文献知网节
  • 记笔记

ECC Implementation for Secured RFID Communication

Monika Sharma1P.C.Agrawal2

1. Mewar University (Chittorgarh) Raj.,Department of Computer Science & System Studies, Asst.Professor Amity Institute of Information Technology, Amity University, Secor-125,Noida,U.P., INDIA2. Mewar University & Retired ‘Scientist E’ Ministry of communication & Information Technology Govt.of India, New Delhi

摘要:To protect RFID privacy violation against various attacks(like eavesdropping, location tracking, spoofing, message loss or replay attack etc.) some of the encryption schemes were proposed by researchers to provide secure communication such as blocker-tag, hash lock scheme, randomized hash lock, hash chain, variable ID, reencryption, RSA etc. However applying this public key encryption approach requires higher implementation effort in chip size, low performance and high power consumption. A good RFID tag is one which is cheap(small area), scalable, securable, untraceable(PKC) and fast(light weight). As ECC is based on multiplication technique so it is comparatively faster, cheap and complex than other techniques. So in this paper we will approach this technique in such a way that both tag as well as reader authenticates while accessing the information through server and data can be protected from eavesdropping.
会议名称:

2nd International Multi-Conference on Computer, Electrical, Electronics and Mechanical Engineering (IMCEEME’14);2nd International Journal Multi-Conference on Agriculture, Ecological and Medical Sciences (IJMAEMS’14)

会议时间:

2014-03-27;2014-03-27

会议地点:

Kuala Lumpur,Malaysia;Kuala Lumpur,Malaysia

  • 专辑:

    电子技术及信息科学

  • 专题:

    计算机软件及计算机应用

  • 分类号:

    TP391.44

  • 手机阅读
    即刻使用手机阅读
    第一步

    扫描二维码下载

    "移动知网-全球学术快报"客户端

    第二步

    打开“全球学术快报”

    点击首页左上角的扫描图标

    第三步

    扫描二维码

    手机同步阅读本篇文献

  • CAJ下载
  • PDF下载

下载手机APP用APP扫此码同步阅读该篇文章

下载:10 页码:50-53 页数:4 大小:737k

相关推荐
  • 相似文献
  • 读者推荐
  • 相关基金文献
  • 关联作者
  • 相关视频