Weaknesses in another Gen2-based RFID authentication protocol.
Masoumeh SafkhaniNasour BagheriPedro Peris-LopezAikaterini MitrokotsaJulio C. Hernandez-CastroPublished in: RFID-TA (2012)
Keyphrases
- authentication protocol
- rfid tags
- rfid systems
- mutual authentication
- radio frequency identification
- low cost
- lightweight
- rfid technology
- smart card
- public key
- security analysis
- resource constrained
- security protocols
- cost effective
- authentication scheme
- security issues
- secret key
- power consumption
- security mechanisms
- real time
- authentication mechanism
- end to end
- intrusion detection
- image compression
- supply chain