Vulnerabilities of an ECC-based RFID authentication scheme

Nan Li*, Yi Mu, Willy Susilo, Fuchun Guo, Vijay Varadharajan

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

7 Citations (Scopus)


Radio frequency identification (RFID) authentication is an indispensable part of RFID applications, which allows a reader to identify objects in an authenticated manner. Recently, Liao and Hsiao proposed a very interesting elliptic curve cryptography-based RFID authentication scheme with ID-verifier transfer protocol. They claimed that the proposed protocol is secure against many attacks and satisfies essential security requirements of RFID systems. However, in this paper, we demonstrate that the protocol suffers from several attacks, in contrast to their original claims in the paper. Furthermore, we also propose a repaired version of the authentication protocol against identified attacks, and we provide formal security proofs.

Original languageEnglish
Pages (from-to)3262-3270
Number of pages9
JournalSecurity and Communication Networks
Issue number17
Publication statusPublished - 25 Nov 2015


  • Applied cryptography
  • Authentication
  • RFID security


Dive into the research topics of 'Vulnerabilities of an ECC-based RFID authentication scheme'. Together they form a unique fingerprint.

Cite this