ECC-based untraceable authentication for large-scale active-tag RFID systems

被引:0
|
作者
Yalin Chen
Jue-Sam Chou
机构
[1] National Tsing Hua University,Institute of Information Systems and Applications
[2] Nanhua University,Department of Information Management
来源
关键词
RFID; Identification protocol; Untraceability; Location privacy; Scalability; Elliptic curve cryptography;
D O I
暂无
中图分类号
学科分类号
摘要
Radio frequency identification tag authentication protocols are generally classified as non-full-fledged and full-fledged, according to the resource usage of the tags. The non-full-fledged protocols typically suffer de-synchronization, impersonation and tracking attacks, and usually lack scalability. The full-fledged protocols, supporting cryptographic functions, are designed to overcome these weaknesses. This paper examines several elliptic-curve-cryptography (ECC)-based full-fledged protocols. We found that some still have security and privacy issues, and others generate excessive communication costs between the tag and the back-end server. Motivated by these observations, we construct two novel protocols, PI and PII. PI is designed for secure environments and is suitable for applications, including E-Passport and toll payment in vehicular ad-hoc networks. PII is for hostile environments and can be applied in pseudonymous payment and anti-counterfeiting services. After analysis, we conclude that PII can resist many attacks, outperform previous ECC-based proposals in communication efficiency, and provide mutual authentication function and scalability.
引用
收藏
页码:97 / 120
页数:23
相关论文
共 50 条
  • [1] ECC-based untraceable authentication for large-scale active-tag RFID systems
    Chen, Yalin
    Chou, Jue-Sam
    ELECTRONIC COMMERCE RESEARCH, 2015, 15 (01) : 97 - 120
  • [2] An Untraceable ECC-Based Remote User Authentication Scheme
    Mehmood, Zahid
    Chen, Gongliang
    Li, Jianhua
    Albeshri, Aiiad
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2017, 11 (03): : 1742 - 1760
  • [3] ECC-Based RFID Authentication Protocol
    Yang X.-C.
    Xu C.-X.
    Li C.-R.
    Journal of Electronic Science and Technology, 2020, 18 (04) : 320 - 329
  • [4] ECC-Based RFID Authentication Protocol
    Xing-Chun Yang
    Chun-Xiang Xu
    Chao-Rong Li
    JournalofElectronicScienceandTechnology, 2020, 18 (04) : 320 - 329
  • [5] Vulnerabilities of an ECC-based RFID authentication scheme
    Li, Nan
    Mu, Yi
    Susilo, Willy
    Guo, Fuchun
    Varadharajan, Vijay
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (17) : 3262 - 3270
  • [6] Hierarchical ECC-Based RFID Authentication Protocol
    Batina, Lejia
    Seys, Stefaan
    Singelee, Dave
    Verbanwhede, Ingrid
    RFID SECURITY AND PRIVACY, 2012, 7055 : 183 - 201
  • [7] A Novel ECC-based RFID Authentication Protocol
    Fang Mingwei
    Wu Junjun
    Zhang Xinfang
    Chen Hong
    ADVANCED MATERIALS AND COMPUTER SCIENCE, PTS 1-3, 2011, 474-476 : 1764 - +
  • [8] Hierarchical ECC-Based RFID Authentication Protocol
    Batina, Lejla
    Seys, Stefaan
    Singelee, Dave
    Verbauwhede, Ingrid
    RFID: SECURITY AND PRIVACY: 7TH INTERNATIONALWORKSHOP, RFIDSEC 2011, 2012, 7055 : 183 - 201
  • [9] New ECC-Based IoT Authentication Protocol for Securing RFID Systems
    Timouhin H.
    Amounas F.
    Azrour M.
    SN Computer Science, 4 (6)
  • [10] A Highly Efficient ECC-Based Authentication Protocol for RFID
    Alaoui, Hasnae Lamrani
    El Ghazi, Abdellatif
    Zbakh, Mustapha
    Touhafi, Abdellah
    Braeken, An
    JOURNAL OF SENSORS, 2021, 2021