Improvement of the RFID authentication scheme based on quadratic residues

Tzu Chang Yeh, Chien Hung Wu, Yuh Min Tseng

Research output: Contribution to journalArticlepeer-review

58 Citations (Scopus)


RFID, with its capability of remote automatic identification, is taking the place of barcodes and becoming the new generation of electronic tags. However, information transmitted through the air is vulnerable to eavesdropping, interception, or modification due to its radio transmission nature; the prevalence of RFID has greatly increased security and privacy concerns. In 2008, Chen et al. proposed an RFID authentication scheme which can enhance security and privacy by using hash functions and quadratic residues. However, their scheme was found to be vulnerable to impersonation attacks. This study further demonstrates that their scheme does not provide location privacy and suffers from replay attacks. An improved scheme is also proposed which can prevent possible attacks and be applied in environments requiring a high level of security.

Original languageEnglish
Pages (from-to)337-341
Number of pages5
JournalComputer Communications
Issue number3
Publication statusPublished - 2011 Mar 15

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications

Fingerprint Dive into the research topics of 'Improvement of the RFID authentication scheme based on quadratic residues'. Together they form a unique fingerprint.

Cite this