What is it about?

We construct two novel ECC-based protocols, PI and PII. PI is designed for secure environments and is suitable for applications, including E-Passport and toll payment in vehicular ad-hoc networks. PII is for hostile environments and can be applied in pseudonymous payment and anti-counterfeiting services.

Featured Image

Why is it important?

After analysis, we conclude that PII can resist many attacks, outperform previous ECC-based proposals in communication efficiency, and provide mutual authentication function and scalability. From the comparison results among PII and various ECC-based RFID authentication protocols, we conclude that the proposed protocol PII (the reduced version), which requires only two passes, and uses just two point multiplications and two hash operations on the tag side, not only had the same security level as EC-RAC IV but also was more efficient than the recently proposed solutions.

Perspectives

We, therefore, conclude that PII is suitably applied in a real mobile world which needs high security and large-scale deployment, such as E-Passport.

Professor Jue-Sam Chou
University of Nanhua

Read the Original

This page is a summary of: ECC-based untraceable authentication for large-scale active-tag RFID systems, Electronic Commerce Research, November 2014, Springer Science + Business Media,
DOI: 10.1007/s10660-014-9165-0.
You can read the full text:

Read

Contributors

The following have contributed to this page