Abstract

The security of most existing RFID protocols, which is difficult to guarantee, is based on simple XOR or Hash operations. However, the more secure traditional encryption algorithm is difficult to apply to the RFID system directly, due to the limited computing resources of RFID tags. In order to solve the security risks of RFID in user data security and privacy, this paper studies the lightweight of elliptic curve cryptography (ECC) algorithm, which makes it more suitable for RFID tags, and then it designs a new RFID two-way authentication protocol combined the advantages and disadvantages of existing protocol based on ECC algorithms. Finally, in view of the frequent transfer of electronic tag ownership in the logistics supply chain environment, the designed RFID authentication protocol has been extended to make it more suitable for the logistics supply chain.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call