What is it about?
We construct two novel ECC-based protocols, PI and PII. PI is designed for secure environments and is suitable for applications, including E-Passport and toll payment in vehicular ad-hoc networks. PII is for hostile environments and can be applied in pseudonymous payment and anti-counterfeiting services.
Featured Image
Why is it important?
After analysis, we conclude that PII can resist many attacks, outperform previous ECC-based proposals in communication efficiency, and provide mutual authentication function and scalability. From the comparison results among PII and various ECC-based RFID authentication protocols, we conclude that the proposed protocol PII (the reduced version), which requires only two passes, and uses just two point multiplications and two hash operations on the tag side, not only had the same security level as EC-RAC IV but also was more efficient than the recently proposed solutions.
Perspectives
Read the Original
This page is a summary of: ECC-based untraceable authentication for large-scale active-tag RFID systems, Electronic Commerce Research, November 2014, Springer Science + Business Media,
DOI: 10.1007/s10660-014-9165-0.
You can read the full text:
Contributors
The following have contributed to this page