Subtle Flaws in the Secure RFID Tag Searching Protocol: SRTS.
Imran ErgulerPublished in: Wirel. Pers. Commun. (2016)
Keyphrases
- rfid systems
- authentication protocol
- rfid tags
- mutual authentication
- security protocols
- cryptographic protocols
- lightweight
- radio frequency identification
- security analysis
- low cost
- smart card
- rfid technology
- key distribution
- radio frequency identification rfid
- rfid reader
- authentication scheme
- public key
- real time
- security issues
- user authentication
- cost effective
- resource constrained
- privacy protection
- security level
- security mechanisms
- security problems
- power consumption
- key management
- covert channel