An Authentication Protocol for RFID Tag and Its Simulation.
Shang-Ping WangQiao-mei MaYa-Ling ZhangYou-sheng LiPublished in: J. Networks (2011)
Keyphrases
- authentication protocol
- rfid tags
- smart card
- lightweight
- low cost
- public key
- security analysis
- rfid systems
- radio frequency identification
- secret key
- resource constrained
- authentication scheme
- security protocols
- rfid reader
- power consumption
- cost effective
- mutual authentication
- rfid technology
- hash functions
- radio frequency identification rfid
- mobile devices