A Location-Privacy-Protected RFID Authentication Scheme

RFID is popular to be used in plenty of applications with its capability of remote automatic identification. However, information transmitted wirelessly is under the treats of eavesdropping, interception, or modification because of the nature of the transmission media. Thus, Yeh et al. proposed an RFID authentication scheme based on quadratic residues by improving Chen et al.'s. However, the authors find that the server needs to maintain the obsolete shared secret key to resist DoS (Denial of Service) attack in both schemes.

Provided by: Institute of Electrical & Electronic Engineers Topic: Mobility Date Added: Apr 2011 Format: PDF

Find By Topic