Retrofitting Mutual Authentication to GSM Using RAND Hijacking.
Mohammed Shafiul Alam KhanChris J. MitchellPublished in: STM (2016)
Keyphrases
- mutual authentication
- rfid tags
- low cost
- security analysis
- radio frequency identification
- lightweight
- authentication protocol
- privacy protection
- resource constrained
- rfid systems
- authentication mechanism
- smart card
- security issues
- cost effective
- secret key
- power consumption
- end to end
- security protocols
- public key
- trusted third party
- authentication scheme
- security mechanisms
- databases
- real time
- security requirements