section Sensor Networks)
Full-Text   |   PDF [3207 KB, uploaded 1 September 2018]   |  

Abstract

Radio frequency identification (RFID) is a technology that has grown in popularity and in the applications of use. However, there are major issues regarding security and privacy with respect to RFID technology which have caught the interest of many researchers. There are significant challenges which must be overcome to resolve RFID security and privacy issues. One reason is the constraints attached to the provision of security and privacy in RFID systems. Along with meeting the security and privacy needs of RFID technology, solutions must be inexpensive, practical, reliable, scalable, flexible, inter-organizational, and long-lasting. To make RFID identifiers effective and efficient they must identify the item(s) while resisting attacks aimed at obtaining the tag’s information and compromising the system or making it possible to bypass the protection RFID tags are supposed to provide. Different authentication methods have been proposed, researched, and evaluated in the literature. In this work, we proposed our methodology in evaluating RFID authentication, and a few of the most promising authentication methods are reviewed, compared, and ranked in order to arrive at a possible best choice of protocol to use. View Full-Text
Keywords: authentication; RFID; elliptic curve cryptography; Random Access Control; security; privacy; IoT; lightweight protocol authentication; RFID; elliptic curve cryptography; Random Access Control; security; privacy; IoT; lightweight protocol
Figures

Figure 1

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. (CC BY 4.0).
SciFeed

Share & Cite This Article

MDPI and ACS Style

Alexander, P., Jr.; Baashirah, R.; Abuzneid, A. Comparison and Feasibility of Various RFID Authentication Methods Using ECC. Sensors 2018, 18, 2902.

Show more citation formats Show less citations formats

Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Related Articles

Article Metrics

Article Access Statistics

1

Comments

[Return to top]
Sensors EISSN 1424-8220 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top