Improvement of the RFID authentication scheme based on quadratic residues

Tzu Chang Yeh, Chien Hung Wu, Yuh-Min Tseng

Research output: Contribution to journalArticle

56 Citations (Scopus)

Abstract

RFID, with its capability of remote automatic identification, is taking the place of barcodes and becoming the new generation of electronic tags. However, information transmitted through the air is vulnerable to eavesdropping, interception, or modification due to its radio transmission nature; the prevalence of RFID has greatly increased security and privacy concerns. In 2008, Chen et al. proposed an RFID authentication scheme which can enhance security and privacy by using hash functions and quadratic residues. However, their scheme was found to be vulnerable to impersonation attacks. This study further demonstrates that their scheme does not provide location privacy and suffers from replay attacks. An improved scheme is also proposed which can prevent possible attacks and be applied in environments requiring a high level of security.

Original languageEnglish
Pages (from-to)337-341
Number of pages5
JournalComputer Communications
Volume34
Issue number3
DOIs
Publication statusPublished - 2011 Mar 15

Fingerprint

Radio frequency identification (RFID)
Authentication
Radio transmission
Hash functions
Identification (control systems)
Air

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications

Cite this

Yeh, Tzu Chang ; Wu, Chien Hung ; Tseng, Yuh-Min. / Improvement of the RFID authentication scheme based on quadratic residues. In: Computer Communications. 2011 ; Vol. 34, No. 3. pp. 337-341.
@article{ab52f77dd62d4c109e6898bd7812b361,
title = "Improvement of the RFID authentication scheme based on quadratic residues",
abstract = "RFID, with its capability of remote automatic identification, is taking the place of barcodes and becoming the new generation of electronic tags. However, information transmitted through the air is vulnerable to eavesdropping, interception, or modification due to its radio transmission nature; the prevalence of RFID has greatly increased security and privacy concerns. In 2008, Chen et al. proposed an RFID authentication scheme which can enhance security and privacy by using hash functions and quadratic residues. However, their scheme was found to be vulnerable to impersonation attacks. This study further demonstrates that their scheme does not provide location privacy and suffers from replay attacks. An improved scheme is also proposed which can prevent possible attacks and be applied in environments requiring a high level of security.",
author = "Yeh, {Tzu Chang} and Wu, {Chien Hung} and Yuh-Min Tseng",
year = "2011",
month = "3",
day = "15",
doi = "10.1016/j.comcom.2010.05.011",
language = "English",
volume = "34",
pages = "337--341",
journal = "Computer Communications",
issn = "0140-3664",
publisher = "Elsevier",
number = "3",

}

Improvement of the RFID authentication scheme based on quadratic residues. / Yeh, Tzu Chang; Wu, Chien Hung; Tseng, Yuh-Min.

In: Computer Communications, Vol. 34, No. 3, 15.03.2011, p. 337-341.

Research output: Contribution to journalArticle

TY - JOUR

T1 - Improvement of the RFID authentication scheme based on quadratic residues

AU - Yeh, Tzu Chang

AU - Wu, Chien Hung

AU - Tseng, Yuh-Min

PY - 2011/3/15

Y1 - 2011/3/15

N2 - RFID, with its capability of remote automatic identification, is taking the place of barcodes and becoming the new generation of electronic tags. However, information transmitted through the air is vulnerable to eavesdropping, interception, or modification due to its radio transmission nature; the prevalence of RFID has greatly increased security and privacy concerns. In 2008, Chen et al. proposed an RFID authentication scheme which can enhance security and privacy by using hash functions and quadratic residues. However, their scheme was found to be vulnerable to impersonation attacks. This study further demonstrates that their scheme does not provide location privacy and suffers from replay attacks. An improved scheme is also proposed which can prevent possible attacks and be applied in environments requiring a high level of security.

AB - RFID, with its capability of remote automatic identification, is taking the place of barcodes and becoming the new generation of electronic tags. However, information transmitted through the air is vulnerable to eavesdropping, interception, or modification due to its radio transmission nature; the prevalence of RFID has greatly increased security and privacy concerns. In 2008, Chen et al. proposed an RFID authentication scheme which can enhance security and privacy by using hash functions and quadratic residues. However, their scheme was found to be vulnerable to impersonation attacks. This study further demonstrates that their scheme does not provide location privacy and suffers from replay attacks. An improved scheme is also proposed which can prevent possible attacks and be applied in environments requiring a high level of security.

UR - http://www.scopus.com/inward/record.url?scp=78751649779&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=78751649779&partnerID=8YFLogxK

U2 - 10.1016/j.comcom.2010.05.011

DO - 10.1016/j.comcom.2010.05.011

M3 - Article

AN - SCOPUS:78751649779

VL - 34

SP - 337

EP - 341

JO - Computer Communications

JF - Computer Communications

SN - 0140-3664

IS - 3

ER -