By Topic

Enhancement of the Mutual Authentication protocol on RFID Passive Tags

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)

Radio frequency identification (RFID) is being deployed for a wide variety of applications, including supply chain management, inventory, storage, etc. However, RFID systems can have security problems if the tag offers no access control and certificated mechanisms. By utilizing responses from a tag, an adversary may try to obtain the information of the product and trace the user. In 2006, Lee et al. proposed a mutual authentication scheme based on synchronized secret information. They show their scheme offers the most enhanced security feature in RFID mutual authentication to protect a user's privacy and possesses a low computation for tags. However, we will show that Lee et al's scheme is still susceptible to a forgery attack. We also present a simple method to strengthen its security.

Published in:

Intelligent Information Hiding and Multimedia Signal Processing, 2007. IIHMSP 2007. Third International Conference on  (Volume:1 )

Date of Conference:

26-28 Nov. 2007