2011
DOI: 10.1016/j.comcom.2010.05.011
|View full text |Cite
|
Sign up to set email alerts
|

Improvement of the RFID authentication scheme based on quadratic residues

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
23
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 59 publications
(25 citation statements)
references
References 15 publications
0
23
0
Order By: Relevance
“…Later, Cao and Shen indicated that Chen et al's scheme cannot resist impersonation attack [15]. Yeh et al further found that Chen et al's scheme cannot protect location privacy and proposed an improvement [14]. After thorough investigation, we find that the server needs to maintain the obsolete shared secret key to resist DoS (Denial of Service) attack in both Chen et al's and Yeh et al's schemes.…”
Section: Introductionmentioning
confidence: 88%
See 1 more Smart Citation
“…Later, Cao and Shen indicated that Chen et al's scheme cannot resist impersonation attack [15]. Yeh et al further found that Chen et al's scheme cannot protect location privacy and proposed an improvement [14]. After thorough investigation, we find that the server needs to maintain the obsolete shared secret key to resist DoS (Denial of Service) attack in both Chen et al's and Yeh et al's schemes.…”
Section: Introductionmentioning
confidence: 88%
“…Recently, many RFID schemes have been proposed for location privacy protection. According to utilized methods, these schemes can be divided into two categories: pseudonym [7,8] and shared secret update [2,3,[9][10][11][12][13][14]. In the first category, the server and the tag preshare a series of pseudonyms.…”
Section: Introductionmentioning
confidence: 99%
“…However, cryptanalysis of the scheme by Cao and Shen [24] shows that the scheme is vulnerable to tag impersonation attacks, replay attacks and tag location disclosure. Chen's scheme was improved by Yeh and Wu [25] by having the tag generate an additional random number. However, since PAP and both the original quadratic residue based scheme and the improved version require the tag to compute multiple hash functions they are not suitable for EPC Class-1 Gen-2 tags.…”
Section: Related Workmentioning
confidence: 99%
“…In our mutual authentication scheme and those proposed by Chien [29], Chen [23],Yeh [25] and Chen [27] the channel between the reader and the server is assumed to be secure. Hence there is no reader-server authentication that is built into the schemes.…”
Section: B Performance Comparisonmentioning
confidence: 99%
“…RFID authentication has been intensively studied by researchers like [2]- [6], [11]- [26]. The security features of extant schemes have been improved to some extent, but only few of them simultaneously considered anonymity, un-traceability and forward secrecy.…”
Section: Introductionmentioning
confidence: 99%