RFID Tags Batch Authentication Revisited - Communication Overhead and Server Computational Complexity Limits.
Przemyslaw BlaskiewiczLukasz KrzywieckiPiotr SygaPublished in: ISPEC (2016)
Keyphrases
- communication overhead
- authentication protocol
- rfid tags
- computational complexity
- low cost
- mutual authentication
- lightweight
- user authentication
- radio frequency identification
- authentication scheme
- communication cost
- rfid systems
- security issues
- security mechanisms
- public key
- cost effective
- power consumption
- security protocols
- rfid technology
- rfid reader
- cellular networks
- smart card
- security analysis
- key distribution
- sensor networks
- real time
- mobile terminals
- cloud computing
- trusted third party
- data sets