Design and implementation of the electronic label authentication protocol based on digital signature
PDF

Keywords

Digital signature
Electronic tag
ECC algorithm

Abstract

RFID technology plays a critical role in item identification, tracking, asset management, anti-counterfeiting, and wireless communication, significantly enhancing productivity. However, the security of the wireless communication link between electronic tags and readers is a growing concern, limiting wider adoption. Ensuring secure electronic tag authentication is essential.This paper focuses on implementing a system to encrypt electronic tags using digital signature algorithms like Elliptic Curve Cryptography (ECC) and RSA. It compares these methods in terms of signature computation time, memory usage, and key length, highlighting their advantages and limitations. The paper begins by detailing the components, principles, applications, and security challenges of RFID systems. It then delves into ECC, which provides high-security strength with shorter keys, and RSA, which relies on large prime factorization and is widely used. Experimental results reveal that ECC offers advantages in encryption speed and key efficiency, especially in resource-constrained environments, while RSA remains suitable for specific scenarios. This study demonstrates the implementation of these algorithms in RFID systems and provides insights into their comparative strengths and constraints.

https://doi.org/10.71080/dlpr.v1i1.60
PDF

References

Dong Zhenjie. RFID Lag Ownership Transfer Protocol Research in the Internet of Things [D]. Xidian University, 2021.

Liu Yali. RFID Security Certification Protocol Research [D]. Nanjing University of Aeronautics and Astronautics, 2014.

Lu Wenna, Wang Genying, Liu Yun. Research based on a low-cost RFID mid-magnitude security certification protocol [J]. Railway Communication Signal, 2010,46 (12): 32-35.

Liu Yali, Qin Xiaolin, Zhao Xiangjun, etc.. Lightweight RFID authentication protocol based on digital signature [J]. Computer Science, 2015,42 (02): 95-99 + 107.

Shen Shuai. Research on the lightweight two-way security authentication protocol based on RFID [D]. Guilin University of Technology, 2019.

Vajda I,Buttyán L. Lightweightauthentication protocols forlow-cost RFI D tags.[C]. Second Workshop on Security in Ubiquitous Computing – Ubicomp,2003:2003.

Xia Yongxiang, Shi icai, Zhang Yu, et al. An RFID authentication protocol based on the light power encryption system [J]. Computer Engineering, 2014,40 (07): 69-72.

Cao Shuiren, Longhua, Liu Yun, etc. Performance analysis of digital signatures based on elliptic curves and RSA [J]. Modern electronic technology, 2006 (17): 29-31.

S. I. Ahamed, F. Rahman, E. Hoque.ERAP: ECC Based RFID Authentication Protocol.[J]. 2008 12th IEEE International Works hop on FutureTrends o fDistributed ComputingSystems, Kunming, China, 2008,pp:219-225

Gan Yong, Xu Yunqian, He Lei, etc. Review of the security and privacy of RFID systems [J]. Network Security Technology and Applications, 2015, No.180 (12): 69-71.

Ma Liqiong, Gao Daqing, Zhang Yumei. Research on RFID technology [J]. Information and Computer (theoretical edition), 2019,31 (20): 150-151 + 157.

Li Fuyu, Li Zhekun. Analysis of frequency band characteristics and application status of radio frequency identification (RFID) system [J]. Guide, 2007, No.45 (09): 1 + 3.

Liu Kai, Bi Yanbo, Guo Guowei. Analysis of the composition and characteristics of RFID technology [J]. Chinese and foreign entrepreneurs, 2015, No.484 (02): 128.

Wang Juan. RFID authentication protocol study based on hash function [D]. Nanjing University of Posts and Telecommunications, 2012.

Ayaz H M, Ummer I, G. M B. MutualEntity Authentication Pro tocol Based on ECDSAfor WSN.[J]. Procedia ComputerScience, 2016,89:187-192.

Li Hongzhang. Overview of the application of RFID read-write RFID technology in intelligent manufacturing systems [J]. Information and Computer (theoretical edition), 2021,33 (03): 173-175.

Tian Haowei. An RFID security protocol study based on ECC [D]. Yanshan University, 2022.

Zhang Wenli, Zhao Feng. Design and analysis of the RFID two-way security authentication protocol [J]. Smart Computer and Application, 2013,3 (05): 91-93.

Yang Wenqing. On the digital signature and the digital certificate [J]. Computer Products and Circulation, 2020 (11): 286.

Sun Yue. Research on the blockchain-based key generation and negotiation scheme [D]. Nanjing University of Posts and Telecommunications, 2020.

Chen Xianglin, Liu Runtao, Yu Cunguang. Hybrid data encryption algorithm based on DES and ECC [J]. Journal of Harbin University of Science and Technology, 2007 (01): 58-61.

Pang Wen. Application of the ECC algorithm in the digital signature [J]. Journal of Weinan Normal University, 2006 (02): 41-43.

Zhao Lijuan. Design and implementation of the licensing system based on ECC signature [J]. Microcomputer Information, 2010,26 (33): 54-55 + 60.

Song Shujun. Application of the RSA algorithm in the digital signature [D]. China University of Petroleum, 2007.

Li Qing, Chen Liang, Feng Mei, etc. Some typical data encryption algorithms [J]. Information System Engineering, 2017, No.287 (11): 148-149.

Liu Chun, Zhang Fengyuan, Zhang Qishan. Comparison and implementation of RSA and ECC algorithms based on smart cards [J]. Computer Engineering and Application, 2007, No.563 (04): 96-98 + 118.

Hu Nengfa. A message recovery signature based on elliptic cryptography [J]. Journal of Yangtze University (Natural Science Edition), Polytechnic Volume, 2008 (01): 190-192.

Zhao Jie. Analysis of the Internet of Things Security Technology [J]. Information Technology and Informatization, 2020, No.248 (11): 155-157.

Creative Commons License

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.