{"title":"RFID无源标签相互认证协议的改进","authors":"Kuo-Ching Liu, Hsin-Wei Wang, Hui-Feng Huang","doi":"10.1109/IIH-MSP.2007.396","DOIUrl":null,"url":null,"abstract":"Radio frequency identification (RFID) is being deployed for a wide variety of applications, including supply chain management, inventory, storage, etc. However, RFID systems can have security problems if the tag offers no access control and certificated mechanisms. By utilizing responses from a tag, an adversary may try to obtain the information of the product and trace the user. In 2006, Lee et al. proposed a mutual authentication scheme based on synchronized secret information. They show their scheme offers the most enhanced security feature in RFID mutual authentication to protect a user's privacy and possesses a low computation for tags. However, we will show that Lee et al's scheme is still susceptible to a forgery attack. We also present a simple method to strengthen its security.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Enhancement of the Mutual Authentication protocol on RFID Passive Tags\",\"authors\":\"Kuo-Ching Liu, Hsin-Wei Wang, Hui-Feng Huang\",\"doi\":\"10.1109/IIH-MSP.2007.396\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Radio frequency identification (RFID) is being deployed for a wide variety of applications, including supply chain management, inventory, storage, etc. However, RFID systems can have security problems if the tag offers no access control and certificated mechanisms. By utilizing responses from a tag, an adversary may try to obtain the information of the product and trace the user. In 2006, Lee et al. proposed a mutual authentication scheme based on synchronized secret information. They show their scheme offers the most enhanced security feature in RFID mutual authentication to protect a user's privacy and possesses a low computation for tags. However, we will show that Lee et al's scheme is still susceptible to a forgery attack. We also present a simple method to strengthen its security.\",\"PeriodicalId\":385132,\"journal\":{\"name\":\"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)\",\"volume\":\"79 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2007-11-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IIH-MSP.2007.396\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IIH-MSP.2007.396","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Enhancement of the Mutual Authentication protocol on RFID Passive Tags
Radio frequency identification (RFID) is being deployed for a wide variety of applications, including supply chain management, inventory, storage, etc. However, RFID systems can have security problems if the tag offers no access control and certificated mechanisms. By utilizing responses from a tag, an adversary may try to obtain the information of the product and trace the user. In 2006, Lee et al. proposed a mutual authentication scheme based on synchronized secret information. They show their scheme offers the most enhanced security feature in RFID mutual authentication to protect a user's privacy and possesses a low computation for tags. However, we will show that Lee et al's scheme is still susceptible to a forgery attack. We also present a simple method to strengthen its security.