4.7 Article

KL-RAP: An Efficient Key-Less RFID Authentication Protocol Based on ECDLP for Consumer Warehouse Management System

Journal

Publisher

IEEE COMPUTER SOC
DOI: 10.1109/TNSE.2022.3179830

Keywords

Authentication; Protocols; Security; Servers; Elliptic curve cryptography; Elliptic curves; Privacy; Warehouse management system (WMS); radio-frequency identification (RFID); authentication; key agreement; elliptic curve cryptography (ECC); security

Ask authors/readers for more resources

Elliptic Curve Cryptography (ECC)-based authentication schemes have emerged as a safe and efficient option for RFID environments. However, limited resources in passive tags make practical implementation difficult. This study presents a key-less scheme based on the Elliptic Curve Discrete Logarithm Problem (ECDLP), enabling efficient authentication in Warehouse Management Systems (WMS) while reducing memory usage and computation costs.
Elliptic Curve Cryptography (ECC)-based authenti-cation schemes for the Radio-frequency identification (RFID) environment have emerged as a very safe, secure, and robust candidate of mutual authentication. However, the limited resource availability in a passive tag makes such schemes difficult to realize in practice. Public/private key pair generation, storage, and the computation using those keys are the major bottlenecks towards the faster and efficient design of such schemes. Therefore, we have designed our scheme without using public/private key pairs. We only utilize the Elliptic Curve Discrete Logarithm Problem (ECDLP) property for the realization of our key-less scheme on the secure elliptic curves. Our scheme is primarily aimed at efficient implementation of authentication schemes in Warehouse Management System (WMS), where the data is stored in local servers. This new idea helps to save the memory space in the tags and the server. Moreover, the computation cost also reduces to a great extent in comparison to other schemes. We have compared our scheme with several other schemes and found it efficient in terms of storage cost as well. The simulation result of our scheme with the popular automated software validation tool, Scyther, shows that it is safe from different possible attacks.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available